Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TECHNICAL SPECIFICATIONS.exe

Overview

General Information

Sample name:TECHNICAL SPECIFICATIONS.exe
Analysis ID:1570417
MD5:65feefe926eb3f734b6968b35c23acb3
SHA1:8fada228f4395476abe8bdbe75abfe8d7c6ef4eb
SHA256:d1b068b826e3a9527cddd09866886caba895f390af930a9b35c027eb1c2db34c
Tags:AgentTeslaexeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large strings
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • TECHNICAL SPECIFICATIONS.exe (PID: 6480 cmdline: "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe" MD5: 65FEEFE926EB3F734B6968B35C23ACB3)
    • powershell.exe (PID: 7128 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • TECHNICAL SPECIFICATIONS.exe (PID: 5960 cmdline: "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe" MD5: 65FEEFE926EB3F734B6968B35C23ACB3)
  • newapp.exe (PID: 7516 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 65FEEFE926EB3F734B6968B35C23ACB3)
    • newapp.exe (PID: 7576 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 65FEEFE926EB3F734B6968B35C23ACB3)
  • newapp.exe (PID: 7856 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 65FEEFE926EB3F734B6968B35C23ACB3)
    • newapp.exe (PID: 7944 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 65FEEFE926EB3F734B6968B35C23ACB3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.ercolina-usa.com", "Username": "ben@ercolina-usa.com", "Password": "nXe0M~WkW&nJ"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4473961578.000000000324C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000002.2254086095.00000000030D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000007.00000002.2254086095.00000000030D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000A.00000002.4473839350.0000000002F61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000A.00000002.4473839350.0000000002F61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 27 entries
            SourceRuleDescriptionAuthorStrings
            0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33bdc:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33c4e:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x33cd8:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33d6a:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x33dd4:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x33e46:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x33edc:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x33f6c:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x30dec:$s2: GetPrivateProfileString
                • 0x30472:$s3: get_OSFullName
                • 0x31b69:$s5: remove_Key
                • 0x31d29:$s5: remove_Key
                • 0x32ca1:$s6: FtpWebRequest
                • 0x33bbe:$s7: logins
                • 0x34130:$s7: logins
                • 0x36e41:$s7: logins
                • 0x36ef3:$s7: logins
                • 0x389be:$s7: logins
                • 0x37a8d:$s9: 1.85 (Hash, version 2, native byte-order)
                7.2.newapp.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 46 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", ParentImage: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe, ParentProcessId: 6480, ParentProcessName: TECHNICAL SPECIFICATIONS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", ProcessId: 7128, ProcessName: powershell.exe
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\newapp\newapp.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe, ProcessId: 5960, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\newapp
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", ParentImage: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe, ParentProcessId: 6480, ParentProcessName: TECHNICAL SPECIFICATIONS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", ProcessId: 7128, ProcessName: powershell.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", ParentImage: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe, ParentProcessId: 6480, ParentProcessName: TECHNICAL SPECIFICATIONS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe", ProcessId: 7128, ProcessName: powershell.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.ercolina-usa.com", "Username": "ben@ercolina-usa.com", "Password": "nXe0M~WkW&nJ"}
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeReversingLabs: Detection: 65%
                  Source: TECHNICAL SPECIFICATIONS.exeReversingLabs: Detection: 65%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeJoe Sandbox ML: detected
                  Source: TECHNICAL SPECIFICATIONS.exeJoe Sandbox ML: detected
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49714 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49730 version: TLS 1.2
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: nCItN.pdbSHA256 source: TECHNICAL SPECIFICATIONS.exe, newapp.exe.4.dr
                  Source: Binary string: nCItN.pdb source: TECHNICAL SPECIFICATIONS.exe, newapp.exe.4.dr
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4x nop then jmp 0BB40F70h0_2_0BB4066D
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4x nop then jmp 0BB40F70h0_2_0BB406B1

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewIP Address: 192.254.225.136 192.254.225.136
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                  Source: global trafficDNS traffic detected: DNS query: ftp.ercolina-usa.com
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.000000000324C000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003275000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000003105000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ercolina-usa.com
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.000000000324C000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003275000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000003105000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.ercolina-usa.com
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2048875649.0000000002638000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2188312892.0000000003248000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003089000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000009.00000002.2272052838.00000000032EB000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, newapp.exe, 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003089000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003089000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003089000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49714 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49730 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, SKTzxzsJw.cs.Net Code: KdRT1gFnIpl
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, SKTzxzsJw.cs.Net Code: KdRT1gFnIpl
                  Source: 6.2.newapp.exe.42e5dd0.2.raw.unpack, SKTzxzsJw.cs.Net Code: KdRT1gFnIpl
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\newapp\newapp.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\newapp\newapp.exe
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow created: window name: CLIPBRDWNDCLASS

                  System Summary

                  barindex
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 7.2.newapp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 7.2.newapp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 6.2.newapp.exe.42e5dd0.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.newapp.exe.42e5dd0.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 6.2.newapp.exe.4265e58.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.newapp.exe.4265e58.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 9.2.newapp.exe.4385f68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 9.2.newapp.exe.4385f68.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 6.2.newapp.exe.4265e58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.newapp.exe.4265e58.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 9.2.newapp.exe.4385f68.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 9.2.newapp.exe.4385f68.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 6.2.newapp.exe.42e5dd0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.newapp.exe.42e5dd0.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: TECHNICAL SPECIFICATIONS.exe, frmLogin.csLong String: Length: 123476
                  Source: newapp.exe.4.dr, frmLogin.csLong String: Length: 123476
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_00C1D5840_2_00C1D584
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8ABE80_2_08E8ABE8
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8ABC80_2_08E8ABC8
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8ABDF0_2_08E8ABDF
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8CC580_2_08E8CC58
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E87F8B0_2_08E87F8B
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8B0200_2_08E8B020
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8B4470_2_08E8B447
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8B4580_2_08E8B458
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8D5F80_2_08E8D5F8
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_08E8D6080_2_08E8D608
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_0BB403300_2_0BB40330
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_0BB403200_2_0BB40320
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_0BB426780_2_0BB42678
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_017C4A684_2_017C4A68
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_017CADB04_2_017CADB0
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_017C3E504_2_017C3E50
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_017C41984_2_017C4198
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF47A44_2_06DF47A4
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF6A124_2_06DF6A12
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF033F4_2_06DF033F
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF1F3F4_2_06DF1F3F
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF5D484_2_06DF5D48
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF5D424_2_06DF5D42
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E056A84_2_06E056A8
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E07E604_2_06E07E60
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E035684_2_06E03568
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E0C2604_2_06E0C260
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E077804_2_06E07780
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E0E7504_2_06E0E750
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E000404_2_06E00040
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E0003A4_2_06E0003A
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_031AD5846_2_031AD584
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962ABE86_2_0962ABE8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962ABC86_2_0962ABC8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962CC486_2_0962CC48
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962CC586_2_0962CC58
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962B0206_2_0962B020
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962D5F86_2_0962D5F8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962B4476_2_0962B447
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962B4586_2_0962B458
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 6_2_0962D6086_2_0962D608
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_012641987_2_01264198
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_0126E91D7_2_0126E91D
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_01264A687_2_01264A68
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_0126AD507_2_0126AD50
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_0126AC907_2_0126AC90
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_01263E507_2_01263E50
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C144EC7_2_06C144EC
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C167937_2_06C16793
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C11C907_2_06C11C90
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C15AA37_2_06C15AA3
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C15AA87_2_06C15AA8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C118D87_2_06C118D8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C366E07_2_06C366E0
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C356B07_2_06C356B0
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C37E687_2_06C37E68
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C335707_2_06C33570
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C3C2687_2_06C3C268
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C3B3187_2_06C3B318
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C377887_2_06C37788
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C3E4987_2_06C3E498
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C35DE87_2_06C35DE8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C300407_2_06C30040
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C3003E7_2_06C3003E
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_0187D5849_2_0187D584
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DD6089_2_074DD608
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DD5F89_2_074DD5F8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DB4479_2_074DB447
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DB4589_2_074DB458
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DB0209_2_074DB020
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DCC489_2_074DCC48
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DCC589_2_074DCC58
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DABC89_2_074DABC8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 9_2_074DABE89_2_074DABE8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_02CD4A6810_2_02CD4A68
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_02CDE91D10_2_02CDE91D
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_02CD3E5010_2_02CD3E50
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_02CD419810_2_02CD4198
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_02CDAC9010_2_02CDAC90
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E44EC10_2_069E44EC
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E679210_2_069E6792
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E1C9010_2_069E1C90
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E5AA810_2_069E5AA8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E5AA210_2_069E5AA2
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E18D810_2_069E18D8
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A056B010_2_06A056B0
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A066E010_2_06A066E0
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A07E6810_2_06A07E68
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A0357010_2_06A03570
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A0C26810_2_06A0C268
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A0B30710_2_06A0B307
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A0778810_2_06A07788
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A0E49810_2_06A0E498
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A05DD710_2_06A05DD7
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A0004010_2_06A00040
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06A0003F10_2_06A0003F
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2053221424.0000000007760000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000000.2015444781.0000000000285000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamenCItN.exe< vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2048875649.0000000002638000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename4050351b-3b81-4030-83d1-4403e211abfe.exe4 vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2052417966.00000000067D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2048069447.0000000000A8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename4050351b-3b81-4030-83d1-4403e211abfe.exe4 vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2048875649.00000000026D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4469900306.0000000000FA9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4491447285.0000000006B75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenCItN.exe< vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4470238843.0000000001478000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllN vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exeBinary or memory string: OriginalFilenamenCItN.exe< vs TECHNICAL SPECIFICATIONS.exe
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 7.2.newapp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 7.2.newapp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 6.2.newapp.exe.42e5dd0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.newapp.exe.42e5dd0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 6.2.newapp.exe.4265e58.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.newapp.exe.4265e58.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 9.2.newapp.exe.4385f68.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 9.2.newapp.exe.4385f68.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 6.2.newapp.exe.4265e58.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.newapp.exe.4265e58.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 9.2.newapp.exe.4385f68.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 9.2.newapp.exe.4385f68.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 6.2.newapp.exe.42e5dd0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.newapp.exe.42e5dd0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: newapp.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, jREUtxrgTmZ9ujRnhh.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, jREUtxrgTmZ9ujRnhh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, TNf7y49lyKa8eHbNQr.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, TNf7y49lyKa8eHbNQr.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, TNf7y49lyKa8eHbNQr.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, jREUtxrgTmZ9ujRnhh.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, jREUtxrgTmZ9ujRnhh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, TNf7y49lyKa8eHbNQr.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, TNf7y49lyKa8eHbNQr.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, TNf7y49lyKa8eHbNQr.csSecurity API names: _0020.AddAccessRule
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@12/9@2/2
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TECHNICAL SPECIFICATIONS.exe.logJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMutant created: NULL
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMutant created: \Sessions\1\BaseNamedObjects\ikcbybviph
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1868:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adewuqtv.gbm.ps1Jump to behavior
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: TECHNICAL SPECIFICATIONS.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: TECHNICAL SPECIFICATIONS.exeReversingLabs: Detection: 65%
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile read: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess created: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess created: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dwrite.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windowscodecs.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: textshaping.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasapi32.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasman.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rtutils.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dnsapi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: winnsi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasadhlp.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: fwpuclnt.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: schannel.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mskeyprotect.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ntasn1.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ncrypt.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ncryptsslp.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vaultcli.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dpapi.dll
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: edputil.dll
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: TECHNICAL SPECIFICATIONS.exeStatic file information: File size 1096704 > 1048576
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: nCItN.pdbSHA256 source: TECHNICAL SPECIFICATIONS.exe, newapp.exe.4.dr
                  Source: Binary string: nCItN.pdb source: TECHNICAL SPECIFICATIONS.exe, newapp.exe.4.dr

                  Data Obfuscation

                  barindex
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, TNf7y49lyKa8eHbNQr.cs.Net Code: VIk8ITLepk System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, TNf7y49lyKa8eHbNQr.cs.Net Code: VIk8ITLepk System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.27cb868.0.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.7760000.6.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 6.2.newapp.exe.33db82c.0.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: 0xF7228534 [Sun May 22 19:51:16 2101 UTC]
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_00C147B1 push ebp; ret 0_2_00C14815
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 0_2_07C0C771 push ebp; ret 0_2_07C0C7CC
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_017C0C55 push edi; retf 4_2_017C0C7A
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF5350 pushfd ; ret 4_2_06DF5669
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF0B6B push eax; retf 4_2_06DF0B7B
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF0B16 push eax; retf 4_2_06DF0B17
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF0B22 push eax; retf 4_2_06DF0B23
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF68E2 push esp; retf 4_2_06DF68E9
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF68E0 pushad ; retf 4_2_06DF68E1
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06DF5662 pushfd ; ret 4_2_06DF5669
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E025DB push ebx; retf 4_2_06E025DA
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeCode function: 4_2_06E025BF push ebx; retf 4_2_06E025DA
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_01260C55 push edi; retf 7_2_01260C7A
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C150B0 pushfd ; ret 7_2_06C153C9
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C16640 pushad ; retf 7_2_06C16641
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C16643 push esp; retf 7_2_06C16649
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C1AC69 push es; ret 7_2_06C1AC70
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C1F2B0 push es; ret 7_2_06C1F2C0
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C153C3 pushfd ; ret 7_2_06C153C9
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_06C19E31 push ebx; retn 5506h7_2_06C19E3E
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E50B0 pushfd ; ret 10_2_069E53C9
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E6642 push esp; retf 10_2_069E6649
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E6640 pushad ; retf 10_2_069E6641
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069EAC61 push es; ret 10_2_069EAC70
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_069E53C2 pushfd ; ret 10_2_069E53C9
                  Source: TECHNICAL SPECIFICATIONS.exeStatic PE information: section name: .text entropy: 7.211152968650304
                  Source: newapp.exe.4.drStatic PE information: section name: .text entropy: 7.211152968650304
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, hWOF1wq8TwGnEeL18pe.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jTVunec655', 'louuGZQdoX', 'U0XuafC22l', 'DUAuuhpF4Q', 'DS1utwbCoJ', 'SKcupM6KMZ', 'F04ujYjNE7'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, kWIAW0v8S1UL2kEHvx.csHigh entropy of concatenated method names: 'ygsCWfMdg3', 'a0oCkcZkSH', 'aTxChFG2bM', 'O65COHO7il', 'GiMC9xOA9Q', 'NlBh1408fq', 'BSSh6Nsjsd', 'AyMhNXkIhO', 'XakhQadMDP', 'eD5h39KnoS'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, suYabEUCWPeZSqmf7e.csHigh entropy of concatenated method names: 'KSMLeq6IVl', 'UKIL4ShuPo', 'ToString', 'FMOLHHiKEx', 'b0kLkH6I5g', 'DFpLYITFau', 'o8rLhDLbBj', 'fSlLCYSSgX', 'XrrLOWtbw2', 'QkIL9B6cjJ'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, fhjAQ5qqUM8yQLZ5sgb.csHigh entropy of concatenated method names: 'DO4GFBippO', 'fs6GzOZ1Fu', 'KG6alqUWrm', 'bB9aqTOSq5', 'Ibja58hgfu', 'FRBaA08TCX', 'dkka8IsZWj', 'qytaWqPDXe', 'tlEaHuFe4h', 'pKDak4cLr2'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, nWjxCYkuJNRVakHJYU.csHigh entropy of concatenated method names: 'Dispose', 'qrSq3nW7es', 'Pn95ZxFHnE', 'JL2t4eyFtX', 'XJTqFynaYt', 'KaWqzhF0eI', 'ProcessDialogKey', 'mb15lZkW4k', 'GGq5qseKuD', 'Bd955bi23B'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, e1hGVOJlNwTUMAc0FC.csHigh entropy of concatenated method names: 'ToString', 'NPdKEmt864', 'is5KZqMMca', 'Dh3KcuNfhO', 'n9oKsXtfO9', 'lg6KM9Vha8', 'aekKX0PqUr', 'QP4Kg2YggD', 'n9GKbxdeMP', 'dbSKP6IeLV'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, GJW89S66pDjHWZcEEv.csHigh entropy of concatenated method names: 'QaeLQEbTfF', 'cGBLFnoTvJ', 'uDmmlFJdX5', 'k84mqLD4eL', 'l5oLES0bqc', 'nerLxCeviK', 'nhaLy9rZc6', 'pjpLSnA81X', 'RywLd2bpm0', 'm1WLJ5eDoq'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, IshQhKznOsTw8qGH2f.csHigh entropy of concatenated method names: 'XYXGobgAb5', 'uDPGrTgZCc', 'T8eGRb0sgX', 'jiPGvpUyyF', 'oxQGZgoLEo', 'M6hGsphWEK', 'zxyGMXtLaq', 'ACZGjpSdH8', 'RwQGD3fl9I', 'kBEGwtWWmu'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, L1sbZpRd8uXWCharmO.csHigh entropy of concatenated method names: 'XsEY05NHHs', 'ncQYoaHJs0', 'QQqYr4w4GJ', 'oRkYRBIiOp', 'J3LY73drh6', 'moWYKRSSiF', 'N28YLQjFwR', 'MxBYmEyoOA', 'npLYndkddK', 'yheYGyFOUR'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, MwHahQNiSLrSnW7es3.csHigh entropy of concatenated method names: 'mZYn7ndU8M', 'i4wnLrmHRw', 'sU1nnLfvFC', 'UH8na96PT0', 'db8ntCIBkG', 'SMYnj1taSu', 'Dispose', 'wt5mH8dORf', 'ukvmktq6nl', 'Wr7mYZg5Jd'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, lo4tTfy9Js5R3nmhSv.csHigh entropy of concatenated method names: 'ESTVrDBfLA', 'PvJVRbK9RW', 'KLXVvDMaKc', 'kmJVZSmYlt', 'QyMVsmkYHA', 'sJSVMvZpUD', 'gXNVgPLioV', 'dtkVby7XAA', 'JLdVByt8LH', 'EoTVEnumUH'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, LV8kjA5roX4L7TqFCM.csHigh entropy of concatenated method names: 's0QIopDWm', 'itA0xh8jZ', 'J6Voc3dAR', 'cDM2rFOsM', 'EIiR6Wrjn', 'LqlTWgvqL', 'SRNnyP488fb6tZjCAM', 'vRXigfK908X6uWhYBI', 'SoPmIgO2g', 'EF9GR2REd'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, rRQlnBT6uvnPIUupEG.csHigh entropy of concatenated method names: 'aTKhihHpXw', 'MlXh2B0RbB', 'Ub8Ycyfo6w', 'EK6YsO087S', 'E25YMCCjGH', 'cwlYXQ2QAh', 'fUpYgJAjO4', 'z6VYbAYNy5', 'A3EYPeYIIH', 'wxIYBgF79D'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, DdIlOCPvMFdu4tmhoi.csHigh entropy of concatenated method names: 'b97OD4vCq7', 'Q9QOwqMoAg', 'JFLOIMe87u', 'oCGO0LnR7C', 'NZ0Oig2ifA', 'fOKOomMoqK', 'NUTO2FRKYA', 'M9KOrJT9pp', 'JxpORhKB03', 'pchOToGt5H'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, TNf7y49lyKa8eHbNQr.csHigh entropy of concatenated method names: 'IRnAW7FqCc', 'SkSAH1syRj', 'ifHAkybhYA', 'zJTAYVjuSp', 'YryAhw97Xi', 'ITSACnIN3N', 'ATaAOxd1Td', 'z3XA9WKfbD', 'xwCAf6QJe6', 'ExTAeDnKSN'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, UZkW4k3vGqseKuDod9.csHigh entropy of concatenated method names: 'hypnvbHch4', 'fZmnZ8jyYZ', 'Y7GncyHfAx', 'MstnsKiCYE', 'NKSnMd1KUU', 'jTtnX2ZVJh', 'yAYngcpvD5', 'aaKnbAV5EU', 'bV9nP74fTr', 'DAwnBpAy3G'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, HYgbO58wUsaM0469Oa.csHigh entropy of concatenated method names: 'lcOqOREUtx', 'LTmq9Z9ujR', 'vd8qeuXWCh', 'trmq4OmRQl', 'Tupq7EG9WI', 'dW0qK8S1UL', 'Uj8WWG7pM1e3ima9Ix', 'jjCkyEUhO6i2WTBbEN', 'de1qqdZK4F', 'HYNqAA3h3O'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, jREUtxrgTmZ9ujRnhh.csHigh entropy of concatenated method names: 'PKSkSIii7i', 'nsWkdtmOvr', 'muEkJle5xh', 'qtvkUYtvDP', 'DAjk1CNt1c', 'rRwk6XSLyi', 'YcskNUTHTK', 'gWikQpGZmw', 'Poik3bmefW', 'T5okFRl99d'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, vl63b4qlejrmlkOmBYp.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bKsGEc23SI', 'BRSGxHHHhG', 'vxsGyfUJfy', 'JZtGSjHroX', 'gYwGda85Wo', 'ijQGJmH4g9', 'gO2GUwyrWV'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, QcVSh5S6Dl20iBJhn2.csHigh entropy of concatenated method names: 'x6l7BtQZMY', 'wWw7xx2NnJ', 'eMP7Sn8aSU', 'tTc7dZrSlj', 'FlU7Zta6PE', 'O0j7c443fT', 'Olu7sWGnda', 'Ldm7MyIvYp', 'kkY7XL6uGn', 'rs17grqClb'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, sMNDIUgZWPSB65IaPP.csHigh entropy of concatenated method names: 'AxgOH5a82Q', 'xUCOYNBSt0', 'xPkOCZYojg', 'JvhCFk9hy4', 'Qn4Cz6WxNh', 'GBmOlPJ8Um', 're6OqiYZg0', 'ceZO577o2D', 'pVtOAxhvBX', 'o7oO8bcdBq'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, Li23B1F2TbfLEFgIOp.csHigh entropy of concatenated method names: 'PXBGY70Xlr', 'AkUGhGyMI0', 'sNMGCIZHZ8', 'eYCGOw1OvK', 'bCIGnxuXjQ', 'lShG9mFDKc', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.67d0000.5.raw.unpack, hD8Nd6YU5MDOdxJVxx.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'KWY53JBySB', 'kgx5F3ayvV', 'YNn5z8CJmY', 'GSOAlJHcs2', 'BNxAqYdfpK', 'ftcA5YaiQ2', 'MAPAAl8Zg4', 'bfp4bcDpJSxNZp2QqSE'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, hWOF1wq8TwGnEeL18pe.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jTVunec655', 'louuGZQdoX', 'U0XuafC22l', 'DUAuuhpF4Q', 'DS1utwbCoJ', 'SKcupM6KMZ', 'F04ujYjNE7'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, kWIAW0v8S1UL2kEHvx.csHigh entropy of concatenated method names: 'ygsCWfMdg3', 'a0oCkcZkSH', 'aTxChFG2bM', 'O65COHO7il', 'GiMC9xOA9Q', 'NlBh1408fq', 'BSSh6Nsjsd', 'AyMhNXkIhO', 'XakhQadMDP', 'eD5h39KnoS'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, suYabEUCWPeZSqmf7e.csHigh entropy of concatenated method names: 'KSMLeq6IVl', 'UKIL4ShuPo', 'ToString', 'FMOLHHiKEx', 'b0kLkH6I5g', 'DFpLYITFau', 'o8rLhDLbBj', 'fSlLCYSSgX', 'XrrLOWtbw2', 'QkIL9B6cjJ'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, fhjAQ5qqUM8yQLZ5sgb.csHigh entropy of concatenated method names: 'DO4GFBippO', 'fs6GzOZ1Fu', 'KG6alqUWrm', 'bB9aqTOSq5', 'Ibja58hgfu', 'FRBaA08TCX', 'dkka8IsZWj', 'qytaWqPDXe', 'tlEaHuFe4h', 'pKDak4cLr2'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, nWjxCYkuJNRVakHJYU.csHigh entropy of concatenated method names: 'Dispose', 'qrSq3nW7es', 'Pn95ZxFHnE', 'JL2t4eyFtX', 'XJTqFynaYt', 'KaWqzhF0eI', 'ProcessDialogKey', 'mb15lZkW4k', 'GGq5qseKuD', 'Bd955bi23B'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, e1hGVOJlNwTUMAc0FC.csHigh entropy of concatenated method names: 'ToString', 'NPdKEmt864', 'is5KZqMMca', 'Dh3KcuNfhO', 'n9oKsXtfO9', 'lg6KM9Vha8', 'aekKX0PqUr', 'QP4Kg2YggD', 'n9GKbxdeMP', 'dbSKP6IeLV'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, GJW89S66pDjHWZcEEv.csHigh entropy of concatenated method names: 'QaeLQEbTfF', 'cGBLFnoTvJ', 'uDmmlFJdX5', 'k84mqLD4eL', 'l5oLES0bqc', 'nerLxCeviK', 'nhaLy9rZc6', 'pjpLSnA81X', 'RywLd2bpm0', 'm1WLJ5eDoq'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, IshQhKznOsTw8qGH2f.csHigh entropy of concatenated method names: 'XYXGobgAb5', 'uDPGrTgZCc', 'T8eGRb0sgX', 'jiPGvpUyyF', 'oxQGZgoLEo', 'M6hGsphWEK', 'zxyGMXtLaq', 'ACZGjpSdH8', 'RwQGD3fl9I', 'kBEGwtWWmu'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, L1sbZpRd8uXWCharmO.csHigh entropy of concatenated method names: 'XsEY05NHHs', 'ncQYoaHJs0', 'QQqYr4w4GJ', 'oRkYRBIiOp', 'J3LY73drh6', 'moWYKRSSiF', 'N28YLQjFwR', 'MxBYmEyoOA', 'npLYndkddK', 'yheYGyFOUR'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, MwHahQNiSLrSnW7es3.csHigh entropy of concatenated method names: 'mZYn7ndU8M', 'i4wnLrmHRw', 'sU1nnLfvFC', 'UH8na96PT0', 'db8ntCIBkG', 'SMYnj1taSu', 'Dispose', 'wt5mH8dORf', 'ukvmktq6nl', 'Wr7mYZg5Jd'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, lo4tTfy9Js5R3nmhSv.csHigh entropy of concatenated method names: 'ESTVrDBfLA', 'PvJVRbK9RW', 'KLXVvDMaKc', 'kmJVZSmYlt', 'QyMVsmkYHA', 'sJSVMvZpUD', 'gXNVgPLioV', 'dtkVby7XAA', 'JLdVByt8LH', 'EoTVEnumUH'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, LV8kjA5roX4L7TqFCM.csHigh entropy of concatenated method names: 's0QIopDWm', 'itA0xh8jZ', 'J6Voc3dAR', 'cDM2rFOsM', 'EIiR6Wrjn', 'LqlTWgvqL', 'SRNnyP488fb6tZjCAM', 'vRXigfK908X6uWhYBI', 'SoPmIgO2g', 'EF9GR2REd'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, rRQlnBT6uvnPIUupEG.csHigh entropy of concatenated method names: 'aTKhihHpXw', 'MlXh2B0RbB', 'Ub8Ycyfo6w', 'EK6YsO087S', 'E25YMCCjGH', 'cwlYXQ2QAh', 'fUpYgJAjO4', 'z6VYbAYNy5', 'A3EYPeYIIH', 'wxIYBgF79D'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, DdIlOCPvMFdu4tmhoi.csHigh entropy of concatenated method names: 'b97OD4vCq7', 'Q9QOwqMoAg', 'JFLOIMe87u', 'oCGO0LnR7C', 'NZ0Oig2ifA', 'fOKOomMoqK', 'NUTO2FRKYA', 'M9KOrJT9pp', 'JxpORhKB03', 'pchOToGt5H'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, TNf7y49lyKa8eHbNQr.csHigh entropy of concatenated method names: 'IRnAW7FqCc', 'SkSAH1syRj', 'ifHAkybhYA', 'zJTAYVjuSp', 'YryAhw97Xi', 'ITSACnIN3N', 'ATaAOxd1Td', 'z3XA9WKfbD', 'xwCAf6QJe6', 'ExTAeDnKSN'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, UZkW4k3vGqseKuDod9.csHigh entropy of concatenated method names: 'hypnvbHch4', 'fZmnZ8jyYZ', 'Y7GncyHfAx', 'MstnsKiCYE', 'NKSnMd1KUU', 'jTtnX2ZVJh', 'yAYngcpvD5', 'aaKnbAV5EU', 'bV9nP74fTr', 'DAwnBpAy3G'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, HYgbO58wUsaM0469Oa.csHigh entropy of concatenated method names: 'lcOqOREUtx', 'LTmq9Z9ujR', 'vd8qeuXWCh', 'trmq4OmRQl', 'Tupq7EG9WI', 'dW0qK8S1UL', 'Uj8WWG7pM1e3ima9Ix', 'jjCkyEUhO6i2WTBbEN', 'de1qqdZK4F', 'HYNqAA3h3O'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, jREUtxrgTmZ9ujRnhh.csHigh entropy of concatenated method names: 'PKSkSIii7i', 'nsWkdtmOvr', 'muEkJle5xh', 'qtvkUYtvDP', 'DAjk1CNt1c', 'rRwk6XSLyi', 'YcskNUTHTK', 'gWikQpGZmw', 'Poik3bmefW', 'T5okFRl99d'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, vl63b4qlejrmlkOmBYp.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bKsGEc23SI', 'BRSGxHHHhG', 'vxsGyfUJfy', 'JZtGSjHroX', 'gYwGda85Wo', 'ijQGJmH4g9', 'gO2GUwyrWV'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, QcVSh5S6Dl20iBJhn2.csHigh entropy of concatenated method names: 'x6l7BtQZMY', 'wWw7xx2NnJ', 'eMP7Sn8aSU', 'tTc7dZrSlj', 'FlU7Zta6PE', 'O0j7c443fT', 'Olu7sWGnda', 'Ldm7MyIvYp', 'kkY7XL6uGn', 'rs17grqClb'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, sMNDIUgZWPSB65IaPP.csHigh entropy of concatenated method names: 'AxgOH5a82Q', 'xUCOYNBSt0', 'xPkOCZYojg', 'JvhCFk9hy4', 'Qn4Cz6WxNh', 'GBmOlPJ8Um', 're6OqiYZg0', 'ceZO577o2D', 'pVtOAxhvBX', 'o7oO8bcdBq'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, Li23B1F2TbfLEFgIOp.csHigh entropy of concatenated method names: 'PXBGY70Xlr', 'AkUGhGyMI0', 'sNMGCIZHZ8', 'eYCGOw1OvK', 'bCIGnxuXjQ', 'lShG9mFDKc', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, hD8Nd6YU5MDOdxJVxx.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'KWY53JBySB', 'kgx5F3ayvV', 'YNn5z8CJmY', 'GSOAlJHcs2', 'BNxAqYdfpK', 'ftcA5YaiQ2', 'MAPAAl8Zg4', 'bfp4bcDpJSxNZp2QqSE'
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile created: C:\Users\user\AppData\Roaming\newapp\newapp.exeJump to dropped file
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run newappJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run newappJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile opened: C:\Users\user\AppData\Roaming\newapp\newapp.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: TECHNICAL SPECIFICATIONS.exe PID: 6480, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: BA0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: 25F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: C50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: 8E90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: 69C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: 9E90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: AE90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: 1780000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: 31D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 1920000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 3200000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 5200000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 9630000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 7590000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: A630000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: B630000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 1260000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 3080000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 2F90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 1870000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 32A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 30E0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 9630000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 76D0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: A630000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: B630000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 14C0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 2F10000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 2D40000 memory reserve | memory write watch
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599563Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599321Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599184Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599062Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598952Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598844Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598734Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598623Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598515Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598406Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598297Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598188Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598078Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597969Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597859Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597750Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597641Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597531Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597422Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597313Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597188Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597063Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596953Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596778Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596670Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596550Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596435Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596328Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596219Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596109Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596000Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595891Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595766Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595641Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595531Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595422Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595313Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595188Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595063Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594953Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594844Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594719Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594609Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594500Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594391Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594281Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594172Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594035Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 593914Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599759Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599641Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599516Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599406Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599297Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598938Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598578Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598469Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598359Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598250Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598141Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598031Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597922Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597813Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597688Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597422Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597304Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597188Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597078Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596969Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596844Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596735Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596490Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596204Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596078Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595956Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595828Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595719Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595609Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595500Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595387Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595277Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595158Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595031Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594919Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594813Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594703Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594594Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594469Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 600000
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599875
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599765
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599656
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599546
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599436
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599328
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599219
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599109
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599000
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598890
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598779
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598672
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598562
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598443
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598328
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598218
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598107
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598000
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597890
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597781
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597672
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597562
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597453
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597344
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597233
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597125
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597015
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596906
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596797
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596687
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596578
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596468
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596359
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596250
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596140
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596029
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595922
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595812
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595703
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595594
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595484
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595372
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595265
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595156
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595046
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594937
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594828
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594719
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594609
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6289Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2683Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWindow / User API: threadDelayed 2069Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWindow / User API: threadDelayed 7773Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 3620Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 5854Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 2013
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 7836
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 5428Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7320Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7256Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep count: 35 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -599781s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7424Thread sleep count: 2069 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -599563s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -599321s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -599184s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -599062s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7424Thread sleep count: 7773 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598952s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598844s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598734s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598623s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598515s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598406s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598297s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598188s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -598078s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597969s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597859s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597750s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597641s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597531s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597422s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597313s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597188s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -597063s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596953s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596778s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596670s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596550s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596435s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -596000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -595891s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -595766s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -595641s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -595531s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -595422s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -595313s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -595188s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -595063s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594953s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594844s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594719s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594609s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594500s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594391s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594281s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594172s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -594035s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe TID: 7404Thread sleep time: -593914s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7536Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep count: 36 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7752Thread sleep count: 3620 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -599875s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7752Thread sleep count: 5854 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -599759s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -599641s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -599516s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -599406s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -599297s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -599188s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -599063s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598938s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598828s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598719s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598578s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598469s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598359s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598250s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598141s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -598031s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -597922s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -597813s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -597688s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -597547s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -597422s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -597304s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -597188s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -597078s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -596969s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -596844s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -596735s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -596610s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -596490s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -596360s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -596204s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -596078s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595956s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595828s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595719s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595609s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595500s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595387s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595277s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595158s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -595031s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -594919s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -594813s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -594703s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -594594s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7740Thread sleep time: -594469s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7876Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep count: 35 > 30
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -32281802128991695s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -600000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8048Thread sleep count: 2013 > 30
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599875s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8048Thread sleep count: 7836 > 30
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599765s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599656s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599546s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599436s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599328s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599219s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599109s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -599000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598890s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598779s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598672s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598562s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598443s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598328s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598218s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598107s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -598000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597890s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597781s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597672s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597562s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597453s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597344s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597233s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597125s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -597015s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596906s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596797s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596687s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596578s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596468s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596359s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596250s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596140s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -596029s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595922s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595812s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595703s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595594s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595484s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595372s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595265s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595156s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -595046s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -594937s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -594828s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -594719s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8044Thread sleep time: -594609s >= -30000s
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599563Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599321Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599184Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 599062Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598952Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598844Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598734Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598623Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598515Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598406Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598297Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598188Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 598078Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597969Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597859Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597750Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597641Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597531Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597422Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597313Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597188Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 597063Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596953Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596778Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596670Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596550Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596435Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596328Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596219Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596109Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 596000Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595891Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595766Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595641Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595531Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595422Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595313Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595188Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 595063Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594953Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594844Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594719Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594609Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594500Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594391Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594281Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594172Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 594035Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeThread delayed: delay time: 593914Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599759Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599641Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599516Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599406Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599297Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598938Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598578Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598469Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598359Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598250Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598141Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598031Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597922Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597813Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597688Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597422Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597304Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597188Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597078Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596969Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596844Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596735Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596490Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596204Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596078Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595956Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595828Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595719Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595609Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595500Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595387Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595277Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595158Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595031Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594919Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594813Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594703Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594594Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594469Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 600000
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599875
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599765
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599656
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599546
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599436
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599328
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599219
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599109
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599000
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598890
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598779
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598672
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598562
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598443
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598328
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598218
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598107
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598000
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597890
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597781
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597672
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597562
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597453
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597344
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597233
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597125
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597015
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596906
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596797
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596687
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596578
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596468
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596359
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596250
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596140
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596029
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595922
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595812
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595703
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595594
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595484
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595372
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595265
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595156
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595046
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594937
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594828
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594719
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594609
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2048069447.0000000000AC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2048069447.0000000000AC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4470238843.000000000150E000.00000004.00000020.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2252524497.000000000132C000.00000004.00000020.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4470697138.00000000011EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeMemory written: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory written: C:\Users\user\AppData\Roaming\newapp\newapp.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory written: C:\Users\user\AppData\Roaming\newapp\newapp.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeProcess created: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR]q
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <html>Time: 12/28/2024 22:45:27<br>User Name: user<br>Computer Name: 065367<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 8.46.123.228<br><hr><b>[ Program Manager]</b> (07/12/2024 06:00:18)<br>{Win}r</html>
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q3<b>[ Program Manager]</b> (07/12/2024 06:00:18)<br>
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q8<b>[ Program Manager]</b> (07/12/2024 06:00:18)<br>{Win}THbqd
                  Source: TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q9<b>[ Program Manager]</b> (07/12/2024 06:00:18)<br>{Win}rTHbqd
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.newapp.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.42e5dd0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.4265e58.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.newapp.exe.4385f68.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.4265e58.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.newapp.exe.4385f68.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.42e5dd0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4473961578.000000000324C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2254086095.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4473839350.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2254086095.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4473961578.0000000003221000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4473839350.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TECHNICAL SPECIFICATIONS.exe PID: 6480, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: TECHNICAL SPECIFICATIONS.exe PID: 5960, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7516, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7576, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7856, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7944, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\FTP Navigator\Ftplist.txt
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                  Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.newapp.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.42e5dd0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.4265e58.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.newapp.exe.4385f68.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.4265e58.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.newapp.exe.4385f68.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.42e5dd0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2254086095.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4473839350.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4473961578.0000000003221000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TECHNICAL SPECIFICATIONS.exe PID: 6480, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: TECHNICAL SPECIFICATIONS.exe PID: 5960, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7516, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7576, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7856, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7944, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.newapp.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.42e5dd0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.4265e58.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.newapp.exe.4385f68.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.4265e58.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.newapp.exe.4385f68.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.newapp.exe.42e5dd0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.372a558.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.36d55b0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TECHNICAL SPECIFICATIONS.exe.3698390.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4473961578.000000000324C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2254086095.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4473839350.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2254086095.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4473961578.0000000003221000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4473839350.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TECHNICAL SPECIFICATIONS.exe PID: 6480, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: TECHNICAL SPECIFICATIONS.exe PID: 5960, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7516, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7576, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7856, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7944, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  Registry Run Keys / Startup Folder
                  112
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  24
                  System Information Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  Registry Run Keys / Startup Folder
                  3
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  1
                  Query Registry
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                  Software Packing
                  NTDS211
                  Security Software Discovery
                  Distributed Component Object Model21
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets2
                  Process Discovery
                  SSH1
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials141
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Hidden Files and Directories
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1570417 Sample: TECHNICAL SPECIFICATIONS.exe Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 39 ftp.ercolina-usa.com 2->39 41 ercolina-usa.com 2->41 43 api.ipify.org 2->43 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 Multi AV Scanner detection for submitted file 2->63 65 11 other signatures 2->65 8 TECHNICAL SPECIFICATIONS.exe 4 2->8         started        12 newapp.exe 3 2->12         started        14 newapp.exe 2->14         started        signatures3 process4 file5 33 C:\Users\...\TECHNICAL SPECIFICATIONS.exe.log, ASCII 8->33 dropped 67 Adds a directory exclusion to Windows Defender 8->67 69 Injects a PE file into a foreign processes 8->69 16 TECHNICAL SPECIFICATIONS.exe 16 5 8->16         started        21 powershell.exe 22 8->21         started        71 Multi AV Scanner detection for dropped file 12->71 73 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->73 75 Machine Learning detection for dropped file 12->75 23 newapp.exe 14 2 12->23         started        25 newapp.exe 14->25         started        signatures6 process7 dnsIp8 35 ercolina-usa.com 192.254.225.136, 21, 49709, 49710 UNIFIEDLAYER-AS-1US United States 16->35 37 api.ipify.org 104.26.12.205, 443, 49707, 49714 CLOUDFLARENETUS United States 16->37 29 C:\Users\user\AppData\Roaming\...\newapp.exe, PE32 16->29 dropped 31 C:\Users\user\...\newapp.exe:Zone.Identifier, ASCII 16->31 dropped 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->45 47 Tries to steal Mail credentials (via file / registry access) 16->47 49 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->49 51 Loading BitLocker PowerShell Module 21->51 27 conhost.exe 21->27         started        53 Tries to harvest and steal ftp login credentials 25->53 55 Tries to harvest and steal browser information (history, passwords, etc) 25->55 57 Installs a global keyboard hook 25->57 file9 signatures10 process11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  TECHNICAL SPECIFICATIONS.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  TECHNICAL SPECIFICATIONS.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\newapp\newapp.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\newapp\newapp.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ercolina-usa.com
                  192.254.225.136
                  truetrue
                    unknown
                    api.ipify.org
                    104.26.12.205
                    truefalse
                      high
                      ftp.ercolina-usa.com
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgTECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003089000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://account.dyn.com/TECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, newapp.exe, 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.org/tTECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003089000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTECHNICAL SPECIFICATIONS.exe, 00000000.00000002.2048875649.0000000002638000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000006.00000002.2188312892.0000000003248000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003089000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000009.00000002.2272052838.00000000032EB000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://ftp.ercolina-usa.comTECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.000000000324C000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003275000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000003105000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://ercolina-usa.comTECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.000000000324C000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, TECHNICAL SPECIFICATIONS.exe, 00000004.00000002.4473961578.00000000033C5000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.2254086095.0000000003275000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000003105000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.4473839350.0000000002F8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      192.254.225.136
                                      ercolina-usa.comUnited States
                                      46606UNIFIEDLAYER-AS-1UStrue
                                      104.26.12.205
                                      api.ipify.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1570417
                                      Start date and time:2024-12-06 23:35:06 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 9m 43s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:12
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:TECHNICAL SPECIFICATIONS.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@12/9@2/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 324
                                      • Number of non-executed functions: 31
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtCreateKey calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • VT rate limit hit for: TECHNICAL SPECIFICATIONS.exe
                                      TimeTypeDescription
                                      17:35:55API Interceptor7743306x Sleep call for process: TECHNICAL SPECIFICATIONS.exe modified
                                      17:35:56API Interceptor9x Sleep call for process: powershell.exe modified
                                      17:36:09API Interceptor6638269x Sleep call for process: newapp.exe modified
                                      23:35:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                      23:36:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      192.254.225.136uLFOeGZaJS.exeGet hashmaliciousAgentTeslaBrowse
                                        RICHIESTA D'OFFERTA.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                          QUOTATION#09678.exeGet hashmaliciousAgentTeslaBrowse
                                            PURCHASE SPCIFICIATIONS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              LISTA DE COTIZACIONES.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                QUOTATION#5400.exeGet hashmaliciousAgentTeslaBrowse
                                                  QUOTATION#2800-QUANTUM MACTOOLS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    QUOTATION#2800-QUANTUM MACTOOLS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      2JHGWjmJ46.exeGet hashmaliciousAgentTeslaBrowse
                                                        COTIZACI#U00d3N#08673.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          104.26.12.205xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
                                                          • api.ipify.org/
                                                          GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
                                                          • api.ipify.org/
                                                          8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
                                                          • api.ipify.org/
                                                          Simple2.exeGet hashmaliciousUnknownBrowse
                                                          • api.ipify.org/
                                                          Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                                                          • api.ipify.org/
                                                          Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                          • api.ipify.org/
                                                          6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                                          • api.ipify.org/
                                                          perfcc.elfGet hashmaliciousXmrigBrowse
                                                          • api.ipify.org/
                                                          SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                                          • api.ipify.org/
                                                          SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                                          • api.ipify.org/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          api.ipify.orgShipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          980001672 PPR for 30887217.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          y1rS62yprs.exeGet hashmaliciousBabadedaBrowse
                                                          • 104.26.13.205
                                                          apilibx64.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                          • 104.26.12.205
                                                          xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
                                                          • 104.26.12.205
                                                          BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                                          • 104.26.13.205
                                                          lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                                          • 104.26.13.205
                                                          GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
                                                          • 104.26.12.205
                                                          8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
                                                          • 104.26.12.205
                                                          Simple1.exeGet hashmaliciousUnknownBrowse
                                                          • 172.67.74.152
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 172.67.165.166
                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 104.21.16.9
                                                          https://www.scribd.com/document/801519291/Advice-Notification#fullscreen&from_embedGet hashmaliciousHTMLPhisherBrowse
                                                          • 104.18.11.207
                                                          a9YMw44iQq.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                          • 172.67.19.24
                                                          nlGOh9K5X5.exeGet hashmaliciousXmrigBrowse
                                                          • 172.67.19.24
                                                          Fw Your flight has been cancelled.emlGet hashmaliciousUnknownBrowse
                                                          • 104.17.247.203
                                                          https://login.officeteam.didgim.com/factpath/resources/patch/047620476204762098/?tpj=PlKRhyZP6wwT3cO_YX5-vBD5GuXYTvvU?SehS24G3uU3qw64njI8IZH7gQJoi5rbp7C2uDZbPGel89LOXSbLkxzcBkcMiAnricyOgDlVZzgK16brTMbOGyuYoLIN4U0HH714JGet hashmaliciousReCaptcha PhishBrowse
                                                          • 104.16.124.96
                                                          Distribution Agreement -21_12_48-December 6, 2024-be1f31b3a4b24beb88d27adfd723203e.pdfGet hashmaliciousUnknownBrowse
                                                          • 1.1.1.1
                                                          Doc_21-04-53.jsGet hashmaliciousMatanbuchusBrowse
                                                          • 104.21.40.3
                                                          https://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousUnknownBrowse
                                                          • 104.21.16.114
                                                          UNIFIEDLAYER-AS-1UShttps://hujalconcretos.com/nppGet hashmaliciousUnknownBrowse
                                                          • 192.185.131.189
                                                          DHL_734825510.exeGet hashmaliciousFormBookBrowse
                                                          • 108.179.253.197
                                                          Shipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 192.254.186.165
                                                          #U25b6#Ufe0fPlayVoiceMessage9266.emlGet hashmaliciousUnknownBrowse
                                                          • 192.185.77.66
                                                          main_spc.elfGet hashmaliciousMiraiBrowse
                                                          • 173.254.73.204
                                                          https://track-004.blogspot.comGet hashmaliciousUnknownBrowse
                                                          • 50.87.184.136
                                                          https://www.dropbox.com/l/AADbLOqftgPkdsTWgBgFyNpmu-iGeYJGM4IGet hashmaliciousUnknownBrowse
                                                          • 192.254.190.193
                                                          aU1TV97585.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 162.241.62.63
                                                          0wxckB4Iba.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 50.87.144.157
                                                          8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 50.87.218.140
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          3b5074b1b5d032e5620f69f9f700ff0ea9YMw44iQq.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                          • 104.26.12.205
                                                          ozgpPwVAu1.exeGet hashmaliciousXWormBrowse
                                                          • 104.26.12.205
                                                          https://www.google.ca/url?q=1120091333775300779273902563687390256368&rct=11200913337753007792&sa=t&url=amp/s/elanpro.net/horeca/dispenc#YnJ1bml0YS5kdW5jYW5AcGFydG5lcnNtZ3UuY29tGet hashmaliciousHTMLPhisherBrowse
                                                          • 104.26.12.205
                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 104.26.12.205
                                                          BGM LAW GROUP - RFP 2024.pdfGet hashmaliciousUnknownBrowse
                                                          • 104.26.12.205
                                                          file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                          • 104.26.12.205
                                                          Shipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          https://app.droplet.io/form/K47rYNGet hashmaliciousUnknownBrowse
                                                          • 104.26.12.205
                                                          QUOTE_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                          • 104.26.12.205
                                                          QUOTE_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                          • 104.26.12.205
                                                          No context
                                                          Process:C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1216
                                                          Entropy (8bit):5.34331486778365
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                          Process:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1216
                                                          Entropy (8bit):5.34331486778365
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):1172
                                                          Entropy (8bit):5.355024937536926
                                                          Encrypted:false
                                                          SSDEEP:24:3OWSKco4KmZjKbm51s4RPT6moUebIKo+mZ9t7J0gt/NKIl9r+q:eWSU4xymI4RfoUeW+mZ9tK8ND3
                                                          MD5:4FF4EA0534E06DBD3B9C6078779177B5
                                                          SHA1:5DDA708CF64996323E26348C595E866596EE6F71
                                                          SHA-256:D02254F27E815DA15DC98673A240E97983532EC9C4740A6892925B5DE7560DAA
                                                          SHA-512:978C7DE1868842A0E66FC47B1009B841AC82F50954977D639E9CE6DD7F09A2272F8C9196CB4EE2260CBEEB5A99CD0A7C1C2CAB7552A45181B827120525E74E39
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:@...e................................................@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):1096704
                                                          Entropy (8bit):7.245281471012076
                                                          Encrypted:false
                                                          SSDEEP:12288:epZsSSGFEQeafqAJZABam0MKEFrDHtApfhXBtERZyzsk7CYv3X3uO:ezseeNAEBa/nCUhxSry7CYv3X3N
                                                          MD5:65FEEFE926EB3F734B6968B35C23ACB3
                                                          SHA1:8FADA228F4395476ABE8BDBE75ABFE8D7C6EF4EB
                                                          SHA-256:D1B068B826E3A9527CDDD09866886CABA895F390AF930A9B35C027EB1C2DB34C
                                                          SHA-512:CF8ABEE2981F5A27360B2CAA653AEA9D53272F69D432510B5AB62258094D5ED1EED27205A744A6135CE4B798E429E55FE3EDFA044A12D7D91FE2372239D59FA8
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 66%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4."...............0.............z;... ...@....@.. ....................................@.................................(;..O....@.............................. "..p............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc..............................@..B................\;......H........x..l.......7....~...............................................0.............o.....8.....o....t.......u.........,@..t......o....r...po....-..o....r...po....+......,....o.......+&.u...........,...t........o....(........o....:t......u........,...o......*...................0...........#........}.....#........}.....#........}.....#.....L.@}......}......}.....s....}.....s....}.....sG...}.....sM...}......}......}.....(.......(.......{....(.......{!...(.......{....(.......
                                                          Process:C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.245281471012076
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:TECHNICAL SPECIFICATIONS.exe
                                                          File size:1'096'704 bytes
                                                          MD5:65feefe926eb3f734b6968b35c23acb3
                                                          SHA1:8fada228f4395476abe8bdbe75abfe8d7c6ef4eb
                                                          SHA256:d1b068b826e3a9527cddd09866886caba895f390af930a9b35c027eb1c2db34c
                                                          SHA512:cf8abee2981f5a27360b2caa653aea9d53272f69d432510b5ab62258094d5ed1eed27205a744a6135ce4b798e429e55fe3edfa044a12d7d91fe2372239d59fa8
                                                          SSDEEP:12288:epZsSSGFEQeafqAJZABam0MKEFrDHtApfhXBtERZyzsk7CYv3X3uO:ezseeNAEBa/nCUhxSry7CYv3X3N
                                                          TLSH:E035073D29BD162BF175C6B78BEBE427F138886F3114AC6498D347A94346E4634C326E
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4."...............0.............z;... ...@....@.. ....................................@................................
                                                          Icon Hash:333333ab693b9b98
                                                          Entrypoint:0x4e3b7a
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0xF7228534 [Sun May 22 19:51:16 2101 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xe3b280x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xe40000x29a18.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x10e0000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xe22200x70.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000xe1b800xe1c004200651fbfc9ee4ab7a912126b63e373False0.7552861987818383data7.211152968650304IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0xe40000x29a180x29c00714aab8ddc4fe920520b190ee0f4da56False0.6747286676646707data7.095562079137227IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x10e0000xc0x200b6a7bc7ffd6bd9f095eea2d388600031False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0xe42200x10d8bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9989130907351854
                                                          RT_ICON0xf4fac0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.42335561339169525
                                                          RT_ICON0x1057d40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.5058455361360416
                                                          RT_ICON0x1099fc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.5346473029045643
                                                          RT_ICON0x10bfa40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.6055347091932458
                                                          RT_ICON0x10d04c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.7225177304964538
                                                          RT_GROUP_ICON0x10d4b40x5aTarga image data - Map 65536 x 3467 x 10.7333333333333333
                                                          RT_VERSION0x10d5100x31cdata0.43844221105527637
                                                          RT_MANIFEST0x10d82c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 6, 2024 23:35:57.673979044 CET49707443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:35:57.674030066 CET44349707104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:35:57.674104929 CET49707443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:35:57.681401968 CET49707443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:35:57.681418896 CET44349707104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:35:58.905495882 CET44349707104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:35:58.905714989 CET49707443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:35:58.909634113 CET49707443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:35:58.909645081 CET44349707104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:35:58.909935951 CET44349707104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:35:58.955223083 CET49707443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:35:58.999340057 CET44349707104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:35:59.346889019 CET44349707104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:35:59.346946001 CET44349707104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:35:59.347424984 CET49707443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:35:59.354918957 CET49707443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:00.728358984 CET4970921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:00.848273993 CET2149709192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:00.848355055 CET4970921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:00.852031946 CET4970921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:00.886213064 CET4971021192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:00.972145081 CET2149709192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:00.972223997 CET4970921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.006196976 CET2149710192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:01.006298065 CET4971021192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.006678104 CET4971021192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.009130001 CET4971121192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.126842976 CET2149710192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:01.126909971 CET4971021192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.129195929 CET2149711192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:01.129282951 CET4971121192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.129512072 CET4971121192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.131228924 CET4971221192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.249721050 CET2149711192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:01.249792099 CET4971121192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.250997066 CET2149712192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:01.251079082 CET4971221192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.251399040 CET4971221192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:01.371771097 CET2149712192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:01.371839046 CET4971221192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:10.261471987 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:10.261526108 CET44349714104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:10.261609077 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:10.264657974 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:10.264671087 CET44349714104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:11.479096889 CET44349714104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:11.479362011 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:11.492018938 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:11.492034912 CET44349714104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:11.492228031 CET44349714104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:11.556608915 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:11.861814976 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:11.907331944 CET44349714104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:12.187927008 CET44349714104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:12.187995911 CET44349714104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:12.188052893 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:12.190810919 CET49714443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:12.749927044 CET4971621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:12.869736910 CET2149716192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:12.869834900 CET4971621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:12.871603012 CET4971621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:12.900700092 CET4971821192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:12.991385937 CET2149716192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:12.991450071 CET4971621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.021578074 CET2149718192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:13.021648884 CET4971821192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.021908998 CET4971821192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.023273945 CET4971921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.141694069 CET2149718192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:13.141765118 CET2149718192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:13.141936064 CET4971821192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.143023014 CET2149719192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:13.143140078 CET4971921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.143400908 CET4971921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.144932985 CET4972021192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.264826059 CET2149720192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:13.264838934 CET2149719192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:13.264925957 CET4972021192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.264957905 CET4971921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.265155077 CET4972021192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:13.385334969 CET2149720192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:13.385421991 CET4972021192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:18.584037066 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:18.584091902 CET44349730104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:18.584260941 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:18.587124109 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:18.587152004 CET44349730104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:19.797250032 CET44349730104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:19.797355890 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:19.800555944 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:19.800570011 CET44349730104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:19.800808907 CET44349730104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:19.846246958 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:19.849814892 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:19.891334057 CET44349730104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:20.244281054 CET44349730104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:20.244345903 CET44349730104.26.12.205192.168.2.5
                                                          Dec 6, 2024 23:36:20.244388103 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:20.247693062 CET49730443192.168.2.5104.26.12.205
                                                          Dec 6, 2024 23:36:20.795828104 CET4973621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:20.915585041 CET2149736192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:20.915678024 CET4973621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:20.917264938 CET4973621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:20.941431046 CET4973721192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.037013054 CET2149736192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:21.037111044 CET4973621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.061091900 CET2149737192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:21.061220884 CET4973721192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.061398029 CET4973721192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.062974930 CET4973821192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.181337118 CET2149737192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:21.181538105 CET4973721192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.182774067 CET2149738192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:21.182904005 CET4973821192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.183274984 CET4973821192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.184283018 CET4973921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.303242922 CET2149738192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:21.303992033 CET2149739192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:21.304073095 CET4973921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.304075003 CET4973821192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.305116892 CET4973921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:36:21.424822092 CET2149739192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:36:21.424922943 CET4973921192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:37:37.795244932 CET4990621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:37:37.915024042 CET2149906192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:37:37.915116072 CET4990621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:37:37.915328979 CET4990621192.168.2.5192.254.225.136
                                                          Dec 6, 2024 23:37:38.035274029 CET2149906192.254.225.136192.168.2.5
                                                          Dec 6, 2024 23:37:38.035330057 CET4990621192.168.2.5192.254.225.136
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 6, 2024 23:35:56.890068054 CET5000353192.168.2.51.1.1.1
                                                          Dec 6, 2024 23:35:57.029311895 CET53500031.1.1.1192.168.2.5
                                                          Dec 6, 2024 23:35:59.913775921 CET5246753192.168.2.51.1.1.1
                                                          Dec 6, 2024 23:36:00.726567984 CET53524671.1.1.1192.168.2.5
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Dec 6, 2024 23:35:56.890068054 CET192.168.2.51.1.1.10x2a08Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                          Dec 6, 2024 23:35:59.913775921 CET192.168.2.51.1.1.10xc4dbStandard query (0)ftp.ercolina-usa.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Dec 6, 2024 23:35:57.029311895 CET1.1.1.1192.168.2.50x2a08No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                          Dec 6, 2024 23:35:57.029311895 CET1.1.1.1192.168.2.50x2a08No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                          Dec 6, 2024 23:35:57.029311895 CET1.1.1.1192.168.2.50x2a08No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                          Dec 6, 2024 23:36:00.726567984 CET1.1.1.1192.168.2.50xc4dbNo error (0)ftp.ercolina-usa.comercolina-usa.comCNAME (Canonical name)IN (0x0001)false
                                                          Dec 6, 2024 23:36:00.726567984 CET1.1.1.1192.168.2.50xc4dbNo error (0)ercolina-usa.com192.254.225.136A (IP address)IN (0x0001)false
                                                          • api.ipify.org
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.549707104.26.12.2054435960C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-06 22:35:58 UTC155OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                          Host: api.ipify.org
                                                          Connection: Keep-Alive
                                                          2024-12-06 22:35:59 UTC424INHTTP/1.1 200 OK
                                                          Date: Fri, 06 Dec 2024 22:35:59 GMT
                                                          Content-Type: text/plain
                                                          Content-Length: 12
                                                          Connection: close
                                                          Vary: Origin
                                                          cf-cache-status: DYNAMIC
                                                          Server: cloudflare
                                                          CF-RAY: 8edfc08edefb0f3a-EWR
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1690&min_rtt=1690&rtt_var=634&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2821&recv_bytes=769&delivery_rate=1723730&cwnd=164&unsent_bytes=0&cid=c290f49c1eb91675&ts=453&x=0"
                                                          2024-12-06 22:35:59 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                          Data Ascii: 8.46.123.228


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.549714104.26.12.2054437576C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-06 22:36:11 UTC155OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                          Host: api.ipify.org
                                                          Connection: Keep-Alive
                                                          2024-12-06 22:36:12 UTC424INHTTP/1.1 200 OK
                                                          Date: Fri, 06 Dec 2024 22:36:12 GMT
                                                          Content-Type: text/plain
                                                          Content-Length: 12
                                                          Connection: close
                                                          Vary: Origin
                                                          cf-cache-status: DYNAMIC
                                                          Server: cloudflare
                                                          CF-RAY: 8edfc0df1bde78e7-EWR
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1991&min_rtt=1980&rtt_var=764&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1411309&cwnd=234&unsent_bytes=0&cid=eee5c4b7b56858e3&ts=712&x=0"
                                                          2024-12-06 22:36:12 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                          Data Ascii: 8.46.123.228


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.549730104.26.12.2054437944C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-06 22:36:19 UTC155OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                          Host: api.ipify.org
                                                          Connection: Keep-Alive
                                                          2024-12-06 22:36:20 UTC424INHTTP/1.1 200 OK
                                                          Date: Fri, 06 Dec 2024 22:36:20 GMT
                                                          Content-Type: text/plain
                                                          Content-Length: 12
                                                          Connection: close
                                                          Vary: Origin
                                                          cf-cache-status: DYNAMIC
                                                          Server: cloudflare
                                                          CF-RAY: 8edfc1117e1f42a5-EWR
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1699&min_rtt=1692&rtt_var=650&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1664766&cwnd=229&unsent_bytes=0&cid=ddf18da861f1b701&ts=451&x=0"
                                                          2024-12-06 22:36:20 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                          Data Ascii: 8.46.123.228


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:17:35:54
                                                          Start date:06/12/2024
                                                          Path:C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"
                                                          Imagebase:0x180000
                                                          File size:1'096'704 bytes
                                                          MD5 hash:65FEEFE926EB3F734B6968B35C23ACB3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2050105688.0000000003698000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:17:35:55
                                                          Start date:06/12/2024
                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"
                                                          Imagebase:0x5b0000
                                                          File size:433'152 bytes
                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:17:35:55
                                                          Start date:06/12/2024
                                                          Path:C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\TECHNICAL SPECIFICATIONS.exe"
                                                          Imagebase:0xd10000
                                                          File size:1'096'704 bytes
                                                          MD5 hash:65FEEFE926EB3F734B6968B35C23ACB3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4473961578.000000000324C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4473961578.0000000003221000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4473961578.0000000003221000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:5
                                                          Start time:17:35:55
                                                          Start date:06/12/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:17:36:08
                                                          Start date:06/12/2024
                                                          Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                          Imagebase:0xe10000
                                                          File size:1'096'704 bytes
                                                          MD5 hash:65FEEFE926EB3F734B6968B35C23ACB3
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2190802680.0000000004265000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2190802680.00000000042E5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 66%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:17:36:09
                                                          Start date:06/12/2024
                                                          Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                          Imagebase:0xb40000
                                                          File size:1'096'704 bytes
                                                          MD5 hash:65FEEFE926EB3F734B6968B35C23ACB3
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2254086095.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2254086095.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2254086095.00000000030FC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2249780738.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:17:36:16
                                                          Start date:06/12/2024
                                                          Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                          Imagebase:0xe20000
                                                          File size:1'096'704 bytes
                                                          MD5 hash:65FEEFE926EB3F734B6968B35C23ACB3
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2288305225.0000000004385000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:17:36:17
                                                          Start date:06/12/2024
                                                          Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                          Imagebase:0xa50000
                                                          File size:1'096'704 bytes
                                                          MD5 hash:65FEEFE926EB3F734B6968B35C23ACB3
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.4473839350.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.4473839350.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.4473839350.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:11.3%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:4.1%
                                                            Total number of Nodes:197
                                                            Total number of Limit Nodes:18
                                                            execution_graph 38267 7c00de0 38268 7c00de7 38267->38268 38269 7c00eb0 38268->38269 38273 7c01398 38268->38273 38277 7c01388 38268->38277 38270 7c00e85 38276 7c013ac 38273->38276 38274 7c016ff GetCurrentThreadId 38275 7c013bc 38274->38275 38275->38270 38276->38274 38276->38275 38278 7c0138b 38277->38278 38279 7c016ff GetCurrentThreadId 38278->38279 38280 7c013bc 38278->38280 38279->38280 38280->38270 38261 c1d810 DuplicateHandle 38262 c1d8a6 38261->38262 38488 c1ae30 38489 c1ae3f 38488->38489 38491 c1af27 38488->38491 38492 c1af5c 38491->38492 38493 c1af39 38491->38493 38492->38489 38493->38492 38494 c1b160 GetModuleHandleW 38493->38494 38495 c1b18d 38494->38495 38495->38489 38241 bb411f0 38242 bb4137b 38241->38242 38243 bb41216 38241->38243 38243->38242 38246 bb41470 PostMessageW 38243->38246 38248 bb41468 38243->38248 38247 bb414dc 38246->38247 38247->38243 38249 bb41470 PostMessageW 38248->38249 38250 bb414dc 38249->38250 38250->38243 38263 7c05d58 38264 7c05da6 DrawTextExW 38263->38264 38266 7c05dfe 38264->38266 38251 c1d5c8 38252 c1d60e GetCurrentProcess 38251->38252 38254 c1d660 GetCurrentThread 38252->38254 38255 c1d659 38252->38255 38256 c1d696 38254->38256 38257 c1d69d GetCurrentProcess 38254->38257 38255->38254 38256->38257 38260 c1d6d3 38257->38260 38258 c1d6fb GetCurrentThreadId 38259 c1d72c 38258->38259 38260->38258 38281 c14668 38282 c1467a 38281->38282 38283 c14686 38282->38283 38285 c14779 38282->38285 38286 c1479d 38285->38286 38290 c14888 38286->38290 38294 c14878 38286->38294 38291 c148af 38290->38291 38292 c1498c 38291->38292 38298 c1449c 38291->38298 38295 c14888 38294->38295 38296 c1449c CreateActCtxA 38295->38296 38297 c1498c 38295->38297 38296->38297 38299 c15918 CreateActCtxA 38298->38299 38301 c159db 38299->38301 38301->38301 38302 8e8e6c2 38303 8e8e6cc 38302->38303 38304 8e8e90d 38302->38304 38307 8e8fe80 38303->38307 38311 8e8fe90 38303->38311 38308 8e8fea5 38307->38308 38315 8e8fec0 38308->38315 38309 8e8feb7 38309->38304 38312 8e8fea5 38311->38312 38314 8e8fec0 12 API calls 38312->38314 38313 8e8feb7 38313->38304 38314->38313 38316 8e8fec6 38315->38316 38317 8e8fef2 38316->38317 38336 bb40534 38316->38336 38341 bb405af 38316->38341 38349 bb4050d 38316->38349 38354 bb407ed 38316->38354 38359 bb40ac3 38316->38359 38364 bb40320 38316->38364 38369 bb40cc0 38316->38369 38374 bb40647 38316->38374 38379 bb405e6 38316->38379 38384 bb409e5 38316->38384 38388 bb40838 38316->38388 38397 bb4041f 38316->38397 38402 bb4089f 38316->38402 38412 bb4081d 38316->38412 38416 bb40631 38316->38416 38420 bb40610 38316->38420 38425 bb40330 38316->38425 38430 bb406d5 38316->38430 38317->38309 38337 bb4053a 38336->38337 38440 8e8dbe8 38337->38440 38444 8e8dbf0 38337->38444 38338 bb40cf2 38342 bb405d2 38341->38342 38344 bb405e8 38342->38344 38448 8e8daf8 38342->38448 38452 8e8db00 38342->38452 38343 bb40519 38343->38344 38456 8e8da38 38343->38456 38460 8e8da40 38343->38460 38350 bb40519 38349->38350 38351 bb405e8 38350->38351 38352 8e8da38 VirtualAllocEx 38350->38352 38353 8e8da40 VirtualAllocEx 38350->38353 38352->38350 38353->38350 38355 bb40519 38354->38355 38355->38354 38356 bb405e8 38355->38356 38357 8e8da38 VirtualAllocEx 38355->38357 38358 8e8da40 VirtualAllocEx 38355->38358 38357->38355 38358->38355 38360 bb40552 38359->38360 38362 8e8dbe8 ReadProcessMemory 38360->38362 38363 8e8dbf0 ReadProcessMemory 38360->38363 38361 bb40cf2 38362->38361 38363->38361 38365 bb40330 38364->38365 38366 bb40432 38365->38366 38464 8e8e17c 38365->38464 38468 8e8e188 38365->38468 38366->38317 38370 bb40ccf 38369->38370 38371 bb40cf2 38370->38371 38372 8e8dbe8 ReadProcessMemory 38370->38372 38373 8e8dbf0 ReadProcessMemory 38370->38373 38371->38371 38372->38371 38373->38371 38375 bb4064e 38374->38375 38377 8e8daf8 WriteProcessMemory 38375->38377 38378 8e8db00 WriteProcessMemory 38375->38378 38376 bb4074a 38377->38376 38378->38376 38380 bb4064b 38379->38380 38382 8e8daf8 WriteProcessMemory 38380->38382 38383 8e8db00 WriteProcessMemory 38380->38383 38381 bb4074a 38382->38381 38383->38381 38472 8e8d528 38384->38472 38476 8e8d530 38384->38476 38385 bb409ff 38389 bb40857 38388->38389 38392 bb40983 38388->38392 38395 8e8d528 Wow64SetThreadContext 38389->38395 38396 8e8d530 Wow64SetThreadContext 38389->38396 38390 bb40d96 38391 bb40abd 38391->38317 38392->38391 38480 8e8d478 38392->38480 38484 8e8d480 38392->38484 38395->38390 38396->38390 38398 bb403f8 38397->38398 38399 bb40432 38398->38399 38400 8e8e188 CreateProcessA 38398->38400 38401 8e8e17c CreateProcessA 38398->38401 38399->38317 38400->38399 38401->38399 38403 bb406d5 38402->38403 38404 bb40857 38402->38404 38403->38404 38407 bb40983 38403->38407 38410 8e8d528 Wow64SetThreadContext 38404->38410 38411 8e8d530 Wow64SetThreadContext 38404->38411 38405 bb40d96 38406 bb40abd 38406->38317 38407->38406 38408 8e8d478 ResumeThread 38407->38408 38409 8e8d480 ResumeThread 38407->38409 38408->38407 38409->38407 38410->38405 38411->38405 38413 bb40823 38412->38413 38414 8e8d478 ResumeThread 38413->38414 38415 8e8d480 ResumeThread 38413->38415 38414->38413 38415->38413 38417 bb40c06 38416->38417 38418 8e8d478 ResumeThread 38417->38418 38419 8e8d480 ResumeThread 38417->38419 38418->38417 38419->38417 38421 bb407bc 38420->38421 38423 8e8daf8 WriteProcessMemory 38421->38423 38424 8e8db00 WriteProcessMemory 38421->38424 38422 bb40d5c 38423->38422 38424->38422 38426 bb40363 38425->38426 38427 bb40432 38426->38427 38428 8e8e188 CreateProcessA 38426->38428 38429 8e8e17c CreateProcessA 38426->38429 38427->38317 38428->38427 38429->38427 38431 bb406ea 38430->38431 38432 bb40857 38431->38432 38435 bb40983 38431->38435 38438 8e8d528 Wow64SetThreadContext 38432->38438 38439 8e8d530 Wow64SetThreadContext 38432->38439 38433 bb40d96 38434 bb40abd 38434->38317 38435->38434 38436 8e8d478 ResumeThread 38435->38436 38437 8e8d480 ResumeThread 38435->38437 38436->38435 38437->38435 38438->38433 38439->38433 38441 8e8dbf0 ReadProcessMemory 38440->38441 38443 8e8dc7f 38441->38443 38443->38338 38445 8e8dc3b ReadProcessMemory 38444->38445 38447 8e8dc7f 38445->38447 38447->38338 38449 8e8db00 WriteProcessMemory 38448->38449 38451 8e8db9f 38449->38451 38451->38343 38453 8e8db48 WriteProcessMemory 38452->38453 38455 8e8db9f 38453->38455 38455->38343 38457 8e8da40 VirtualAllocEx 38456->38457 38459 8e8dabd 38457->38459 38459->38343 38461 8e8da80 VirtualAllocEx 38460->38461 38463 8e8dabd 38461->38463 38463->38343 38465 8e8e182 CreateProcessA 38464->38465 38467 8e8e3d3 38465->38467 38469 8e8e211 CreateProcessA 38468->38469 38471 8e8e3d3 38469->38471 38473 8e8d52e Wow64SetThreadContext 38472->38473 38475 8e8d5bd 38473->38475 38475->38385 38477 8e8d560 Wow64SetThreadContext 38476->38477 38479 8e8d5bd 38477->38479 38479->38385 38481 8e8d4c0 ResumeThread 38480->38481 38483 8e8d4f1 38481->38483 38483->38392 38485 8e8d4c0 ResumeThread 38484->38485 38487 8e8d4f1 38485->38487 38487->38392
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2054352856.000000000BB40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_bb40000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f1c29dced5810eba31bdde81924e4ebeadae947c7919de544cc9d651a07d6e5
                                                            • Instruction ID: 9ac1f2ee4642003f56f6aaa062953bd5474b2569f210795bd746ddc707c86666
                                                            • Opcode Fuzzy Hash: 5f1c29dced5810eba31bdde81924e4ebeadae947c7919de544cc9d651a07d6e5
                                                            • Instruction Fuzzy Hash: 55711671E45229CBDB68DF6AC8407E9BBB6BF89300F10C1EAC51CA6250EB741A85DF40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f131ab20df42537c9fd697559d5805af4721f099b3ac9e193faae982590ae502
                                                            • Instruction ID: fc1211ede0a71528c8d585bc3d68a05f7bd6f464a7f34d1d8305f9220e9d8728
                                                            • Opcode Fuzzy Hash: f131ab20df42537c9fd697559d5805af4721f099b3ac9e193faae982590ae502
                                                            • Instruction Fuzzy Hash: 9E410572D04219CBDB14DFAAC8406EEFBF6AF89311F14D46AD40D7B251DB3429498F90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2054352856.000000000BB40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_bb40000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0feedae39536bba2beefe20bce0723bbf0b7ff6f1c2f7bfeac7127ca3a59e890
                                                            • Instruction ID: ec38152ed20db9d747a0d5a91acae5f4afaf8508bb537ae8a097540d4dfd9913
                                                            • Opcode Fuzzy Hash: 0feedae39536bba2beefe20bce0723bbf0b7ff6f1c2f7bfeac7127ca3a59e890
                                                            • Instruction Fuzzy Hash: 10F01279D4D258DBCB10EB94A8401FCB7B8BB4B755F4430D2CA1DA7702D3304A845F55
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2054352856.000000000BB40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_bb40000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 681e6aeffaadb2d16eae986320dfa46fc651f5da7b4f8bf4e784be8925d7cdde
                                                            • Instruction ID: 61cd8524d13d7ccb13e89eb93bcd3cd1f603f7aa9a62228890d03bacffc961fe
                                                            • Opcode Fuzzy Hash: 681e6aeffaadb2d16eae986320dfa46fc651f5da7b4f8bf4e784be8925d7cdde
                                                            • Instruction Fuzzy Hash: A6E0B639D4D198CBCB50EF94E8445FCB7B8BB8AB12F4030E1CA2EA7311D7309994AE01

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 615 c1d5b9-c1d657 GetCurrentProcess 619 c1d660-c1d694 GetCurrentThread 615->619 620 c1d659-c1d65f 615->620 621 c1d696-c1d69c 619->621 622 c1d69d-c1d6d1 GetCurrentProcess 619->622 620->619 621->622 623 c1d6d3-c1d6d9 622->623 624 c1d6da-c1d6f5 call c1d797 622->624 623->624 628 c1d6fb-c1d72a GetCurrentThreadId 624->628 629 c1d733-c1d795 628->629 630 c1d72c-c1d732 628->630 630->629
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 00C1D646
                                                            • GetCurrentThread.KERNEL32 ref: 00C1D683
                                                            • GetCurrentProcess.KERNEL32 ref: 00C1D6C0
                                                            • GetCurrentThreadId.KERNEL32 ref: 00C1D719
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: b92a77d1fe5e501c288477c45ce575067b68933b96bc73b7f0070e614658655a
                                                            • Instruction ID: e4ab0608357e707d63308f85018a44adbb9fa9fb6090dacf3d4980bf3c1792ca
                                                            • Opcode Fuzzy Hash: b92a77d1fe5e501c288477c45ce575067b68933b96bc73b7f0070e614658655a
                                                            • Instruction Fuzzy Hash: 6F5166B0900349CFDB14DFAAE548BDEBBF1EF89304F208459E419A73A0C7755985CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 637 c1d5c8-c1d657 GetCurrentProcess 641 c1d660-c1d694 GetCurrentThread 637->641 642 c1d659-c1d65f 637->642 643 c1d696-c1d69c 641->643 644 c1d69d-c1d6d1 GetCurrentProcess 641->644 642->641 643->644 645 c1d6d3-c1d6d9 644->645 646 c1d6da-c1d6f5 call c1d797 644->646 645->646 650 c1d6fb-c1d72a GetCurrentThreadId 646->650 651 c1d733-c1d795 650->651 652 c1d72c-c1d732 650->652 652->651
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 00C1D646
                                                            • GetCurrentThread.KERNEL32 ref: 00C1D683
                                                            • GetCurrentProcess.KERNEL32 ref: 00C1D6C0
                                                            • GetCurrentThreadId.KERNEL32 ref: 00C1D719
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 3d732bd335d0866512b8f065ae579fc77c9834136f5845e57dbdff3084b4a95a
                                                            • Instruction ID: d26ac307b1f9750aaf99bf1482bc7f63cab6378e5dab39d5de6c4d6a59ad7e64
                                                            • Opcode Fuzzy Hash: 3d732bd335d0866512b8f065ae579fc77c9834136f5845e57dbdff3084b4a95a
                                                            • Instruction Fuzzy Hash: 6E5166B09003098FDB14DFAAD548BDEBBF1EF88304F208459E419A7360D7756985CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 659 7c01398-7c013ba 661 7c013c3-7c013cd 659->661 662 7c013bc-7c013c2 659->662 664 7c013d3-7c013ec 661->664 665 7c01609-7c01635 661->665 670 7c013f2-7c01414 664->670 671 7c0163c-7c01671 664->671 665->671 678 7c01425-7c01434 670->678 679 7c01416-7c01424 670->679 689 7c01673-7c0168d 671->689 690 7c01694-7c01699 671->690 683 7c01436-7c01453 678->683 684 7c01459-7c0147a 678->684 683->684 695 7c014ca-7c014f2 684->695 696 7c0147c-7c0148d 684->696 692 7c0169b-7c016b5 690->692 693 7c016bc-7c016e8 690->693 692->693 698 7c016ea-7c016fd 693->698 699 7c016ff-7c01725 GetCurrentThreadId 693->699 728 7c014f5 call 7c018d0 695->728 729 7c014f5 call 7c018cf 695->729 704 7c014bc-7c014c0 696->704 705 7c0148f-7c014a7 call 7c00f84 696->705 707 7c01735-7c01742 698->707 702 7c01727-7c0172d 699->702 703 7c0172e 699->703 702->703 703->707 704->695 716 7c014a9-7c014aa 705->716 717 7c014ac-7c014ba 705->717 713 7c014f8-7c0151d 719 7c01563 713->719 720 7c0151f-7c01534 713->720 716->717 717->704 717->705 719->665 720->719 723 7c01536-7c01559 720->723 723->719 727 7c0155b 723->727 727->719 728->713 729->713
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053369550.0000000007C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7c00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Haq$Haq
                                                            • API String ID: 0-4016896955
                                                            • Opcode ID: 847fb59b86db4408068a06efa76b44062bd881b2ddb67d1a7fa1740b1cc6bfe9
                                                            • Instruction ID: c97723b07f5ca7ed55d30030883dbb8e65cc1bdb425a49a196071fda5643ae36
                                                            • Opcode Fuzzy Hash: 847fb59b86db4408068a06efa76b44062bd881b2ddb67d1a7fa1740b1cc6bfe9
                                                            • Instruction Fuzzy Hash: BD917174A002198FCB14DFA9C595AADB7F2FF89310F2440A9E405AB3A1DB35ED45CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 847 8e8e17c-8e8e21d 851 8e8e21f-8e8e229 847->851 852 8e8e256-8e8e276 847->852 851->852 853 8e8e22b-8e8e22d 851->853 859 8e8e278-8e8e282 852->859 860 8e8e2af-8e8e2de 852->860 854 8e8e22f-8e8e239 853->854 855 8e8e250-8e8e253 853->855 857 8e8e23b 854->857 858 8e8e23d-8e8e24c 854->858 855->852 857->858 858->858 861 8e8e24e 858->861 859->860 862 8e8e284-8e8e286 859->862 866 8e8e2e0-8e8e2ea 860->866 867 8e8e317-8e8e3d1 CreateProcessA 860->867 861->855 864 8e8e288-8e8e292 862->864 865 8e8e2a9-8e8e2ac 862->865 868 8e8e294 864->868 869 8e8e296-8e8e2a5 864->869 865->860 866->867 870 8e8e2ec-8e8e2ee 866->870 880 8e8e3da-8e8e460 867->880 881 8e8e3d3-8e8e3d9 867->881 868->869 869->869 871 8e8e2a7 869->871 872 8e8e2f0-8e8e2fa 870->872 873 8e8e311-8e8e314 870->873 871->865 875 8e8e2fc 872->875 876 8e8e2fe-8e8e30d 872->876 873->867 875->876 876->876 877 8e8e30f 876->877 877->873 891 8e8e470-8e8e474 880->891 892 8e8e462-8e8e466 880->892 881->880 894 8e8e484-8e8e488 891->894 895 8e8e476-8e8e47a 891->895 892->891 893 8e8e468 892->893 893->891 897 8e8e498-8e8e49c 894->897 898 8e8e48a-8e8e48e 894->898 895->894 896 8e8e47c 895->896 896->894 899 8e8e4ae-8e8e4b5 897->899 900 8e8e49e-8e8e4a4 897->900 898->897 901 8e8e490 898->901 902 8e8e4cc 899->902 903 8e8e4b7-8e8e4c6 899->903 900->899 901->897 905 8e8e4cd 902->905 903->902 905->905
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08E8E3BE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 094c26807884f22314f8a25e3ec28e32ce99d951719b4a2274a528702f7f79b1
                                                            • Instruction ID: 04a6b696335fc0821fcea2599a2a1328e56e2f0a374bcbe5c1ebda9dc45b1c35
                                                            • Opcode Fuzzy Hash: 094c26807884f22314f8a25e3ec28e32ce99d951719b4a2274a528702f7f79b1
                                                            • Instruction Fuzzy Hash: 3AA17E72D0021ACFEB24DFA8C8417DDBBB2BF49315F148569E81DA7280DB749985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 906 8e8e188-8e8e21d 908 8e8e21f-8e8e229 906->908 909 8e8e256-8e8e276 906->909 908->909 910 8e8e22b-8e8e22d 908->910 916 8e8e278-8e8e282 909->916 917 8e8e2af-8e8e2de 909->917 911 8e8e22f-8e8e239 910->911 912 8e8e250-8e8e253 910->912 914 8e8e23b 911->914 915 8e8e23d-8e8e24c 911->915 912->909 914->915 915->915 918 8e8e24e 915->918 916->917 919 8e8e284-8e8e286 916->919 923 8e8e2e0-8e8e2ea 917->923 924 8e8e317-8e8e3d1 CreateProcessA 917->924 918->912 921 8e8e288-8e8e292 919->921 922 8e8e2a9-8e8e2ac 919->922 925 8e8e294 921->925 926 8e8e296-8e8e2a5 921->926 922->917 923->924 927 8e8e2ec-8e8e2ee 923->927 937 8e8e3da-8e8e460 924->937 938 8e8e3d3-8e8e3d9 924->938 925->926 926->926 928 8e8e2a7 926->928 929 8e8e2f0-8e8e2fa 927->929 930 8e8e311-8e8e314 927->930 928->922 932 8e8e2fc 929->932 933 8e8e2fe-8e8e30d 929->933 930->924 932->933 933->933 934 8e8e30f 933->934 934->930 948 8e8e470-8e8e474 937->948 949 8e8e462-8e8e466 937->949 938->937 951 8e8e484-8e8e488 948->951 952 8e8e476-8e8e47a 948->952 949->948 950 8e8e468 949->950 950->948 954 8e8e498-8e8e49c 951->954 955 8e8e48a-8e8e48e 951->955 952->951 953 8e8e47c 952->953 953->951 956 8e8e4ae-8e8e4b5 954->956 957 8e8e49e-8e8e4a4 954->957 955->954 958 8e8e490 955->958 959 8e8e4cc 956->959 960 8e8e4b7-8e8e4c6 956->960 957->956 958->954 962 8e8e4cd 959->962 960->959 962->962
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08E8E3BE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: a25b52fa459291c7ab5e84ac5aba7b0024f7c3a52a3b196e340b18eac2ab1280
                                                            • Instruction ID: 40781eb7bbd0c0da568eee8e7f39976e419886ae45aee037cab88c4d164b90fa
                                                            • Opcode Fuzzy Hash: a25b52fa459291c7ab5e84ac5aba7b0024f7c3a52a3b196e340b18eac2ab1280
                                                            • Instruction Fuzzy Hash: C0917E72D0021ACFEB24DFA8C8417DDBBB2BF49315F148569E80DA7240DB749985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 963 c1af27-c1af37 964 c1af63-c1af67 963->964 965 c1af39-c1af46 call c198a0 963->965 967 c1af69-c1af73 964->967 968 c1af7b-c1afbc 964->968 971 c1af48 965->971 972 c1af5c 965->972 967->968 974 c1afc9-c1afd7 968->974 975 c1afbe-c1afc6 968->975 1018 c1af4e call c1b1c0 971->1018 1019 c1af4e call c1b1b0 971->1019 972->964 976 c1afd9-c1afde 974->976 977 c1affb-c1affd 974->977 975->974 979 c1afe0-c1afe7 call c1a270 976->979 980 c1afe9 976->980 982 c1b000-c1b007 977->982 978 c1af54-c1af56 978->972 981 c1b098-c1b158 978->981 984 c1afeb-c1aff9 979->984 980->984 1013 c1b160-c1b18b GetModuleHandleW 981->1013 1014 c1b15a-c1b15d 981->1014 985 c1b014-c1b01b 982->985 986 c1b009-c1b011 982->986 984->982 987 c1b028-c1b031 call c1a280 985->987 988 c1b01d-c1b025 985->988 986->985 994 c1b033-c1b03b 987->994 995 c1b03e-c1b043 987->995 988->987 994->995 996 c1b061-c1b06e 995->996 997 c1b045-c1b04c 995->997 1004 c1b091-c1b097 996->1004 1005 c1b070-c1b08e 996->1005 997->996 999 c1b04e-c1b05e call c1a290 call c1a2a0 997->999 999->996 1005->1004 1015 c1b194-c1b1a8 1013->1015 1016 c1b18d-c1b193 1013->1016 1014->1013 1016->1015 1018->978 1019->978
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00C1B17E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 600e704b86d404b3aad2bd80f9ec54da90f381bc8cd7f9f2472e095fd533433d
                                                            • Instruction ID: 529d711c1ce04b9434c1f0d28d1826d1fc07983f3a82b747b73cdc2ed2a42579
                                                            • Opcode Fuzzy Hash: 600e704b86d404b3aad2bd80f9ec54da90f381bc8cd7f9f2472e095fd533433d
                                                            • Instruction Fuzzy Hash: AB7145B0A00B058FD724CF69C04179ABBF1FF89300F108A2DE49AD7A50D775E98ADB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1020 7c05cc1-7c05ccd 1021 7c05d47-7c05da4 1020->1021 1022 7c05ccf-7c05d0e 1020->1022 1024 7c05da6-7c05dac 1021->1024 1025 7c05daf-7c05dbe 1021->1025 1024->1025 1026 7c05dc0 1025->1026 1027 7c05dc3-7c05dfc DrawTextExW 1025->1027 1026->1027 1028 7c05e05-7c05e22 1027->1028 1029 7c05dfe-7c05e04 1027->1029 1029->1028
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07C05DEF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053369550.0000000007C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7c00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: a85a71d874e9e75c2aa148b304cb63ce86e8f16788de42851258f94a8d76ec8a
                                                            • Instruction ID: 222feac2944a57698ac22bfc4a6460872642ed6b952764f39aac4765e7a8e2d1
                                                            • Opcode Fuzzy Hash: a85a71d874e9e75c2aa148b304cb63ce86e8f16788de42851258f94a8d76ec8a
                                                            • Instruction Fuzzy Hash: 1B4178B5D0438A8FCB01CFA9D884ADEBFB4EF49320F14815AE424A7291D730A655CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1033 c1590c-c15916 1034 c15918-c159d9 CreateActCtxA 1033->1034 1036 c159e2-c15a3c 1034->1036 1037 c159db-c159e1 1034->1037 1044 c15a4b-c15a4f 1036->1044 1045 c15a3e-c15a41 1036->1045 1037->1036 1046 c15a51-c15a5d 1044->1046 1047 c15a60 1044->1047 1045->1044 1046->1047 1049 c15a61 1047->1049 1049->1049
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 00C159C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 143f792f0147011f8c6f6c643f24996ec4fcec2c85297656cc555d5993698fd9
                                                            • Instruction ID: 7822d8a77e17eaffb1c559831605d8d849c0eb7db0cba09a5fd09a9e95098994
                                                            • Opcode Fuzzy Hash: 143f792f0147011f8c6f6c643f24996ec4fcec2c85297656cc555d5993698fd9
                                                            • Instruction Fuzzy Hash: D941E1B0D00719CBDB24CFA9C884BDDBBB5BF89304F20815AD408AB251DB75698ACF91
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 00C159C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 0fac64c9cf5fbedfe13c517bcd97d6a681646c61996200243ba4e34737d3f65e
                                                            • Instruction ID: ed3be52904eb59a04874f8e49bf5c15d0b805f5bef31d622237c7fcb680478ff
                                                            • Opcode Fuzzy Hash: 0fac64c9cf5fbedfe13c517bcd97d6a681646c61996200243ba4e34737d3f65e
                                                            • Instruction Fuzzy Hash: 2941C1B0D0071DCBDB24DFA9C884BDDBBB5BF89304F20816AD408AB251DB756986DF91
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08E8DB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: d3a998a6373c5c687dfbc44027154cba347d51f0af5224f100e4bd5518360def
                                                            • Instruction ID: d23182c2a211264f36ca8f984b50fd82a8252e709ea81100d7a95ce8a142ebd9
                                                            • Opcode Fuzzy Hash: d3a998a6373c5c687dfbc44027154cba347d51f0af5224f100e4bd5518360def
                                                            • Instruction Fuzzy Hash: 8D2148B1D003499FDB10DFA9C885BEEBBF5FF88314F108429E959A7240D7789941CBA1
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08E8D5AE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 5ee832800e7bad8e0fcd32620a12af87ee662e53479f26a2b1f1a2f779086b5d
                                                            • Instruction ID: a1bb279b845067fb1403382fff29c2a6091c75c68a07a0006a071c60ff74ba7c
                                                            • Opcode Fuzzy Hash: 5ee832800e7bad8e0fcd32620a12af87ee662e53479f26a2b1f1a2f779086b5d
                                                            • Instruction Fuzzy Hash: 6F216872D00349CFCB10DFAAC8457AEBBF4EF99215F10842ED459A7281D7789545CBA1
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07C05DEF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053369550.0000000007C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7c00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: 06b01e857efc54bbb8e0c018f21e79f81c87ea4dcc7fd9f725e4e5db05d9241a
                                                            • Instruction ID: 3e9e855fb487ac7eece692b57dfc2e7ae2ed749b386486732b1cf81a32438c12
                                                            • Opcode Fuzzy Hash: 06b01e857efc54bbb8e0c018f21e79f81c87ea4dcc7fd9f725e4e5db05d9241a
                                                            • Instruction Fuzzy Hash: D431E0B5D0134A9FDB10CF9AD984ADEFBF5FB48320F14842AE819A7250D374A654CFA0
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C1D897
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 2c08990593bfd890d49828242ff8c1fed659c8cc4254ae2be4d20e4fa0428ec0
                                                            • Instruction ID: f941e104128752e74483fca249da406a8a1f8f91bab3ceae578773f8eab950a7
                                                            • Opcode Fuzzy Hash: 2c08990593bfd890d49828242ff8c1fed659c8cc4254ae2be4d20e4fa0428ec0
                                                            • Instruction Fuzzy Hash: 0B3137B5C0024A9FDB10CFA9D484ADEFFF4EB49320F14855AE964A7350C374A945DFA1
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08E8DB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 32b02e1a7903695facda3ef43c6329ea45e5767a4690ff7e6aab82a3d787f30f
                                                            • Instruction ID: f7417c85d7e6bb310d78ff6b57c5837753db6a16a6ecde26ab8adf2606a96d42
                                                            • Opcode Fuzzy Hash: 32b02e1a7903695facda3ef43c6329ea45e5767a4690ff7e6aab82a3d787f30f
                                                            • Instruction Fuzzy Hash: 372127B6D003499FCB10DFA9C885BDEBBF5FF48314F10842AE919A7240D7789955CBA1
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07C05DEF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053369550.0000000007C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7c00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: b24c069350bfe36e820dde022b2454c11bc9485e643483a3cc0fcbd7fdd5468a
                                                            • Instruction ID: 25a858ce2ee7d03b7d0502c34a38fba896cd0e3b29c7fe30d83149f7e1cd816b
                                                            • Opcode Fuzzy Hash: b24c069350bfe36e820dde022b2454c11bc9485e643483a3cc0fcbd7fdd5468a
                                                            • Instruction Fuzzy Hash: 3321D2B5D0034A9FDB10CF9AD884A9EFBF5FB48310F14842AE819A7250D375AA54CFA0
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08E8DC70
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 6d281e4cb7ac58bc2d1bdfdf7f93bf7b370fe1bc73c0240001eeb7b276a357fd
                                                            • Instruction ID: 0a2cd60d18cc2640bfc056c0bb257b649df91fedb96ea0611fa67385414668fd
                                                            • Opcode Fuzzy Hash: 6d281e4cb7ac58bc2d1bdfdf7f93bf7b370fe1bc73c0240001eeb7b276a357fd
                                                            • Instruction Fuzzy Hash: 7A2139B1D003499FCB10DFAAC885ADEFBF4FF48310F10842AE559A7240C7749551DBA1
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08E8DC70
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 3ce128f56510a063226f887b555536f2ade062282e92e7f5b0e24698a5c171dd
                                                            • Instruction ID: 20c307e28ac824bfad6df59054f0f455dad5c499e336910b7e7194f926838363
                                                            • Opcode Fuzzy Hash: 3ce128f56510a063226f887b555536f2ade062282e92e7f5b0e24698a5c171dd
                                                            • Instruction Fuzzy Hash: 5B2139B1D003499FCB10DFAAC885ADEFBF5FF48310F10842AE519A7240C7789551DBA1
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08E8D5AE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: f801f19d81b3cb5997032216efb0c0ef748a336349f857b5cf9b639f493b43f1
                                                            • Instruction ID: d59f5af8a829d7ddcebd342c769833697dc224a3dcad1f434acfe5aaf46154b0
                                                            • Opcode Fuzzy Hash: f801f19d81b3cb5997032216efb0c0ef748a336349f857b5cf9b639f493b43f1
                                                            • Instruction Fuzzy Hash: DC211871D003098FDB10DFAAC485BEEBBF4EF89315F14842AD559A7280DB78A945CFA1
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C1D897
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: aa58976cb6f8154ad8b2678dbe00f3f6fc537f4a2a87e56bdb2374b00003cee8
                                                            • Instruction ID: 2543bc37f67e4ea8901f79aa9a72184293bd90401373ea99591ed461ab015f85
                                                            • Opcode Fuzzy Hash: aa58976cb6f8154ad8b2678dbe00f3f6fc537f4a2a87e56bdb2374b00003cee8
                                                            • Instruction Fuzzy Hash: EB21E2B5D002499FDB10CFAAD884ADEBBF8FB48310F14841AE918A3350D378A944CFA1
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08E8DAAE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 068ed755ebb8afc556a4bfbabd62646f3151569e46789afae6b8bf61a812916f
                                                            • Instruction ID: a67af53aceeb9c05e6c475ed083741782842059f8fdc9c84eb96aef084514986
                                                            • Opcode Fuzzy Hash: 068ed755ebb8afc556a4bfbabd62646f3151569e46789afae6b8bf61a812916f
                                                            • Instruction Fuzzy Hash: EB214A769002499FCB10DFAAC845AEFBFF5EF88314F208419E559A7250C7759541CBA1
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08E8DAAE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: fd28da8c96d4c26ef6e9f8a4ca806bc53bbe9e56e4ebc33fdb5632325ca4cfb4
                                                            • Instruction ID: 0a833f3c40326ac525d3af6eaa0b885b26f7f931922806e6462b0735a3f25b6f
                                                            • Opcode Fuzzy Hash: fd28da8c96d4c26ef6e9f8a4ca806bc53bbe9e56e4ebc33fdb5632325ca4cfb4
                                                            • Instruction Fuzzy Hash: 41116772D002499FCB10DFAAC845ADFBFF5EF88324F208419E519A7250C775A541CFA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: d4aceff5ae2a96d2b40d1ef469b857e9b617c0aa7a15c4e0edf4cc4507fa7eec
                                                            • Instruction ID: 5733f91362ae55b5f4c50b0060c0f70c67d5a0b172e259a2bcfbb44457b95e40
                                                            • Opcode Fuzzy Hash: d4aceff5ae2a96d2b40d1ef469b857e9b617c0aa7a15c4e0edf4cc4507fa7eec
                                                            • Instruction Fuzzy Hash: 4F1146B1D002898EDB24DFAAC8457DFFFF4AB88324F24841ED459A7240C775A545CBA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: a7f9c2609c83f3d5dd0f9543ad8d8f6fd24b79bb0741a9dcb74119d8c7780e90
                                                            • Instruction ID: 7034d472e01af6227028694cd9ed064152144fd9a951869e395b4cc2302f393e
                                                            • Opcode Fuzzy Hash: a7f9c2609c83f3d5dd0f9543ad8d8f6fd24b79bb0741a9dcb74119d8c7780e90
                                                            • Instruction Fuzzy Hash: 44113AB1D003498FCB20DFAAC4457DEFBF4EB88325F20841AD419A7240CB75A545CBA1
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 0BB414CD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2054352856.000000000BB40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_bb40000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 178f5c282146ad5621c378b70ca0e391bfb63bee120a582badacee8f0c1006ac
                                                            • Instruction ID: 36d66b8b66260ccc60afa032bf963ceb9258dc26f02d74a1bfdab750201042da
                                                            • Opcode Fuzzy Hash: 178f5c282146ad5621c378b70ca0e391bfb63bee120a582badacee8f0c1006ac
                                                            • Instruction Fuzzy Hash: 7411E0B58002499FCB20DF9AD989BDEBFF8EB48310F10845AE559A7210C375A584CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00C1B17E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: ea4130beeec153c6c9acd479586279393ab06e3057517f44a98d87ca2dc64345
                                                            • Instruction ID: aa705dca34986b9c9feaa0c1bcf33e662a52ecd3000da9269dab47957936637e
                                                            • Opcode Fuzzy Hash: ea4130beeec153c6c9acd479586279393ab06e3057517f44a98d87ca2dc64345
                                                            • Instruction Fuzzy Hash: 1111F5B5C003499FCB10CF9AD444ADEFBF4EF89314F21841AD429A7210C379A945CFA1
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 0BB414CD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2054352856.000000000BB40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_bb40000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 83dbef027fcbadae660200108461790f7be9fe5a2cfad90f6cde7ec12d556a3e
                                                            • Instruction ID: 41245b48aeccbe7cf2a6b087f456ba86f27b192a7076c11d538cd980e349eab6
                                                            • Opcode Fuzzy Hash: 83dbef027fcbadae660200108461790f7be9fe5a2cfad90f6cde7ec12d556a3e
                                                            • Instruction Fuzzy Hash: 2211C2B58003499FDB10DF9AD585BDEBBF8FB48310F10845AD559A7240C375A584CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2047736120.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a4d000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 02c49ca13edab5a07e821e9b29719a19e4462683b771aae589233e73f9d9538c
                                                            • Instruction ID: 916749c77cb1bf8db4d2c099399bf08665e0e2e1464c915eb8d4e03d08b74f8c
                                                            • Opcode Fuzzy Hash: 02c49ca13edab5a07e821e9b29719a19e4462683b771aae589233e73f9d9538c
                                                            • Instruction Fuzzy Hash: E521F5B9504244EFDB05DF14D9C0B26BF65FBD8324F24C56DE90A0B256C33AE856CAA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2047837905.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a5d000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8d140e29d535c53b8b9ff278167ecf8de5e753ea2d75999ff1eb0e69169db3f4
                                                            • Instruction ID: eca34e531236440331dbcd1ee6688842ee8963dc83c7672e3ab68d18ca1bdb4a
                                                            • Opcode Fuzzy Hash: 8d140e29d535c53b8b9ff278167ecf8de5e753ea2d75999ff1eb0e69169db3f4
                                                            • Instruction Fuzzy Hash: 7B2104B1504200EFDB25DF14D9C0B2ABBA5FB84315F34CA6DEC094B292C376D84ACA61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2047837905.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a5d000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f6352fdd4a5cac29c838f021a4c4f54ede080104a8c0e1743f9616b42098fb1f
                                                            • Instruction ID: fa252a3a327c67e4d87e57e1b3d7f617ca06adaac41849875b86859a680de1d1
                                                            • Opcode Fuzzy Hash: f6352fdd4a5cac29c838f021a4c4f54ede080104a8c0e1743f9616b42098fb1f
                                                            • Instruction Fuzzy Hash: 8D21F2B1604240EFDB24DF14D9C4B26BBA5FB84315F34C96DDC0A4B296C33AD80BCA61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2047837905.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a5d000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f9b7cd732772bd0efa4d901215ddd4ad698eab71e876464662fce5f2f7bf0d67
                                                            • Instruction ID: a7fe0a0ec6eb67f872513c9e0b3be0b59b4fb96c2b1c5dd60c275d91cb7692be
                                                            • Opcode Fuzzy Hash: f9b7cd732772bd0efa4d901215ddd4ad698eab71e876464662fce5f2f7bf0d67
                                                            • Instruction Fuzzy Hash: E42162755093808FDB16CF24D994715BF71FB46314F28C5DAD8498B6A7C33A980ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2047736120.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a4d000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction ID: 3a400fd8d9828da98dcc89236e9adb5bd66c7b41aa54dde818a2a5514e01d617
                                                            • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction Fuzzy Hash: F2112676404240CFCB02CF10D5C4B16BF71FBD4324F24C2A9D8090B656C33AE85ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2047837905.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a5d000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction ID: acf887e7acc9ce004de3608735eebc073c0c9f0d292a6aaf9d958851ef7245dd
                                                            • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction Fuzzy Hash: 6711BB75904280DFCB12CF10D5C4B19BBA1FB84314F24C6ADDC494B696C33AD84ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2047736120.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a4d000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cc0ef4ed4333dc30053279711be9f13bb5933d14051c8687158b504fa63ff37c
                                                            • Instruction ID: 7260aa90f58bef38c046189bccf1e9e319ebec925128ffee32e23dcadd8ebb8d
                                                            • Opcode Fuzzy Hash: cc0ef4ed4333dc30053279711be9f13bb5933d14051c8687158b504fa63ff37c
                                                            • Instruction Fuzzy Hash: 9B0126754053449AE7108B29CDC4767FFE8EFC0364F28C81AEC090A282C3789C40C6B1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2047736120.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a4d000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ff8e8d55ea1576d091f2ebebe708992cb8465391e0e89cb7351ddb741670bc23
                                                            • Instruction ID: 874d155bcc957ce15bd8915ff87086c516e8325546a359e8b83f0811c1f9b1a1
                                                            • Opcode Fuzzy Hash: ff8e8d55ea1576d091f2ebebe708992cb8465391e0e89cb7351ddb741670bc23
                                                            • Instruction Fuzzy Hash: 33F0CD76405344AEE7108B1ADDC4B62FFE8EB90374F28C45AED080E286C3789844CAB0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2054352856.000000000BB40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_bb40000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7af0f5d3d7cfc9ae3135c02f2d910279dd0bdfae9a83786cc7e21a4c46f3372d
                                                            • Instruction ID: f3297f606b694a146dcaa28f277019265e5b5e6c874e1fcb6dcb7b05ace38f24
                                                            • Opcode Fuzzy Hash: 7af0f5d3d7cfc9ae3135c02f2d910279dd0bdfae9a83786cc7e21a4c46f3372d
                                                            • Instruction Fuzzy Hash: A2D16A717116048FDB29EB79C450BAEB7E6BF89700F1484A9E246CB391DF34E841EB52
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89f800ec0c54273945a16c0737e49f700c191caf87225ddee69d0c27166d9497
                                                            • Instruction ID: 5fc8a3ba66680d3f6650b1c0c86ae985f9bd67bfb19d0ef46291376bbca09a58
                                                            • Opcode Fuzzy Hash: 89f800ec0c54273945a16c0737e49f700c191caf87225ddee69d0c27166d9497
                                                            • Instruction Fuzzy Hash: 06E11A74E01159CFCB14DFA9C5809AEFBB2FF89305F24816AD418AB355D730A982CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6a63c622f4274fb2f4df8c391d20b21f787e610ce31e1a6816127a00a8e0f5af
                                                            • Instruction ID: 7a142f6a1cb6b82fe6db8b0eac59416f7b846b947bd27140ba903a74575f35a4
                                                            • Opcode Fuzzy Hash: 6a63c622f4274fb2f4df8c391d20b21f787e610ce31e1a6816127a00a8e0f5af
                                                            • Instruction Fuzzy Hash: 43E10774E01119CFCB14EFA8C5809AEFBB2FF89305F249169D418AB355D731A942DFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73379e5722274a7327f1a1c5090d3731511ea1747b4c8c73c33179b000b50710
                                                            • Instruction ID: ef5337304dbba1a4ec9ea2cf8c063c5df187954fbdc2743ee7cbdea289710153
                                                            • Opcode Fuzzy Hash: 73379e5722274a7327f1a1c5090d3731511ea1747b4c8c73c33179b000b50710
                                                            • Instruction Fuzzy Hash: 09E12874E00119CFCB14DFA9C5809AEFBB2FF89315F249169D418AB355D730A942CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 53bd01d955909afb1a4ddf1786c510790059408fc5dbbc242c9dec115f3ef9c1
                                                            • Instruction ID: 8c705f4a80b1b5cc0876ad20ae52550b88ad6b35fb5d32abfa39ab223701bb1b
                                                            • Opcode Fuzzy Hash: 53bd01d955909afb1a4ddf1786c510790059408fc5dbbc242c9dec115f3ef9c1
                                                            • Instruction Fuzzy Hash: 46E11674E01219CFCB14DFA9C5809AEFBB2FF89315F249169D818AB315D731A942CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5d6ec72d48796de8cdca72ac1ea60543c691c80d9be13463261c6417dabf7fbb
                                                            • Instruction ID: f89b95c962a4a75a761d804a3f8062a7d0f060f3d70371c65e741f6d17b47817
                                                            • Opcode Fuzzy Hash: 5d6ec72d48796de8cdca72ac1ea60543c691c80d9be13463261c6417dabf7fbb
                                                            • Instruction Fuzzy Hash: 52E11974E01119CFCB14DFA9C9809AEFBB2FF89305F249169D818AB355D731A942CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048588738.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_c10000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a59834180269fd5bfbdf2be011ed17ac9102ec37ad91cb931008d0d284ac99b1
                                                            • Instruction ID: f1736139d73d117249b53edfa2ca11bd3c670fdee9c732a6bfd94a89f26b369d
                                                            • Opcode Fuzzy Hash: a59834180269fd5bfbdf2be011ed17ac9102ec37ad91cb931008d0d284ac99b1
                                                            • Instruction Fuzzy Hash: A8A15C36A002099FCF05DFB5C8405DEB7B2FF86300B25857AE815AB261DB71E996DB80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5aed583311b42f3e5e43de9fb5c8dac65bc5512d78a4f2b4a80afb0b6a557163
                                                            • Instruction ID: 83312a063e0bc0a35c3bd0340e2ebac0877277b7721ca8b333d397e6d251ff8d
                                                            • Opcode Fuzzy Hash: 5aed583311b42f3e5e43de9fb5c8dac65bc5512d78a4f2b4a80afb0b6a557163
                                                            • Instruction Fuzzy Hash: 57514B71E042298FCB14DFA9C9809AEFBF2EF89305F24816AD418AB355D7305942CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 606a4ffd6d5fd1d369bf7f590ee2cbb9e1c62f96340f9266a2bc676fb2a57762
                                                            • Instruction ID: 2554b8bfc591240958a6e8fb0ba02a6e0ad7bb6cebd8165031c4d22105c54628
                                                            • Opcode Fuzzy Hash: 606a4ffd6d5fd1d369bf7f590ee2cbb9e1c62f96340f9266a2bc676fb2a57762
                                                            • Instruction Fuzzy Hash: AB515A70E002198FCB14DFA9C9405AEFBF2FF89304F24816AD858AB356D7319942CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ed6842927700f4bcb16120afd68873182f823bca342279fa8d84ca3662899b28
                                                            • Instruction ID: 3c7fbd7b236123d39b8f3d3b57ffc421f7c053bb6bbe981d63d27e58d9123140
                                                            • Opcode Fuzzy Hash: ed6842927700f4bcb16120afd68873182f823bca342279fa8d84ca3662899b28
                                                            • Instruction Fuzzy Hash: B85107B1E012198FCB14DFA9C5819AEFBF2EF89315F24816AD458AB315D7309942CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2053441893.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8e80000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fa482a596cb475e64ce3dfc678eea52c6bc69248d01438aa27d65c215ccd9f7b
                                                            • Instruction ID: 8f80eb3d758eb6b0c6917e95a04ec05a8248ba28ee40773debf8710dd5befc67
                                                            • Opcode Fuzzy Hash: fa482a596cb475e64ce3dfc678eea52c6bc69248d01438aa27d65c215ccd9f7b
                                                            • Instruction Fuzzy Hash: AB51E671E012298FDB14DFA9C5809AEFBF2FF89305F24816AD418AB355D7319942CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2054352856.000000000BB40000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_bb40000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: add9b966a1bdeb373b4526926d9e664b607f7f6c181e151f48019e6c1d676b8f
                                                            • Instruction ID: 4ea496558a457afbfb220e83d8af275b9f90849b6ff97aa76e4cc7c77e16f508
                                                            • Opcode Fuzzy Hash: add9b966a1bdeb373b4526926d9e664b607f7f6c181e151f48019e6c1d676b8f
                                                            • Instruction Fuzzy Hash: 7931B471D097288BEB28DF6B99043DABAF7AFC9300F04C0AA8558A6265DB340985DE41

                                                            Execution Graph

                                                            Execution Coverage:13.1%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:188
                                                            Total number of Limit Nodes:17
                                                            execution_graph 40010 17c0848 40012 17c084e 40010->40012 40011 17c091b 40012->40011 40014 17c1340 40012->40014 40016 17c1356 40014->40016 40015 17c1454 40015->40012 40016->40015 40025 17c7d68 40016->40025 40030 17c7d59 40016->40030 40035 17c7f31 40016->40035 40040 17c7ed2 40016->40040 40045 17c7e94 40016->40045 40050 17c8219 40016->40050 40055 6df3aa0 40016->40055 40061 6df3a91 40016->40061 40027 17c7d81 40025->40027 40026 17c7fc3 40026->40016 40027->40026 40067 17c7fe0 40027->40067 40071 17c7fd1 40027->40071 40032 17c7d68 40030->40032 40031 17c7fc3 40031->40016 40032->40031 40033 17c7fe0 DeleteFileW 40032->40033 40034 17c7fd1 DeleteFileW 40032->40034 40033->40031 40034->40031 40037 17c7f36 40035->40037 40036 17c7fc3 40036->40016 40038 17c7fe0 DeleteFileW 40037->40038 40039 17c7fd1 DeleteFileW 40037->40039 40038->40036 40039->40036 40042 17c7ed7 40040->40042 40041 17c7fc3 40041->40016 40043 17c7fe0 DeleteFileW 40042->40043 40044 17c7fd1 DeleteFileW 40042->40044 40043->40041 40044->40041 40047 17c7e99 40045->40047 40046 17c7fc3 40046->40016 40048 17c7fe0 DeleteFileW 40047->40048 40049 17c7fd1 DeleteFileW 40047->40049 40048->40046 40049->40046 40051 17c8223 40050->40051 40052 17c82d9 40051->40052 40079 6e0fa48 40051->40079 40083 6e0fa58 40051->40083 40052->40016 40056 6df3ab2 40055->40056 40057 6df3b63 40056->40057 40087 6df368c 40056->40087 40057->40016 40059 6df3b29 40092 6df36ac 40059->40092 40062 6df3aa0 40061->40062 40063 6df368c GetModuleHandleW 40062->40063 40065 6df3b63 40062->40065 40064 6df3b29 40063->40064 40066 6df36ac KiUserCallbackDispatcher 40064->40066 40065->40016 40066->40065 40068 17c7ff0 40067->40068 40069 17c8022 40068->40069 40075 17c77b0 40068->40075 40069->40026 40073 17c7fdd 40071->40073 40072 17c8022 40072->40026 40073->40072 40074 17c77b0 DeleteFileW 40073->40074 40074->40072 40076 17c8040 DeleteFileW 40075->40076 40078 17c80bf 40076->40078 40078->40069 40081 6e0fa58 40079->40081 40080 6e0fc82 40080->40052 40081->40080 40082 6e0fc98 GlobalMemoryStatusEx GlobalMemoryStatusEx 40081->40082 40082->40081 40084 6e0fa6d 40083->40084 40085 6e0fc82 40084->40085 40086 6e0fc98 GlobalMemoryStatusEx GlobalMemoryStatusEx 40084->40086 40085->40052 40086->40084 40088 6df3697 40087->40088 40096 6df4c4b 40088->40096 40102 6df4c60 40088->40102 40089 6df3d02 40089->40059 40093 6df36b7 40092->40093 40095 6dfb8e3 40093->40095 40137 6dfaf64 40093->40137 40095->40057 40097 6df4c60 40096->40097 40108 6df51d1 40097->40108 40098 6df4d0e 40099 6df4648 GetModuleHandleW 40098->40099 40100 6df4d3a 40098->40100 40099->40100 40103 6df4c8b 40102->40103 40107 6df51d1 GetModuleHandleW 40103->40107 40104 6df4d0e 40105 6df4648 GetModuleHandleW 40104->40105 40106 6df4d3a 40104->40106 40105->40106 40107->40104 40109 6df520d 40108->40109 40110 6df528e 40109->40110 40113 6df5340 40109->40113 40123 6df5350 40109->40123 40114 6df5350 40113->40114 40116 6df5389 40114->40116 40133 6df4648 40114->40133 40117 6df4648 GetModuleHandleW 40116->40117 40122 6df5554 40116->40122 40118 6df54da 40117->40118 40119 6df4648 GetModuleHandleW 40118->40119 40118->40122 40120 6df5528 40119->40120 40121 6df4648 GetModuleHandleW 40120->40121 40120->40122 40121->40122 40122->40110 40124 6df5365 40123->40124 40125 6df4648 GetModuleHandleW 40124->40125 40126 6df5389 40124->40126 40125->40126 40127 6df4648 GetModuleHandleW 40126->40127 40132 6df5554 40126->40132 40128 6df54da 40127->40128 40129 6df4648 GetModuleHandleW 40128->40129 40128->40132 40130 6df5528 40129->40130 40131 6df4648 GetModuleHandleW 40130->40131 40130->40132 40131->40132 40132->40110 40134 6df5690 GetModuleHandleW 40133->40134 40136 6df5705 40134->40136 40136->40116 40138 6dfb8f8 KiUserCallbackDispatcher 40137->40138 40140 6dfb966 40138->40140 40140->40093 39994 6df6738 39995 6df67a0 CreateWindowExW 39994->39995 39997 6df685c 39995->39997 40141 6df5688 40143 6df5690 GetModuleHandleW 40141->40143 40144 6df5705 40143->40144 40145 6dfbf08 40146 6dfbf62 OleGetClipboard 40145->40146 40147 6dfbfa2 40146->40147 40148 6dfa328 DuplicateHandle 40149 6dfa3be 40148->40149 39998 6dfdcd0 39999 6dfdd14 SetWindowsHookExA 39998->39999 40001 6dfdd5a 39999->40001 40002 6dfbd70 40003 6dfbd7b 40002->40003 40005 6dfbd8b 40003->40005 40006 6dfb19c 40003->40006 40007 6dfbdc0 OleInitialize 40006->40007 40009 6dfbe24 40007->40009 40009->40005 40150 6dfa0e0 40151 6dfa0e1 GetCurrentProcess 40150->40151 40153 6dfa178 GetCurrentThread 40151->40153 40154 6dfa171 40151->40154 40155 6dfa1ae 40153->40155 40156 6dfa1b5 GetCurrentProcess 40153->40156 40154->40153 40155->40156 40159 6dfa1eb 40156->40159 40157 6dfa213 GetCurrentThreadId 40158 6dfa244 40157->40158 40159->40157 40160 16fd030 40161 16fd048 40160->40161 40162 16fd0a2 40161->40162 40169 6df477c 40161->40169 40177 6df68f0 40161->40177 40183 6dfb300 40161->40183 40191 6df6a12 40161->40191 40198 6df68ea 40161->40198 40204 6df476c 40161->40204 40172 6df4787 40169->40172 40170 6dfb391 40216 6dfa0b4 40170->40216 40172->40170 40173 6dfb381 40172->40173 40208 6dfb4a8 40173->40208 40212 6dfb4b8 40173->40212 40174 6dfb38f 40178 6df6916 40177->40178 40179 6df476c GetModuleHandleW 40178->40179 40180 6df6922 40179->40180 40181 6df477c CallWindowProcW 40180->40181 40182 6df6937 40181->40182 40182->40162 40184 6dfb305 40183->40184 40185 6dfb391 40184->40185 40187 6dfb381 40184->40187 40186 6dfa0b4 CallWindowProcW 40185->40186 40188 6dfb38f 40186->40188 40189 6dfb4b8 CallWindowProcW 40187->40189 40190 6dfb4a8 CallWindowProcW 40187->40190 40189->40188 40190->40188 40192 6df6a1e 40191->40192 40195 6df6a2a 40191->40195 40220 6df47a4 40192->40220 40194 6df6a27 40194->40162 40196 6df4648 GetModuleHandleW 40195->40196 40197 6df6af7 40195->40197 40196->40197 40199 6df68f0 40198->40199 40200 6df476c GetModuleHandleW 40199->40200 40201 6df6922 40200->40201 40202 6df477c CallWindowProcW 40201->40202 40203 6df6937 40202->40203 40203->40162 40205 6df4777 40204->40205 40206 6df47a4 GetModuleHandleW 40205->40206 40207 6df6a27 40206->40207 40207->40162 40209 6dfb4b8 40208->40209 40210 6dfa0b4 CallWindowProcW 40209->40210 40211 6dfb5a2 40209->40211 40210->40209 40211->40174 40214 6dfb4c6 40212->40214 40213 6dfa0b4 CallWindowProcW 40213->40214 40214->40213 40215 6dfb5a2 40214->40215 40215->40174 40217 6dfa0bf 40216->40217 40218 6dfb652 CallWindowProcW 40217->40218 40219 6dfb601 40217->40219 40218->40219 40219->40174 40221 6df47af 40220->40221 40222 6df4648 GetModuleHandleW 40221->40222 40223 6df6af7 40221->40223 40222->40223

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 126 6e03568-6e03589 127 6e0358b-6e0358e 126->127 128 6e03590-6e035af 127->128 129 6e035b4-6e035b7 127->129 128->129 130 6e03d58-6e03d5a 129->130 131 6e035bd-6e035dc 129->131 133 6e03d61-6e03d64 130->133 134 6e03d5c 130->134 139 6e035f5-6e035ff 131->139 140 6e035de-6e035e1 131->140 133->127 136 6e03d6a-6e03d73 133->136 134->133 143 6e03605-6e03614 139->143 140->139 141 6e035e3-6e035f3 140->141 141->143 255 6e03616 call 6e03d87 143->255 256 6e03616 call 6e03d88 143->256 145 6e0361b-6e03620 146 6e03622-6e03628 145->146 147 6e0362d-6e0390a 145->147 146->136 168 6e03910-6e039bf 147->168 169 6e03d4a-6e03d57 147->169 178 6e039c1-6e039e6 168->178 179 6e039e8 168->179 181 6e039f1-6e03a04 call 6e02378 178->181 179->181 184 6e03d31-6e03d3d 181->184 185 6e03a0a-6e03a2c call 6e02384 181->185 184->168 186 6e03d43 184->186 185->184 189 6e03a32-6e03a3c 185->189 186->169 189->184 190 6e03a42-6e03a4d 189->190 190->184 191 6e03a53-6e03b29 190->191 203 6e03b37-6e03b67 191->203 204 6e03b2b-6e03b2d 191->204 208 6e03b75-6e03b81 203->208 209 6e03b69-6e03b6b 203->209 204->203 210 6e03be1-6e03be5 208->210 211 6e03b83-6e03b87 208->211 209->208 212 6e03d22-6e03d2b 210->212 213 6e03beb-6e03c27 210->213 211->210 214 6e03b89-6e03bb3 211->214 212->184 212->191 225 6e03c35-6e03c43 213->225 226 6e03c29-6e03c2b 213->226 221 6e03bc1-6e03bde call 6e02390 214->221 222 6e03bb5-6e03bb7 214->222 221->210 222->221 229 6e03c45-6e03c50 225->229 230 6e03c5a-6e03c65 225->230 226->225 229->230 233 6e03c52 229->233 234 6e03c67-6e03c6d 230->234 235 6e03c7d-6e03c8e 230->235 233->230 236 6e03c71-6e03c73 234->236 237 6e03c6f 234->237 239 6e03c90-6e03c96 235->239 240 6e03ca6-6e03cb2 235->240 236->235 237->235 241 6e03c98 239->241 242 6e03c9a-6e03c9c 239->242 244 6e03cb4-6e03cba 240->244 245 6e03cca-6e03d1b 240->245 241->240 242->240 246 6e03cbc 244->246 247 6e03cbe-6e03cc0 244->247 245->212 246->245 247->245 255->145 256->145
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-3723351465
                                                            • Opcode ID: ba9bf72df4fa87477970dd83a02c71acce97f3a112e9821db0c10202f163f655
                                                            • Instruction ID: 7ed6eb8c98821fae189c5d11a9ed7da5e2164a03c188ca6d1de860c5c0f8ff5b
                                                            • Opcode Fuzzy Hash: ba9bf72df4fa87477970dd83a02c71acce97f3a112e9821db0c10202f163f655
                                                            • Instruction Fuzzy Hash: 84323C31E1071A8FDB14DF79D89459DB7B2FFC9304F2096AAD409AB254EB30AD85CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1204 6e07e60-6e07e7e 1205 6e07e80-6e07e83 1204->1205 1206 6e07ea4-6e07ea7 1205->1206 1207 6e07e85-6e07e9f 1205->1207 1208 6e07ea9-6e07ec5 1206->1208 1209 6e07eca-6e07ecd 1206->1209 1207->1206 1208->1209 1210 6e07eda-6e07edd 1209->1210 1211 6e07ecf-6e07ed9 1209->1211 1214 6e07ef4-6e07ef6 1210->1214 1215 6e07edf-6e07eed 1210->1215 1216 6e07ef8 1214->1216 1217 6e07efd-6e07f00 1214->1217 1221 6e07f06-6e07f1c 1215->1221 1222 6e07eef 1215->1222 1216->1217 1217->1205 1217->1221 1224 6e07f22-6e07f2b 1221->1224 1225 6e08137-6e08141 1221->1225 1222->1214 1226 6e07f31-6e07f4e 1224->1226 1227 6e08142-6e08150 1224->1227 1235 6e08124-6e08131 1226->1235 1236 6e07f54-6e07f7c 1226->1236 1230 6e08152-6e08177 1227->1230 1231 6e081a7-6e081b4 1227->1231 1233 6e08179-6e0817c 1230->1233 1234 6e081bf-6e081c1 1231->1234 1237 6e0817e-6e0819a 1233->1237 1238 6e0819f-6e081a2 1233->1238 1240 6e081c3-6e081c9 1234->1240 1241 6e081d9-6e081dd 1234->1241 1235->1224 1235->1225 1236->1235 1261 6e07f82-6e07f8b 1236->1261 1237->1238 1238->1231 1239 6e0824f-6e08252 1238->1239 1244 6e08487-6e08489 1239->1244 1245 6e08258-6e08267 1239->1245 1242 6e081cb 1240->1242 1243 6e081cd-6e081cf 1240->1243 1246 6e081eb 1241->1246 1247 6e081df-6e081e9 1241->1247 1242->1241 1243->1241 1251 6e08490-6e08493 1244->1251 1252 6e0848b 1244->1252 1259 6e08286-6e082ca 1245->1259 1260 6e08269-6e08284 1245->1260 1250 6e081f0-6e081f2 1246->1250 1247->1250 1256 6e081f4-6e081f7 1250->1256 1257 6e08209-6e08242 1250->1257 1251->1233 1258 6e08499-6e084a2 1251->1258 1252->1251 1256->1258 1257->1245 1283 6e08244-6e0824e 1257->1283 1268 6e082d0-6e082e1 1259->1268 1269 6e0845b-6e08471 1259->1269 1260->1259 1261->1227 1263 6e07f91-6e07fad 1261->1263 1271 6e08112-6e0811e 1263->1271 1272 6e07fb3-6e07fdd 1263->1272 1278 6e08446-6e08455 1268->1278 1279 6e082e7-6e08304 1268->1279 1269->1244 1271->1235 1271->1261 1287 6e07fe3-6e0800b 1272->1287 1288 6e08108-6e0810d 1272->1288 1278->1268 1278->1269 1279->1278 1289 6e0830a-6e08400 call 6e06688 1279->1289 1287->1288 1295 6e08011-6e0803f 1287->1295 1288->1271 1338 6e08402-6e0840c 1289->1338 1339 6e0840e 1289->1339 1295->1288 1300 6e08045-6e0804e 1295->1300 1300->1288 1302 6e08054-6e08086 1300->1302 1309 6e08091-6e080ad 1302->1309 1310 6e08088-6e0808c 1302->1310 1309->1271 1313 6e080af-6e08106 call 6e06688 1309->1313 1310->1288 1312 6e0808e 1310->1312 1312->1309 1313->1271 1340 6e08413-6e08415 1338->1340 1339->1340 1340->1278 1341 6e08417-6e0841c 1340->1341 1342 6e0842a 1341->1342 1343 6e0841e-6e08428 1341->1343 1344 6e0842f-6e08431 1342->1344 1343->1344 1344->1278 1345 6e08433-6e0843f 1344->1345 1345->1278
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q
                                                            • API String ID: 0-127220927
                                                            • Opcode ID: 2229cc95e379393a30bca880ccc9296c2cc6e3e5a2d813965e7bb15747a25137
                                                            • Instruction ID: 737c9ddc454bbbd01dbd3c68f1ec41aef4eb16ef514d0a41790b45d95f82d4dd
                                                            • Opcode Fuzzy Hash: 2229cc95e379393a30bca880ccc9296c2cc6e3e5a2d813965e7bb15747a25137
                                                            • Instruction Fuzzy Hash: 22029131B002069FEF54DB69D8946AEB7F6FF84304F249569D815AB380DB35EC86CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7801533e45d5c3ba1fc41f33bf4966237d23c744d2f3288ca97bf640dc6758f9
                                                            • Instruction ID: 69dffff1f4e084b74781d1c8d71cdda73e8f4d7854adc4302b05e53d7e8dddfc
                                                            • Opcode Fuzzy Hash: 7801533e45d5c3ba1fc41f33bf4966237d23c744d2f3288ca97bf640dc6758f9
                                                            • Instruction Fuzzy Hash: 2C328175B112059FEB54DF68D484BADB7B2FB88714F209629E405E7381DB34EC82CB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a31853c1ecf37da44b455c44c47c3d3aaf504eff2ddbc768edfcd954cd777923
                                                            • Instruction ID: 9932dc04766a0f79b7b7399349ddb5c41e87aa7676017ef921c88b7e6389ea4d
                                                            • Opcode Fuzzy Hash: a31853c1ecf37da44b455c44c47c3d3aaf504eff2ddbc768edfcd954cd777923
                                                            • Instruction Fuzzy Hash: F112E135F003058FEF60DBA4D9846AEB7B2EB85324F249469D8599B385DB34DC82CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 6e0ada8-6e0adc6 1 6e0adc8-6e0adcb 0->1 2 6e0adcd-6e0ade9 1->2 3 6e0adee-6e0adf1 1->3 2->3 4 6e0ae02-6e0ae05 3->4 5 6e0adf3-6e0adf7 3->5 8 6e0ae15-6e0ae18 4->8 9 6e0ae07-6e0ae10 4->9 6 6e0afd4-6e0afde 5->6 7 6e0adfd 5->7 7->4 11 6e0afc5-6e0afce 8->11 12 6e0ae1e-6e0ae21 8->12 9->8 11->6 14 6e0ae64-6e0ae6d 11->14 15 6e0ae23-6e0ae30 12->15 16 6e0ae35-6e0ae38 12->16 17 6e0ae73-6e0ae77 14->17 18 6e0afdf-6e0b016 14->18 15->16 19 6e0ae52-6e0ae55 16->19 20 6e0ae3a-6e0ae4d 16->20 23 6e0ae7c-6e0ae7e 17->23 29 6e0b018-6e0b01b 18->29 21 6e0ae57-6e0ae5c 19->21 22 6e0ae5f-6e0ae62 19->22 20->19 21->22 22->14 22->23 25 6e0ae80 23->25 26 6e0ae85-6e0ae88 23->26 25->26 26->1 30 6e0ae8e-6e0aeb2 26->30 31 6e0b02a-6e0b02d 29->31 32 6e0b01d 29->32 45 6e0afc2 30->45 46 6e0aeb8-6e0aec7 30->46 34 6e0b033-6e0b06e 31->34 35 6e0b296-6e0b299 31->35 124 6e0b01d call 6e0b310 32->124 125 6e0b01d call 6e0b2ff 32->125 47 6e0b261-6e0b274 34->47 48 6e0b074-6e0b080 34->48 36 6e0b2a6-6e0b2a9 35->36 37 6e0b29b-6e0b2a5 35->37 39 6e0b2ab-6e0b2c7 36->39 40 6e0b2cc-6e0b2cf 36->40 38 6e0b023-6e0b025 38->31 39->40 43 6e0b2e0-6e0b2e2 40->43 44 6e0b2d1-6e0b2d5 40->44 51 6e0b2e4 43->51 52 6e0b2e9-6e0b2ec 43->52 44->34 50 6e0b2db 44->50 45->11 61 6e0aec9-6e0aecf 46->61 62 6e0aedf-6e0af1a call 6e06688 46->62 53 6e0b276-6e0b277 47->53 57 6e0b0a0-6e0b0e4 48->57 58 6e0b082-6e0b09b 48->58 50->43 51->52 52->29 55 6e0b2f2-6e0b2fc 52->55 53->35 76 6e0b100-6e0b13f 57->76 77 6e0b0e6-6e0b0f8 57->77 58->53 63 6e0aed1 61->63 64 6e0aed3-6e0aed5 61->64 78 6e0af32-6e0af49 62->78 79 6e0af1c-6e0af22 62->79 63->62 64->62 85 6e0b145-6e0b220 call 6e06688 76->85 86 6e0b226-6e0b23b 76->86 77->76 90 6e0af61-6e0af72 78->90 91 6e0af4b-6e0af51 78->91 80 6e0af24 79->80 81 6e0af26-6e0af28 79->81 80->78 81->78 85->86 86->47 98 6e0af74-6e0af7a 90->98 99 6e0af8a-6e0afbb 90->99 93 6e0af53 91->93 94 6e0af55-6e0af57 91->94 93->90 94->90 100 6e0af7c 98->100 101 6e0af7e-6e0af80 98->101 99->45 100->99 101->99 124->38 125->38
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-1273862796
                                                            • Opcode ID: edbd38e3536d30f50419436d9f7ec46545b92ee00f818a346482c82a05c57271
                                                            • Instruction ID: 981d998a107ac9c04229fcf3446349d82a23dfc052bc5cab16d0a719bc6e62b7
                                                            • Opcode Fuzzy Hash: edbd38e3536d30f50419436d9f7ec46545b92ee00f818a346482c82a05c57271
                                                            • Instruction Fuzzy Hash: 2CE15170E1030A8FEB65DF69D4846AEB7B2FF85304F209529E405AB385DB35DC86CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 257 6dfa0d1-6dfa0d8 258 6dfa0da-6dfa0e0 257->258 259 6dfa0e1-6dfa16f GetCurrentProcess 257->259 258->259 264 6dfa178-6dfa1ac GetCurrentThread 259->264 265 6dfa171-6dfa177 259->265 266 6dfa1ae-6dfa1b4 264->266 267 6dfa1b5-6dfa1e9 GetCurrentProcess 264->267 265->264 266->267 269 6dfa1eb-6dfa1f1 267->269 270 6dfa1f2-6dfa20d call 6dfa2b0 267->270 269->270 273 6dfa213-6dfa242 GetCurrentThreadId 270->273 274 6dfa24b-6dfa2ad 273->274 275 6dfa244-6dfa24a 273->275 275->274
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 06DFA15E
                                                            • GetCurrentThread.KERNEL32 ref: 06DFA19B
                                                            • GetCurrentProcess.KERNEL32 ref: 06DFA1D8
                                                            • GetCurrentThreadId.KERNEL32 ref: 06DFA231
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: b74888c0576e2e269bf6655c84392252d829b81d2b76ae33b714bf101a04f223
                                                            • Instruction ID: 91cc6b968d22eea31c70058896a474b01f05128d21915f51ce8684318eaad29d
                                                            • Opcode Fuzzy Hash: b74888c0576e2e269bf6655c84392252d829b81d2b76ae33b714bf101a04f223
                                                            • Instruction Fuzzy Hash: 995185B0D1034ACFDB54DFAAD848BAEBFF1AF48304F258059E109A7350D7345884CB62

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 282 6dfa0e0-6dfa16f GetCurrentProcess 287 6dfa178-6dfa1ac GetCurrentThread 282->287 288 6dfa171-6dfa177 282->288 289 6dfa1ae-6dfa1b4 287->289 290 6dfa1b5-6dfa1e9 GetCurrentProcess 287->290 288->287 289->290 292 6dfa1eb-6dfa1f1 290->292 293 6dfa1f2-6dfa20d call 6dfa2b0 290->293 292->293 296 6dfa213-6dfa242 GetCurrentThreadId 293->296 297 6dfa24b-6dfa2ad 296->297 298 6dfa244-6dfa24a 296->298 298->297
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 06DFA15E
                                                            • GetCurrentThread.KERNEL32 ref: 06DFA19B
                                                            • GetCurrentProcess.KERNEL32 ref: 06DFA1D8
                                                            • GetCurrentThreadId.KERNEL32 ref: 06DFA231
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: f0307135c49dee3995676a3ca8ab4d94603c3de47268b969967ffed9d1e6f012
                                                            • Instruction ID: 05dc84f32d76cdd3acddd63462ce934af1352e64a4aaadeed1e89ee759598be9
                                                            • Opcode Fuzzy Hash: f0307135c49dee3995676a3ca8ab4d94603c3de47268b969967ffed9d1e6f012
                                                            • Instruction Fuzzy Hash: B75164B0D1030ACFDB54DFAAD948BAEBBF2EF88304F258419E509A7350D7745984CB66

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 305 6e09230-6e09255 306 6e09257-6e0925a 305->306 307 6e09260-6e09275 306->307 308 6e09b18-6e09b1b 306->308 316 6e09277-6e0927d 307->316 317 6e0928d-6e092a3 307->317 309 6e09b41-6e09b43 308->309 310 6e09b1d-6e09b3c 308->310 311 6e09b45 309->311 312 6e09b4a-6e09b4d 309->312 310->309 311->312 312->306 315 6e09b53-6e09b5d 312->315 318 6e09281-6e09283 316->318 319 6e0927f 316->319 322 6e092ae-6e092b0 317->322 318->317 319->317 323 6e092b2-6e092b8 322->323 324 6e092c8-6e09339 322->324 325 6e092ba 323->325 326 6e092bc-6e092be 323->326 335 6e09365-6e09381 324->335 336 6e0933b-6e0935e 324->336 325->324 326->324 341 6e09383-6e093a6 335->341 342 6e093ad-6e093c8 335->342 336->335 341->342 347 6e093f3-6e0940e 342->347 348 6e093ca-6e093ec 342->348 353 6e09410-6e0942c 347->353 354 6e09433-6e09441 347->354 348->347 353->354 355 6e09451-6e094cb 354->355 356 6e09443-6e0944c 354->356 362 6e09518-6e0952d 355->362 363 6e094cd-6e094eb 355->363 356->315 362->308 367 6e09507-6e09516 363->367 368 6e094ed-6e094fc 363->368 367->362 367->363 368->367
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: 457fc5e081f8439eb28a78119a1b9ab95ff90c5a1610a2d0b8f50db12b43dc03
                                                            • Instruction ID: 023fc2ee1c9d2642e9657893b9e31be021ca4a02dfa679c1c2b47b6da4f90c53
                                                            • Opcode Fuzzy Hash: 457fc5e081f8439eb28a78119a1b9ab95ff90c5a1610a2d0b8f50db12b43dc03
                                                            • Instruction Fuzzy Hash: DA917F31B0020A9FDB54DF69D8507AEB3F6FF89204F109569C80DEB385EB749D868B91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 371 6e0d030-6e0d04b 372 6e0d04d-6e0d050 371->372 373 6e0d052-6e0d094 372->373 374 6e0d099-6e0d09c 372->374 373->374 375 6e0d0e5-6e0d0e8 374->375 376 6e0d09e-6e0d0e0 374->376 378 6e0d0f7-6e0d0fa 375->378 379 6e0d0ea-6e0d0ec 375->379 376->375 380 6e0d143-6e0d146 378->380 381 6e0d0fc-6e0d10b 378->381 383 6e0d0f2 379->383 384 6e0d519 379->384 388 6e0d148-6e0d18a 380->388 389 6e0d18f-6e0d192 380->389 385 6e0d11a-6e0d126 381->385 386 6e0d10d-6e0d112 381->386 383->378 387 6e0d51c-6e0d528 384->387 391 6e0d12c-6e0d13e 385->391 392 6e0da4d-6e0da86 385->392 386->385 387->381 396 6e0d52e-6e0d81b 387->396 388->389 393 6e0d194-6e0d199 389->393 394 6e0d19c-6e0d19f 389->394 391->380 408 6e0da88-6e0da8b 392->408 393->394 397 6e0d1a1-6e0d1a3 394->397 398 6e0d1ae-6e0d1b1 394->398 584 6e0d821-6e0d827 396->584 585 6e0da42-6e0da4c 396->585 403 6e0d3d7-6e0d3e0 397->403 404 6e0d1a9 397->404 398->387 406 6e0d1b7-6e0d1ba 398->406 412 6e0d3e2-6e0d3e7 403->412 413 6e0d3ef-6e0d3fb 403->413 404->398 409 6e0d1bc-6e0d1d8 406->409 410 6e0d1dd-6e0d1e0 406->410 419 6e0da8d-6e0dab9 408->419 420 6e0dabe-6e0dac1 408->420 409->410 415 6e0d1e2-6e0d224 410->415 416 6e0d229-6e0d22c 410->416 412->413 417 6e0d401-6e0d415 413->417 418 6e0d50c-6e0d511 413->418 415->416 426 6e0d275-6e0d278 416->426 427 6e0d22e-6e0d270 416->427 417->384 446 6e0d41b-6e0d42d 417->446 418->384 419->420 424 6e0dad0-6e0dad3 420->424 425 6e0dac3 420->425 433 6e0dad5-6e0daf1 424->433 434 6e0daf6-6e0daf8 424->434 631 6e0dac3 call 6e0dba5 425->631 632 6e0dac3 call 6e0dbb8 425->632 435 6e0d2c1-6e0d2c4 426->435 436 6e0d27a-6e0d2bc 426->436 427->426 433->434 442 6e0dafa 434->442 443 6e0daff-6e0db02 434->443 439 6e0d2e1-6e0d2e4 435->439 440 6e0d2c6-6e0d2dc 435->440 436->435 451 6e0d2e6-6e0d328 439->451 452 6e0d32d-6e0d330 439->452 440->439 441 6e0dac9-6e0dacb 441->424 442->443 443->408 453 6e0db04-6e0db13 443->453 468 6e0d451-6e0d453 446->468 469 6e0d42f-6e0d435 446->469 451->452 459 6e0d332-6e0d374 452->459 460 6e0d379-6e0d37c 452->460 477 6e0db15-6e0db78 call 6e06688 453->477 478 6e0db7a-6e0db8f 453->478 459->460 462 6e0d3c5-6e0d3c7 460->462 463 6e0d37e-6e0d38d 460->463 475 6e0d3c9 462->475 476 6e0d3ce-6e0d3d1 462->476 471 6e0d39c-6e0d3a8 463->471 472 6e0d38f-6e0d394 463->472 473 6e0d45d-6e0d469 468->473 480 6e0d437 469->480 481 6e0d439-6e0d445 469->481 471->392 485 6e0d3ae-6e0d3c0 471->485 472->471 503 6e0d477 473->503 504 6e0d46b-6e0d475 473->504 475->476 476->372 476->403 477->478 497 6e0db90 478->497 488 6e0d447-6e0d44f 480->488 481->488 485->462 488->473 497->497 505 6e0d47c-6e0d47e 503->505 504->505 505->384 509 6e0d484-6e0d4a0 call 6e06688 505->509 523 6e0d4a2-6e0d4a7 509->523 524 6e0d4af-6e0d4bb 509->524 523->524 524->418 526 6e0d4bd-6e0d50a 524->526 526->384 586 6e0d836-6e0d83f 584->586 587 6e0d829-6e0d82e 584->587 586->392 588 6e0d845-6e0d858 586->588 587->586 590 6e0da32-6e0da3c 588->590 591 6e0d85e-6e0d864 588->591 590->584 590->585 592 6e0d873-6e0d87c 591->592 593 6e0d866-6e0d86b 591->593 592->392 594 6e0d882-6e0d8a3 592->594 593->592 597 6e0d8b2-6e0d8bb 594->597 598 6e0d8a5-6e0d8aa 594->598 597->392 599 6e0d8c1-6e0d8de 597->599 598->597 599->590 602 6e0d8e4-6e0d8ea 599->602 602->392 603 6e0d8f0-6e0d909 602->603 605 6e0da25-6e0da2c 603->605 606 6e0d90f-6e0d936 603->606 605->590 605->602 606->392 609 6e0d93c-6e0d946 606->609 609->392 610 6e0d94c-6e0d963 609->610 612 6e0d972-6e0d98d 610->612 613 6e0d965-6e0d970 610->613 612->605 618 6e0d993-6e0d9ac call 6e06688 612->618 613->612 622 6e0d9bb-6e0d9c4 618->622 623 6e0d9ae-6e0d9b3 618->623 622->392 624 6e0d9ca-6e0da1e 622->624 623->622 624->605 631->441 632->441
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q
                                                            • API String ID: 0-182748909
                                                            • Opcode ID: 7af0b33fe822cff8e4d15f9eec9750c32c8681ebfc1b724369471d5a672a14aa
                                                            • Instruction ID: ca134d1ff1217b0a6cd5b16b98a80f7884da6d4e58668d7bd09ea4a0a28b1e85
                                                            • Opcode Fuzzy Hash: 7af0b33fe822cff8e4d15f9eec9750c32c8681ebfc1b724369471d5a672a14aa
                                                            • Instruction Fuzzy Hash: 32624D70A1120A8FDB55DBA8D880A5DBBF3FF84304F218A69E4059F355DB75EC86CB81

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 633 6e04c70-6e04c94 634 6e04c96-6e04c99 633->634 635 6e04cba-6e04cbd 634->635 636 6e04c9b-6e04cb5 634->636 637 6e04cc3-6e04dbb 635->637 638 6e0539c-6e0539e 635->638 636->635 656 6e04dc1-6e04e09 637->656 657 6e04e3e-6e04e45 637->657 639 6e053a0 638->639 640 6e053a5-6e053a8 638->640 639->640 640->634 643 6e053ae-6e053bb 640->643 679 6e04e0e call 6e05527 656->679 680 6e04e0e call 6e05528 656->680 658 6e04ec9-6e04ed2 657->658 659 6e04e4b-6e04ebb 657->659 658->643 676 6e04ec6 659->676 677 6e04ebd 659->677 670 6e04e14-6e04e30 674 6e04e32 670->674 675 6e04e3b-6e04e3c 670->675 674->675 675->657 676->658 677->676 679->670 680->670
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fbq$XPbq$\Obq
                                                            • API String ID: 0-4057264190
                                                            • Opcode ID: be1d2a151088726a7ccdc21cd8b6d553e2402f5fd51cec9e708b75234e021a41
                                                            • Instruction ID: e5b97b3e09c49c460128dfe48da78c016a1af872096b75564664a4be65b10672
                                                            • Opcode Fuzzy Hash: be1d2a151088726a7ccdc21cd8b6d553e2402f5fd51cec9e708b75234e021a41
                                                            • Instruction Fuzzy Hash: 96616E70F00219DFEB54DFA5C858BAEBAF6FB88700F208529E105AB3D5DB754C458B91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1533 6e0922f-6e09255 1534 6e09257-6e0925a 1533->1534 1535 6e09260-6e09275 1534->1535 1536 6e09b18-6e09b1b 1534->1536 1544 6e09277-6e0927d 1535->1544 1545 6e0928d-6e092a3 1535->1545 1537 6e09b41-6e09b43 1536->1537 1538 6e09b1d-6e09b3c 1536->1538 1539 6e09b45 1537->1539 1540 6e09b4a-6e09b4d 1537->1540 1538->1537 1539->1540 1540->1534 1543 6e09b53-6e09b5d 1540->1543 1546 6e09281-6e09283 1544->1546 1547 6e0927f 1544->1547 1550 6e092ae-6e092b0 1545->1550 1546->1545 1547->1545 1551 6e092b2-6e092b8 1550->1551 1552 6e092c8-6e09339 1550->1552 1553 6e092ba 1551->1553 1554 6e092bc-6e092be 1551->1554 1563 6e09365-6e09381 1552->1563 1564 6e0933b-6e0935e 1552->1564 1553->1552 1554->1552 1569 6e09383-6e093a6 1563->1569 1570 6e093ad-6e093c8 1563->1570 1564->1563 1569->1570 1575 6e093f3-6e0940e 1570->1575 1576 6e093ca-6e093ec 1570->1576 1581 6e09410-6e0942c 1575->1581 1582 6e09433-6e09441 1575->1582 1576->1575 1581->1582 1583 6e09451-6e094cb 1582->1583 1584 6e09443-6e0944c 1582->1584 1590 6e09518-6e0952d 1583->1590 1591 6e094cd-6e094eb 1583->1591 1584->1543 1590->1536 1595 6e09507-6e09516 1591->1595 1596 6e094ed-6e094fc 1591->1596 1595->1590 1595->1591 1596->1595
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q
                                                            • API String ID: 0-127220927
                                                            • Opcode ID: 7cb20b24f7fd171fd5ae8f03305803b01a9548a8cf0b7b30ccded842189c9fc1
                                                            • Instruction ID: 38479bbdf60c477da70745554907058a9710c04f7c832ac2b9d6a4db8f9c1880
                                                            • Opcode Fuzzy Hash: 7cb20b24f7fd171fd5ae8f03305803b01a9548a8cf0b7b30ccded842189c9fc1
                                                            • Instruction Fuzzy Hash: 5B514031B002069FEB54DF79E854BAE73F6FF89604F109469C809EB385DB349C468B91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1636 6e04c61-6e04c94 1637 6e04c96-6e04c99 1636->1637 1638 6e04cba-6e04cbd 1637->1638 1639 6e04c9b-6e04cb5 1637->1639 1640 6e04cc3-6e04dbb 1638->1640 1641 6e0539c-6e0539e 1638->1641 1639->1638 1659 6e04dc1-6e04e09 1640->1659 1660 6e04e3e-6e04e45 1640->1660 1642 6e053a0 1641->1642 1643 6e053a5-6e053a8 1641->1643 1642->1643 1643->1637 1646 6e053ae-6e053bb 1643->1646 1682 6e04e0e call 6e05527 1659->1682 1683 6e04e0e call 6e05528 1659->1683 1661 6e04ec9-6e04ed2 1660->1661 1662 6e04e4b-6e04ebb 1660->1662 1661->1646 1679 6e04ec6 1662->1679 1680 6e04ebd 1662->1680 1673 6e04e14-6e04e30 1677 6e04e32 1673->1677 1678 6e04e3b-6e04e3c 1673->1678 1677->1678 1678->1660 1679->1661 1680->1679 1682->1673 1683->1673
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fbq$XPbq
                                                            • API String ID: 0-2292610095
                                                            • Opcode ID: f45eb0a1d46e3771fb0dfaafc1faaeace721fa3b881b317a9c63a5dc4a4b1433
                                                            • Instruction ID: 2956402a43759f4ea504ac14ea63b3a7d3fe7e2279ad90c5df494b64533ea721
                                                            • Opcode Fuzzy Hash: f45eb0a1d46e3771fb0dfaafc1faaeace721fa3b881b317a9c63a5dc4a4b1433
                                                            • Instruction Fuzzy Hash: 25515D70B00209DFEB54DFA5C854BAEBBF7FF88700F208529E105AB395DA758C428B95
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06DF684A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 0e949b4f2c6959a75b70d7008955fa55cda97c451071ac807892743b4c96897c
                                                            • Instruction ID: 52d7bd9ff216f2fbdf5db99c0845a6e8eb076a7b866f36d54739a46c7286bb07
                                                            • Opcode Fuzzy Hash: 0e949b4f2c6959a75b70d7008955fa55cda97c451071ac807892743b4c96897c
                                                            • Instruction Fuzzy Hash: F051D2B0C10349AFDB14CF9AC884ADEBBB5FF89310F65812AE919AB250D7759845CF90
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06DF684A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: fd010eb804c24d216c2f9e1f0b71bc091a2acbf998904c05c0aedd77e5ea4cdb
                                                            • Instruction ID: 65f1be58074b53f007cac35c92d3a9865a1728d8d5a0acfc23deeba06ed6337d
                                                            • Opcode Fuzzy Hash: fd010eb804c24d216c2f9e1f0b71bc091a2acbf998904c05c0aedd77e5ea4cdb
                                                            • Instruction Fuzzy Hash: A241C0B1D103499FDB14CF99C884ADEBBB5BF88310F25812AE919AB250D775A845CF90
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 06DFB679
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: 2f020c2398d96366d3c91330d777c659a4a3b1ed9ca83bf9f5d494787ccc7b28
                                                            • Instruction ID: ef93c2b857c9020e76883cf4ec3955b18bc32c0750481057cdcfc85f74249dd8
                                                            • Opcode Fuzzy Hash: 2f020c2398d96366d3c91330d777c659a4a3b1ed9ca83bf9f5d494787ccc7b28
                                                            • Instruction Fuzzy Hash: 7D4138B4910305CFDB54DF99C888AAABBF5FF88314F25C459E519AB321D375A841CFA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Clipboard
                                                            • String ID:
                                                            • API String ID: 220874293-0
                                                            • Opcode ID: b6f647b5235b90841dcabf7e527b602325b1cde984f8bc097f45ef2e6bde6f30
                                                            • Instruction ID: f94e511f260878fce57fbd1cf1fead14319dde9d5397448c562bf710eadf0b47
                                                            • Opcode Fuzzy Hash: b6f647b5235b90841dcabf7e527b602325b1cde984f8bc097f45ef2e6bde6f30
                                                            • Instruction Fuzzy Hash: 933111B0D11208DFDB54CF99C984BCEBBF5AF48304F24802AE504AB290D7B5A945CFA5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Clipboard
                                                            • String ID:
                                                            • API String ID: 220874293-0
                                                            • Opcode ID: 579219f33f0179741f0c0ad116412f52bcb0bea4c7274e5f04d16440e4c9d648
                                                            • Instruction ID: 70f553f51b3d1ae7fba3852088289349bc6ab5b60a78503af09308a5d2912763
                                                            • Opcode Fuzzy Hash: 579219f33f0179741f0c0ad116412f52bcb0bea4c7274e5f04d16440e4c9d648
                                                            • Instruction Fuzzy Hash: E2311FB0D11208DFDB54CF99C988BCEBBF5AF48304F24802AE504AB290D7B5A945CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 06DFBE15
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: ee328e97eaccd0d46f2995b3d151bf03f06c1ccc548939301268bf0efa3382ea
                                                            • Instruction ID: f98104596ff443349b409e651850a92144358a8e774e63250439f091b9486a44
                                                            • Opcode Fuzzy Hash: ee328e97eaccd0d46f2995b3d151bf03f06c1ccc548939301268bf0efa3382ea
                                                            • Instruction Fuzzy Hash: 7021ACB1D203848FCB20DFA9D545BDABFF4EF49324F10485AD586A7200C379A588CBA1
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06DFA3AF
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 750d7e12de2375c8c6c668d501c852378ac982c256962776aaa08a594ea5c7a3
                                                            • Instruction ID: 183e2866868b808143882aa8e1f0e2087d4d62c5cc21ed9c9a7c87cef2e5f4a2
                                                            • Opcode Fuzzy Hash: 750d7e12de2375c8c6c668d501c852378ac982c256962776aaa08a594ea5c7a3
                                                            • Instruction Fuzzy Hash: 8221D2B5D102499FDB10CFAAD885ADEBFF8EB48310F15841AE958A3350D374A954CFA1
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06DFA3AF
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 2acf1a3cf9d00a17896c09d548359082341f80680d4b8c2e147e69fd0884778a
                                                            • Instruction ID: 295b37c0208e9fdd5ace020f89abc45a6b3d52fffcdac5a584f19bc7dfeb6c75
                                                            • Opcode Fuzzy Hash: 2acf1a3cf9d00a17896c09d548359082341f80680d4b8c2e147e69fd0884778a
                                                            • Instruction Fuzzy Hash: 4921E2B5D102099FDB10CFAAD884ADEFBF8EB48310F14801AE918A3310D378A944CFA1
                                                            APIs
                                                            • DeleteFileW.KERNEL32(00000000), ref: 017C80B0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4472900401.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_17c0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DeleteFile
                                                            • String ID:
                                                            • API String ID: 4033686569-0
                                                            • Opcode ID: 636c7233bb20102cfd8832950e72301ac9034b9d83286e35941502837ff79e2a
                                                            • Instruction ID: 01dbdce92c666f441a69363444927e92df79746d62e454c38257c9d645561ec5
                                                            • Opcode Fuzzy Hash: 636c7233bb20102cfd8832950e72301ac9034b9d83286e35941502837ff79e2a
                                                            • Instruction Fuzzy Hash: 462127B1C0061A9BDB14CFAAC445BDEFBB4FB48720F158529D819B7240D378A944CFA2
                                                            APIs
                                                            • DeleteFileW.KERNEL32(00000000), ref: 017C80B0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4472900401.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_17c0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: DeleteFile
                                                            • String ID:
                                                            • API String ID: 4033686569-0
                                                            • Opcode ID: 77239452bddb3405bddeb0f761db6f751e83ac9d62137afc920e7a16bf7f95eb
                                                            • Instruction ID: c44b75742903a3741f0acfa9cffc5cb6f0035173e60fea36676d8eca04e48303
                                                            • Opcode Fuzzy Hash: 77239452bddb3405bddeb0f761db6f751e83ac9d62137afc920e7a16bf7f95eb
                                                            • Instruction Fuzzy Hash: 552147B1C0065A9BCB20CF9AC444BAEFBF4EB48720F10812DD818B7240D378A940CFA2
                                                            APIs
                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06DFDD4B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: 7d98ba48d238da206b729d54149b97e1f23e802e759140f3980691e4b983be24
                                                            • Instruction ID: b4dc1ecbd94949707f20a6826af6d35fa5e9ac51495316a2319a848cc4bb1218
                                                            • Opcode Fuzzy Hash: 7d98ba48d238da206b729d54149b97e1f23e802e759140f3980691e4b983be24
                                                            • Instruction Fuzzy Hash: A22130B6D102098FCB14CFA9D944BEEFBF5BF88310F14842AE459A7250C774AA45CFA1
                                                            APIs
                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06DFDD4B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: 11275d4581c13a12d968336a9f72064df6915ce39dc9864853b6352a372aea13
                                                            • Instruction ID: 3a7b0dc9b84bff804ddf7976615c917f9e5f63b2dc16e9a0a32460ff2804579b
                                                            • Opcode Fuzzy Hash: 11275d4581c13a12d968336a9f72064df6915ce39dc9864853b6352a372aea13
                                                            • Instruction Fuzzy Hash: 802110B5D102098FCB14DF9AD844BEEFBF5AF88310F10842AE419A7250C774A944CFA1
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32 ref: 017CF107
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4472900401.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_17c0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: ad3b8656cf1ecf857817fc1249070ee55a48fd15a019c676ad5663337b7db25b
                                                            • Instruction ID: 458d8292882f437ddcc12454605252026d5a9f926eb05934588df938e12d9f22
                                                            • Opcode Fuzzy Hash: ad3b8656cf1ecf857817fc1249070ee55a48fd15a019c676ad5663337b7db25b
                                                            • Instruction Fuzzy Hash: 461120B1C1065A9BCB10DFAAD445BDEFBF4AF88320F11812AD818B7240D378A944CFA1
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32 ref: 017CF107
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4472900401.00000000017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_17c0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: 38b0384a03014d6dd301e0256ad875726cfaf9d885fca573a42bf40474e7f8c6
                                                            • Instruction ID: ef5b9d94fc4c76850768eb8152e8d4e02db246b3ba89473cfed24b554e81877f
                                                            • Opcode Fuzzy Hash: 38b0384a03014d6dd301e0256ad875726cfaf9d885fca573a42bf40474e7f8c6
                                                            • Instruction Fuzzy Hash: 3911F0B2C1065A9BDB10DFAAD545BDEFBF4AF48320F15816AD818B7240D378A944CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 06DF56F6
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: cd4b12bc689aa868450171734056cc47ef4bdd8d9c3d7aa482a30c4ece270b67
                                                            • Instruction ID: 254d89dc7dd826ffc8a86d8da44a8ec17169b77ed7d37f87923007073a98f80d
                                                            • Opcode Fuzzy Hash: cd4b12bc689aa868450171734056cc47ef4bdd8d9c3d7aa482a30c4ece270b67
                                                            • Instruction Fuzzy Hash: F51132B5C103498FDB10DF9AD448BDEFBF4EB88210F11842AD529B7200C374A545CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 06DF56F6
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 7c7c25a7004f308fad734c30529cd38ca196ab85b8dfadf3d85847fb942b23c2
                                                            • Instruction ID: fc7997519522219f0975f293e6f8f46d3f1483354959afeb962db96dd3681935
                                                            • Opcode Fuzzy Hash: 7c7c25a7004f308fad734c30529cd38ca196ab85b8dfadf3d85847fb942b23c2
                                                            • Instruction Fuzzy Hash: 0911F0B5C102498FCB10DF9AD849ADEFBF4EF88220F21846AD969B7200D375A545CFA1
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 06DFBE15
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: eda32e9ff03530c177310adb4aede47dbbe08225eced11e36ce38ff86572afec
                                                            • Instruction ID: 927f051a6744437121c9815080f8184d8539d3c6a1da41484699dd5bd70504f6
                                                            • Opcode Fuzzy Hash: eda32e9ff03530c177310adb4aede47dbbe08225eced11e36ce38ff86572afec
                                                            • Instruction Fuzzy Hash: 2411F2B5C103498FCB20DF9AD489BDEFBF4EB48324F20845AD959A7200D379A944CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,06DFB8CD), ref: 06DFB957
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: c50bb8b1cde28740f121d5ccf7f70a60b6b946338ab5cd205a62bc2b61afa40d
                                                            • Instruction ID: 06bdcbc820279038041e06e059b084752d0e32cfd893955405f7669083921522
                                                            • Opcode Fuzzy Hash: c50bb8b1cde28740f121d5ccf7f70a60b6b946338ab5cd205a62bc2b61afa40d
                                                            • Instruction Fuzzy Hash: 1311F2B1C102498FDB50DF9AD444B9EBBF4EB88310F20846AD529B7250C774A944CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 06DFBE15
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 6f8c94b76b31804a817e442cf625533435208646ccd14c423c38aa47c0dba987
                                                            • Instruction ID: b2696b1d7187d82b7939a48599c6ffbb60d50e1165df1c7384c19648f1a62129
                                                            • Opcode Fuzzy Hash: 6f8c94b76b31804a817e442cf625533435208646ccd14c423c38aa47c0dba987
                                                            • Instruction Fuzzy Hash: 3211F2B5C102498FDB20DF9AD449B9EBBF8EB48310F20845AD619A7200D374A944CBA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,06DFB8CD), ref: 06DFB957
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493041618.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6df0000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: cc6ea9c142ecdbd0ae5fb0dd1414f00feeff07d87139814bb6d0b8ead2d836fa
                                                            • Instruction ID: ec09f376a60e6177505a1c17aed8a7c63b26d58cfe62c0a241b623ba7f7f4dcc
                                                            • Opcode Fuzzy Hash: cc6ea9c142ecdbd0ae5fb0dd1414f00feeff07d87139814bb6d0b8ead2d836fa
                                                            • Instruction Fuzzy Hash: DB11F2B5C002498FCB10DF9AD445BDEFBF4EB89324F20846AD569B3250C774A944CFA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 71ed2b981fc886371e897162719949098f61e52fd76d530e57155935ce592961
                                                            • Instruction ID: daf98fe4ce449435d6f092a3710269efde783e545872d871e0b7a81b22234397
                                                            • Opcode Fuzzy Hash: 71ed2b981fc886371e897162719949098f61e52fd76d530e57155935ce592961
                                                            • Instruction Fuzzy Hash: 2E419470E0030ADFEB65DFA5C89469EBBB2FF45354F204529E405EB284DF709981CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 3aa953ec8de53e277386600338c8a196b1dcedc2216c2af7f8333725019d44c1
                                                            • Instruction ID: 72e8e198e0ebc994c3ea033efeb52ec0ac2d78f0686665b43c960133dcb38124
                                                            • Opcode Fuzzy Hash: 3aa953ec8de53e277386600338c8a196b1dcedc2216c2af7f8333725019d44c1
                                                            • Instruction Fuzzy Hash: 1841C370E00305DFEB65CFA4C88469EBBB2FF45314F248929E405EB284EB70D886CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 936be77c11aaa602b4482db2812c68caac45bd83d5dd79fda9f07febbf8c6c0b
                                                            • Instruction ID: 4f9c5e144c770e995feee7ee7fade7fe52e1c37b22b70335fb867a7563dc8d53
                                                            • Opcode Fuzzy Hash: 936be77c11aaa602b4482db2812c68caac45bd83d5dd79fda9f07febbf8c6c0b
                                                            • Instruction Fuzzy Hash: 3E310331B003028FEB599BB4D45866E3BE3EF89254F248528D406EB381DF39DD86C795
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 1e2dd1d7a0272c8d2c0bb6b1415591cddd7b979cf46b285e64b37552709beb40
                                                            • Instruction ID: 3893bd9e7b1c7895657d2822d41c12e9750337715d28470ef02c0d1ec99e39e0
                                                            • Opcode Fuzzy Hash: 1e2dd1d7a0272c8d2c0bb6b1415591cddd7b979cf46b285e64b37552709beb40
                                                            • Instruction Fuzzy Hash: 7531D030B103068FEB599BB4D45866E3AE3BF89254F209538D406EB384DF39DD86CB95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \Obq
                                                            • API String ID: 0-2878401908
                                                            • Opcode ID: f40c2d5d8b6e40f5f2489e114d1d613b38720baf8f735dee6e3bdb5962b39c7b
                                                            • Instruction ID: 0c1d2eb563a74894993dbfcf7cad640c921a1bd47ff8cc7f7e32d7a2aed60d38
                                                            • Opcode Fuzzy Hash: f40c2d5d8b6e40f5f2489e114d1d613b38720baf8f735dee6e3bdb5962b39c7b
                                                            • Instruction Fuzzy Hash: A5F07A31A64219DBEB14DF94E999BAEBBB2FF84615F204119E502A72D8CBB41C41CFC0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b913733e28a8ee5a3df1d389a87a0891d6459b6ec8a6632dacc3dc18d93c72f
                                                            • Instruction ID: 2f87a757ac7ce52a0a2f8a8fda018cf0b1a07013efcd41f1cb533b6f700c435a
                                                            • Opcode Fuzzy Hash: 2b913733e28a8ee5a3df1d389a87a0891d6459b6ec8a6632dacc3dc18d93c72f
                                                            • Instruction Fuzzy Hash: 34A18174F102098BEF64DA6DD8947AE76B6FB89314F215429E409EB3C1CB39DCC18792
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06e9d63ccb987ed9a8eac04d61f06419d4cd33639df24a98a2116723ed0c1bf5
                                                            • Instruction ID: 6afbf4cb4540556ee65a2af58e38003bb7d39d6a400695269d059fd8abac9a0c
                                                            • Opcode Fuzzy Hash: 06e9d63ccb987ed9a8eac04d61f06419d4cd33639df24a98a2116723ed0c1bf5
                                                            • Instruction Fuzzy Hash: 7CA17174F102098BEF64DAADD4947AE76B6FB89314F215829E409EB3C1CA39DCC18751
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eed11d2e00ab875f947acd8047c78bd306ca7dff24b66f9a6fbb1b09e88b07aa
                                                            • Instruction ID: 8f9416b95e3c082b730ad3c2e181a23bd908d0236cf1c54bf037252b382f4627
                                                            • Opcode Fuzzy Hash: eed11d2e00ab875f947acd8047c78bd306ca7dff24b66f9a6fbb1b09e88b07aa
                                                            • Instruction Fuzzy Hash: 33B14A70E1020A8BEFA4CB68D4847ADB7B1FB45318F249966E454EB391C736DCC1CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fda1db4266b7621bce8151fef28268ff7a37f26e054e65d147c31bb8d6f28baa
                                                            • Instruction ID: 6af9257971d90997b3d43071bbc057495cfae261d60b51e94d31413094f219f7
                                                            • Opcode Fuzzy Hash: fda1db4266b7621bce8151fef28268ff7a37f26e054e65d147c31bb8d6f28baa
                                                            • Instruction Fuzzy Hash: D7A11A70E1020A8BEFA4CB58D484BADB7B1FB45318F649926E419EB391D736DCC1CB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e017fbd41fd9faa54b1cd01194f5a085f2bc06f195a25f31e96a48a7470736f9
                                                            • Instruction ID: 2c50e3df1ab19e4b3ac752779d22fa4a795dc9d7db18fe198dff2d773b43f037
                                                            • Opcode Fuzzy Hash: e017fbd41fd9faa54b1cd01194f5a085f2bc06f195a25f31e96a48a7470736f9
                                                            • Instruction Fuzzy Hash: 7FA18D30A003058FEB64DF68D958BADB7F2EF84314F559569E419AB390DB35EC86CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55922742a5676b83e4813963927a351d931e65f8ee5a9d526dd44c8040d9e6bb
                                                            • Instruction ID: d22933e66a1971eb5cbae1f801d3f4dc4cdd839a725e0c219aff60eaa493dad5
                                                            • Opcode Fuzzy Hash: 55922742a5676b83e4813963927a351d931e65f8ee5a9d526dd44c8040d9e6bb
                                                            • Instruction Fuzzy Hash: 82916E31F003059BEB14DFA4D9D4AAE77B6EB84314F209929D806AB384DB34ED46CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 83a63522eae14cb5a4e72e3867bef2cf7f65b311dbf022b6093f836576905315
                                                            • Instruction ID: 30cee0c0234f092b264f44dd1db73397b4282550da1cf8b6981f816d816cb7bb
                                                            • Opcode Fuzzy Hash: 83a63522eae14cb5a4e72e3867bef2cf7f65b311dbf022b6093f836576905315
                                                            • Instruction Fuzzy Hash: F9916C71F003059BEB14DFA4D9D4AAE77B6EB84314F209929D806AB384DB34ED46CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 78c8ab94a1223e263c7c6a50aa8d6a2883249fdae5bf6ba58d3ec90c7c7e2baf
                                                            • Instruction ID: 83968f334a5d1fcf31787579dbec851800f39c0dcc3e41c34cc208d670804fa0
                                                            • Opcode Fuzzy Hash: 78c8ab94a1223e263c7c6a50aa8d6a2883249fdae5bf6ba58d3ec90c7c7e2baf
                                                            • Instruction Fuzzy Hash: A961B0B1F001214FEB149A6EC88466FBAD7AFD4224F254479E80EDB360DE79DD4287D2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c18759ad7dee1c5c3b18859e95cecc2099dc7ad4d74eda49f33b5e16d89b3d0e
                                                            • Instruction ID: 296c972804c978674c75e3e7415c05012f09034e28abc937cc15318183ef39cc
                                                            • Opcode Fuzzy Hash: c18759ad7dee1c5c3b18859e95cecc2099dc7ad4d74eda49f33b5e16d89b3d0e
                                                            • Instruction Fuzzy Hash: E5814B34B10606DFEF44DFA9D55479EB7F2AB88304F209528D50AEB3D4EA34DC868B81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1655567c31c46eb47e42a5fda5db90e69cb5ad20e1fa2488771b9724d3dfd4da
                                                            • Instruction ID: 96c1e9c4de79ff45ce1530c3a869ab9233ed9e4888202230240f15a8042b8020
                                                            • Opcode Fuzzy Hash: 1655567c31c46eb47e42a5fda5db90e69cb5ad20e1fa2488771b9724d3dfd4da
                                                            • Instruction Fuzzy Hash: 0F814E30B10606DBEF54DFA9D55475E77F2EF88304F209429D50AEB394EA34DC868B81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c19183169d237d48c75679c4b872eb321f4180382e0725b65bfe3afea24a1e8
                                                            • Instruction ID: 0f2178da4a9db9f62123e9dffe2bacfd1bcabfc3ec0e094bf236e22ea89e46f1
                                                            • Opcode Fuzzy Hash: 8c19183169d237d48c75679c4b872eb321f4180382e0725b65bfe3afea24a1e8
                                                            • Instruction Fuzzy Hash: 88814D71B10606DBEF44DFA9D55479E77F2AF88304F209429D50AEB394EA34DC868B81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7119e415b7bf9f3d071db7889b325e2509535c4981261255fb4bc5c648631736
                                                            • Instruction ID: eb6662a91a69280a3f817c78eaf37d2e24e71a6c8f00765e8fb6cc083f5fa2c1
                                                            • Opcode Fuzzy Hash: 7119e415b7bf9f3d071db7889b325e2509535c4981261255fb4bc5c648631736
                                                            • Instruction Fuzzy Hash: 7B912E30E1021ACBEF60DF68C990B9DB7B1FF89304F208599D549AB395DB70AA85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1fd5d154ca4d762fcdae09a7213b4d90060ae19114468df030bed09f54325f52
                                                            • Instruction ID: 0cfc1ef4039cec74d9635e9b6b55a45148cc849bea3d85ea9ba503be70d2ab8e
                                                            • Opcode Fuzzy Hash: 1fd5d154ca4d762fcdae09a7213b4d90060ae19114468df030bed09f54325f52
                                                            • Instruction Fuzzy Hash: DF914E30E1021ACBEF60DF68C990B9DB7B1FF89304F208599D549AB385DB70AA85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0e609e15ca5e8197ad1dd9b631745f84067366c63f6e36039b2f54e7baa98e89
                                                            • Instruction ID: 69aad23fa56ef5430e312ad25e52c4352fb234006f95845102fa8ada74577d86
                                                            • Opcode Fuzzy Hash: 0e609e15ca5e8197ad1dd9b631745f84067366c63f6e36039b2f54e7baa98e89
                                                            • Instruction Fuzzy Hash: F9714F70A012099FDB54DFA9C990A9DBBF6FF88304F249529E405EB395DB30EC86CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 02b5391a20dc10bec186610ca964e9e028a2cf4f090fd82a234c7b93f3f6b962
                                                            • Instruction ID: df19f53b0f32b987e09c7bce0c9911152c9957a24c594333c2ff72fd3559ae0c
                                                            • Opcode Fuzzy Hash: 02b5391a20dc10bec186610ca964e9e028a2cf4f090fd82a234c7b93f3f6b962
                                                            • Instruction Fuzzy Hash: 62714E74A012099FDB54DFA9C990A9DBBF6FF88304F248529D405EB395DB30EC86CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 41343f6f724c2f302d633990ec0a46747701d83a03e520521d35aecb18753f85
                                                            • Instruction ID: c55f18650a3dda24c4d04b2f42ba323ca3a0195370af04914aea0606de33a596
                                                            • Opcode Fuzzy Hash: 41343f6f724c2f302d633990ec0a46747701d83a03e520521d35aecb18753f85
                                                            • Instruction Fuzzy Hash: 1F51C471E01205DFEB64DB78E4446ADBBB2FB84329F108869E506D7281DF358D96CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9b7ba56c13459d1d8bf6db718c5e1f42f328ec39b6fd5a3f68a0a70058bb036
                                                            • Instruction ID: c16dc441679d57a3429e23a0c9f17883503b2668b29140ca637d53df3e789d42
                                                            • Opcode Fuzzy Hash: b9b7ba56c13459d1d8bf6db718c5e1f42f328ec39b6fd5a3f68a0a70058bb036
                                                            • Instruction Fuzzy Hash: 4451D5B4B212059BFF745A6CDC9472F3A5AD78D304F20052AE90AC73D4CA2CCCE187A2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ce78ce16ab2e25a65ce74fa35d2adad21cf2e7852973af3b4e49be8106e8004
                                                            • Instruction ID: 7ffb6c20bf858554e28ed7063477cd52e32c55160ebcbd5d90651e2d90f4c858
                                                            • Opcode Fuzzy Hash: 2ce78ce16ab2e25a65ce74fa35d2adad21cf2e7852973af3b4e49be8106e8004
                                                            • Instruction Fuzzy Hash: E051C3B4B312059BFF7456ACDC9472F265AE78D714F20052AE90AC77D4CA2CCCE187A2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ce85f5e908870611855a6c638f30a95f9756527398eb3b5c155d7cd2fbe55d64
                                                            • Instruction ID: db651ad0fb17b7083912afabc0c3f1efd45d0677973546204a938b3dc4d256bd
                                                            • Opcode Fuzzy Hash: ce85f5e908870611855a6c638f30a95f9756527398eb3b5c155d7cd2fbe55d64
                                                            • Instruction Fuzzy Hash: 1D413C71E107098BEF60CE99D980AAFFBB6EB94214F10492AE116D7690D731E9858F90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 34e175003077ec17b2a83b805de92160246fdac29aad7ffe9949ef159a0b1a81
                                                            • Instruction ID: f99b3c985e91698b079dd91ddcf5c19118731e0d1ed32b375f06651cfd7c4ab3
                                                            • Opcode Fuzzy Hash: 34e175003077ec17b2a83b805de92160246fdac29aad7ffe9949ef159a0b1a81
                                                            • Instruction Fuzzy Hash: A8318670E1070A8FDF15DFA5D8906DEBBB2EF45314F208929E405EB244DB74A986CB41
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: de5d8e4b5fe12d71baab424716925f8aac459d2fea47365737f3f7f05e06b6d4
                                                            • Instruction ID: 3f3b3e247b84702c8d682d363135275268621d6bd9df61d2041957c686fef0db
                                                            • Opcode Fuzzy Hash: de5d8e4b5fe12d71baab424716925f8aac459d2fea47365737f3f7f05e06b6d4
                                                            • Instruction Fuzzy Hash: F431A175E103058FEF608FA8C68066EB7A1FB45324F24982AD859EB2D1C234D981CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 62bd9d5696a53c1caa8b80d855ea0e4f78482d5e005be9da9554f37b6fcee8ac
                                                            • Instruction ID: cca33c85b3a4207aa7171b634745fb750b1bd58842622bfebc9aa6eabf16246b
                                                            • Opcode Fuzzy Hash: 62bd9d5696a53c1caa8b80d855ea0e4f78482d5e005be9da9554f37b6fcee8ac
                                                            • Instruction Fuzzy Hash: CD318470E142059FEB15CFA4D89869EB7F2EF89304F10C919E905E7341DB71AD46CB51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1875b10bd8c6f4d0cd6ad6066db8b315c6a0eaae511427baa0ef2c891f2d185c
                                                            • Instruction ID: b7591b6cad8e144eb28e85bc06ac82add12089715aeaa2fccf463c639125bfee
                                                            • Opcode Fuzzy Hash: 1875b10bd8c6f4d0cd6ad6066db8b315c6a0eaae511427baa0ef2c891f2d185c
                                                            • Instruction Fuzzy Hash: 4A317270E142098FDB19CFA5D89869EB7F2EF89304F10C919E916E7340DB71AD86CB51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9b49c899d262a075ce9a106cbc67ce641f3c33e29957fc1cce37834f8752bf94
                                                            • Instruction ID: 8b432dda5fa7f1e4b3f7702d6e055f58bf43430163f698eb0d9dc21eff1885fe
                                                            • Opcode Fuzzy Hash: 9b49c899d262a075ce9a106cbc67ce641f3c33e29957fc1cce37834f8752bf94
                                                            • Instruction Fuzzy Hash: 93218B76F01205DFEB50CF69E984AAEB7F5EB88710F109029E905E7390E735DD418B92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eddb7321021cd6c6ffd1415b0c2d81fa86018f99aef654924f9c2c0831cf35de
                                                            • Instruction ID: 2a4859177af52e2399c880560683c5ced85d66e8bc0e0a2c05c79e020f66fde9
                                                            • Opcode Fuzzy Hash: eddb7321021cd6c6ffd1415b0c2d81fa86018f99aef654924f9c2c0831cf35de
                                                            • Instruction Fuzzy Hash: C6218976F012059FEB40CFA9E984AAEB7F1EB88710F108025E905E7390E735DD418B92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4472508264.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_16fd000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 50d186c13f246bceb893912d1ab8ff4d8c6115261b815b322fc8681a27946c6b
                                                            • Instruction ID: d34fa65fd82e5292975efb681f2710554ff6567beff8372b8b3d0bb2f6607f0b
                                                            • Opcode Fuzzy Hash: 50d186c13f246bceb893912d1ab8ff4d8c6115261b815b322fc8681a27946c6b
                                                            • Instruction Fuzzy Hash: E22134B1504200EFDB15DF98DDC0B26BBA5FB84314F24C56DDA0A4B382C33AE407CA62
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4472508264.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_16fd000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f96edce2a6786b2d12395caa3edc74d6dba45409383efe35054367b1922afbd5
                                                            • Instruction ID: 3240de7a172573817bcbd1d6d8bf13ea1ddf7bf65241a11644408fb3d775b32f
                                                            • Opcode Fuzzy Hash: f96edce2a6786b2d12395caa3edc74d6dba45409383efe35054367b1922afbd5
                                                            • Instruction Fuzzy Hash: D921D4B1604244DFDB05DF58DDC0B26BFA5FB84319F24C66DDA094B396C336E846C661
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4472508264.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_16fd000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73c9f5e79e3c642ee4097b661c4e0d28e60200db4bdc0d96e7c9a29133d24b4a
                                                            • Instruction ID: e089c9b0499bede46e2d60066d3cdf6f1b3df7ce9d235b85a4c5dff95051f4cd
                                                            • Opcode Fuzzy Hash: 73c9f5e79e3c642ee4097b661c4e0d28e60200db4bdc0d96e7c9a29133d24b4a
                                                            • Instruction Fuzzy Hash: 4F214B715093C09FC703CF64D994711BF71AB46214F29C5DBD9898F2A7C33A981ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c5fbf1a3eac57d99769056d532b6cf184d11010026229c5d298f3b4ebc6d1be6
                                                            • Instruction ID: ac0e28ad7497c28b39cc0abcb4f712ed6d06b98c153b6ccd2cc76ca2595e96d4
                                                            • Opcode Fuzzy Hash: c5fbf1a3eac57d99769056d532b6cf184d11010026229c5d298f3b4ebc6d1be6
                                                            • Instruction Fuzzy Hash: D521E171B012159FEF44CA68E9547ADB7B3EF84314F149425E809EB3C0DB30ED968B80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8df5186142ac0fab901278b9904016ecb595571444ccab18060c24ad27b5fb1b
                                                            • Instruction ID: e71ddeeed96d0b1253face9a74c0c2674988c8ec771262098678ee40ddafd727
                                                            • Opcode Fuzzy Hash: 8df5186142ac0fab901278b9904016ecb595571444ccab18060c24ad27b5fb1b
                                                            • Instruction Fuzzy Hash: A41193B5E002168FDF68DB68D8811DEF7B5EB89310F10996AD119EB340DA31DA81CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df7e28dd82b058796f10ab61bc51699cbf2e084c40d9070de1fe425982b1698a
                                                            • Instruction ID: fdb9f886a1c2dbce8615e3c576acf17f288b0d8d76f23bea055444cb20839ec3
                                                            • Opcode Fuzzy Hash: df7e28dd82b058796f10ab61bc51699cbf2e084c40d9070de1fe425982b1698a
                                                            • Instruction Fuzzy Hash: 2511A136B10225CBEB549669DC146AE73F6EBC8315F008539D50AE7394EE35DC068BD2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4738c0c6b5378e1aadcb22b76d1444ccf1a40974f7c44a16699c60643e744848
                                                            • Instruction ID: b83ec3f297abdc7e9b35e55aaa6a81f8eac03061ac65539622c5541e1a800017
                                                            • Opcode Fuzzy Hash: 4738c0c6b5378e1aadcb22b76d1444ccf1a40974f7c44a16699c60643e744848
                                                            • Instruction Fuzzy Hash: A9119131D1471E8BDF21CFA5C4406DEBBB5BF85300F10452AD805FB240EBB1A985CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 732e0413e4e89f6e664e6b10afd820c399e6f1e7eba7f39859e45aa3e9260aed
                                                            • Instruction ID: d9f85902f9dfc42aa165cc5eddf6f92831d1da480f69c1bad2b99a0d41bb5279
                                                            • Opcode Fuzzy Hash: 732e0413e4e89f6e664e6b10afd820c399e6f1e7eba7f39859e45aa3e9260aed
                                                            • Instruction Fuzzy Hash: 63014C76F002014FDB21C5B8D46836E6BD2CBC5214F10482AE509CB380DE24CD868395
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4f1269f92b69fe04eae77661c808ecda6c21e2b4c5b312861430916c4252595c
                                                            • Instruction ID: bb4c9ceef029ddec787f0cdb9d1e127908831c289455c85cc3f089bc05cd176b
                                                            • Opcode Fuzzy Hash: 4f1269f92b69fe04eae77661c808ecda6c21e2b4c5b312861430916c4252595c
                                                            • Instruction Fuzzy Hash: 51014735B103101FE751967CE85876FB7E2DB86318F10883AF00ADB392CE28DD828781
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a76397adaf566741830289366d4f59b73d3ed0fcf5f2f48a511316b2f66c4980
                                                            • Instruction ID: 254dd8eed5b5af874cec9444091ba722a3e309d14468e19bd42c7a6faa00dc75
                                                            • Opcode Fuzzy Hash: a76397adaf566741830289366d4f59b73d3ed0fcf5f2f48a511316b2f66c4980
                                                            • Instruction Fuzzy Hash: AE01A775700301CFEBA5866CD55871EBBE6EBC9315F20A829E20ECB3D1D929ED828355
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4472508264.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_16fd000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5579b083a50cc5d9e4ccc55ce504f2965e3ec9196ae8fb77b77903d6534710be
                                                            • Instruction ID: d804eda0baefb89508c4f700caadebbdba8ef266c814f5ed2db6bfe023ef3ea3
                                                            • Opcode Fuzzy Hash: 5579b083a50cc5d9e4ccc55ce504f2965e3ec9196ae8fb77b77903d6534710be
                                                            • Instruction Fuzzy Hash: 29118B75504284CFDB06CF54D9C4B15BFA2FB84218F24C6ADD9494B796C33AE44ACB51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4e7ac9d235858748a79781badc04ea7ad9313601abe6b37d85f04105134e7fff
                                                            • Instruction ID: 3b8546026a1325d2a7dd2acaa32c819f4b6df1f6cf02473970f6463dcaa42b48
                                                            • Opcode Fuzzy Hash: 4e7ac9d235858748a79781badc04ea7ad9313601abe6b37d85f04105134e7fff
                                                            • Instruction Fuzzy Hash: F611B0B5D01259AFDB00DF9AD885ADEFFB8FB48314F50812AE918A7240C374A954CFE5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 014fd97800b719be9be256289ba4511591b638d38f26111b8ef25d6b52d7ee51
                                                            • Instruction ID: c23b1c403c76dbbb530e0ee1284fca5b2567882eaaf207985298aa287294386d
                                                            • Opcode Fuzzy Hash: 014fd97800b719be9be256289ba4511591b638d38f26111b8ef25d6b52d7ee51
                                                            • Instruction Fuzzy Hash: CC01A231B002118BEB64957DD54872FA6DADBC9614F209839E20EC73C0ED69EC424395
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6debabc6838fe2645fb50de93cd1376ae340059bcb0987677eccea9dc893e7f4
                                                            • Instruction ID: ae2cdcfa920e8e4d0c59474ad8454080b89f80e792c1f6242e670831f3fda70c
                                                            • Opcode Fuzzy Hash: 6debabc6838fe2645fb50de93cd1376ae340059bcb0987677eccea9dc893e7f4
                                                            • Instruction Fuzzy Hash: A911BDB5D01219AFDB00DF9AD985ADEFBB4FB48314F10822AE918B7240C374A954CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e9f1884c98b8227d0f38a9722db9e25bb8dcde509bdf73a65a7a8339b308d95e
                                                            • Instruction ID: 9743553fb996698565435bbabb3ecc85a0d679bd2a0fd3d379731dae8ecf4ba7
                                                            • Opcode Fuzzy Hash: e9f1884c98b8227d0f38a9722db9e25bb8dcde509bdf73a65a7a8339b308d95e
                                                            • Instruction Fuzzy Hash: 0E01D135B102110BEB75D5BDD46872F66D6DBC9628F20882AF50AC7380DE25DD824396
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1b5779dc15679329c524428717bd3d7e190e9f74e24823ac202a80dea9598f64
                                                            • Instruction ID: c54ddaeeeddb361b4028c5e5275924a234c2b7c8540072b2f8d100c662c5d34b
                                                            • Opcode Fuzzy Hash: 1b5779dc15679329c524428717bd3d7e190e9f74e24823ac202a80dea9598f64
                                                            • Instruction Fuzzy Hash: 8901D175B002118BEB6585BCD54872FA7DBEBC8615F209839E20ECB3C0ED29EC824395
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea9f90ea5e08b2e38662cc8ee1694f07c7351639cc71b2ff9b815c6070fcc34a
                                                            • Instruction ID: a68e669853e1ab2b8e86eefd4bfbcc472925c6935d72994a67d923c1046a57ac
                                                            • Opcode Fuzzy Hash: ea9f90ea5e08b2e38662cc8ee1694f07c7351639cc71b2ff9b815c6070fcc34a
                                                            • Instruction Fuzzy Hash: 8201D135B102155BEB60D66DE44872FB7E6EB8A718F108839E50AD7381DE25EC828785
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 43eff16cca2c6072c405f85ce2c11b5cc4e33cf0d2f1e33c0f75c57d66a25ce5
                                                            • Instruction ID: 8aae74bf9570ed60fed9fc06f35bc9c3c18207c1a2f7e9f8202d08d79531a66c
                                                            • Opcode Fuzzy Hash: 43eff16cca2c6072c405f85ce2c11b5cc4e33cf0d2f1e33c0f75c57d66a25ce5
                                                            • Instruction Fuzzy Hash: F7018136B101259BEB9595A9DD143AE72EBABC8215F004136D60AE7284EE25CC1687D2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e5e5ca233552b8cfaa4ca062ae518641e66f8af510c2f594d2aa580350e9a19
                                                            • Instruction ID: db558f096ba7e7d7c3e1d059d6781595546ea831d65be020b2656226689be462
                                                            • Opcode Fuzzy Hash: 8e5e5ca233552b8cfaa4ca062ae518641e66f8af510c2f594d2aa580350e9a19
                                                            • Instruction Fuzzy Hash: EA01F4B1F22328ABDB14DA69E840A9EB776EB84714F204539E905EB380DB31AC41C7C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b02033aacef49996b4cf93f1f1e51190a933cde1f571e1fcd23a89474ba532b0
                                                            • Instruction ID: cd4d42525604d8e6488835457c5e9540ed421d5872609567288726c2d1dfa819
                                                            • Opcode Fuzzy Hash: b02033aacef49996b4cf93f1f1e51190a933cde1f571e1fcd23a89474ba532b0
                                                            • Instruction Fuzzy Hash: 24E0C274E10308AFEF50CEB0D90975E73ECEB0121CF2088A4D808DB286E172CA919780
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9fe1ed44de82a22f53902a3c146a3b3963b3ae2d6432ef043069ac53a80d5022
                                                            • Instruction ID: f13c5c6a9f7d2d284cbbeccd4ec89161c5826180510d9cacc7d956009fe02e09
                                                            • Opcode Fuzzy Hash: 9fe1ed44de82a22f53902a3c146a3b3963b3ae2d6432ef043069ac53a80d5022
                                                            • Instruction Fuzzy Hash: BCE01275E142099EEF90CEB0DB4935E73E8EB4121CF205DA5D408EB285E176CA919780
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-2843079600
                                                            • Opcode ID: 7439fa20378707adddeb7a0afb34c7ea05e235e8a86d844907785504f17743b0
                                                            • Instruction ID: 2dba09a9415b65d6d00e54674d6a6dcc2fa5aa0d1da7b024cb560630ce85a1d1
                                                            • Opcode Fuzzy Hash: 7439fa20378707adddeb7a0afb34c7ea05e235e8a86d844907785504f17743b0
                                                            • Instruction Fuzzy Hash: 61121E70E00219CFEF64DF69C894A9DB7B2BF89704F209569D409AB394DB30AD81CF91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-1273862796
                                                            • Opcode ID: f3d57513936f419fc751bdb33b9aace6e7ff5dd4cf278d13b2fb9da3aca032a5
                                                            • Instruction ID: aa057b92b61c39e30041efbe08120bdf1faf583f554de06d145adbc68505ca1d
                                                            • Opcode Fuzzy Hash: f3d57513936f419fc751bdb33b9aace6e7ff5dd4cf278d13b2fb9da3aca032a5
                                                            • Instruction Fuzzy Hash: EF917D70A0030D9FEB68DB69D584BAEB7F2EF44305F209539E801AB295DB749D81CF80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-981061697
                                                            • Opcode ID: eae55d3e04dd82db44eb48b422a01f8531471e80e8884ccaa34d01bc95924f23
                                                            • Instruction ID: 2d94b7a480c89715d4a0229fc95d7ebe63b8d1326fc7a04930739a5cd62048fe
                                                            • Opcode Fuzzy Hash: eae55d3e04dd82db44eb48b422a01f8531471e80e8884ccaa34d01bc95924f23
                                                            • Instruction Fuzzy Hash: 22F15D74B01209DFDB58DFA9D498A6EB7B2FF88305F249569D4059B394CB34EC82CB81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-3723351465
                                                            • Opcode ID: 18261871fac8ba1ba3471bf5f2fb57c4bd31d3ac6f33459f0940fea7fc93b6ae
                                                            • Instruction ID: 97e1c07d2a17c203d6e623bff64631b2e70d176dd5b2537311aa1eac4894e715
                                                            • Opcode Fuzzy Hash: 18261871fac8ba1ba3471bf5f2fb57c4bd31d3ac6f33459f0940fea7fc93b6ae
                                                            • Instruction Fuzzy Hash: E0717370E1021A8FEB68DFA8D4806ADB7B2FF84704F11996AD405DF284DB76DD85CB81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: 0333f0a47b7fd80e33df3d1803bd3364e178202d799d811a97f851ab1ca1db99
                                                            • Instruction ID: e3976b29aeb056f0473ce4c09ecd8dccf443951edd165b9113b964e49e2870b1
                                                            • Opcode Fuzzy Hash: 0333f0a47b7fd80e33df3d1803bd3364e178202d799d811a97f851ab1ca1db99
                                                            • Instruction Fuzzy Hash: DCB13B30B10209CFEB68DFA9D4946AEB7B2FF84304F649569D405AB394DB35DC82CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR]q$LR]q$$]q$$]q
                                                            • API String ID: 0-3527005858
                                                            • Opcode ID: 4880da48d0cb0ea1e9e2018d2e8d8eec784f748aeef6c410b6c3942e73d5afe5
                                                            • Instruction ID: 1426d43960c929e7db3768fa5881fc3dd77283560a7b01a8a3febf6370d21600
                                                            • Opcode Fuzzy Hash: 4880da48d0cb0ea1e9e2018d2e8d8eec784f748aeef6c410b6c3942e73d5afe5
                                                            • Instruction Fuzzy Hash: 7351D4307003069FEB58EB29D854A6B77F6FF89304F208969E4069B394DB34EC81CB95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4493193297.0000000006E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6e00000_TECHNICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: 455a9e51a21067342191bf8ed5585f877c1f5a878081bce022dd9a24027e8001
                                                            • Instruction ID: 0ae2d5afe1e6204b4f8d9dfa21ed08149279405602c997537cb7aebaafcb1f15
                                                            • Opcode Fuzzy Hash: 455a9e51a21067342191bf8ed5585f877c1f5a878081bce022dd9a24027e8001
                                                            • Instruction Fuzzy Hash: A8517D70A103098FEF65DB68D5846ADB3B6EB84304F249939E405A7385DB34EC82CB91

                                                            Execution Graph

                                                            Execution Coverage:9.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:100
                                                            Total number of Limit Nodes:4
                                                            execution_graph 37170 962d530 37171 962d560 Wow64SetThreadContext 37170->37171 37173 962d5bd 37171->37173 37174 962dbf0 37175 962dc3b ReadProcessMemory 37174->37175 37177 962dc7f 37175->37177 37178 31ad5c8 37179 31ad5cd 37178->37179 37183 31ad7a8 37179->37183 37187 31ad797 37179->37187 37180 31ad6fb 37184 31ad7ad 37183->37184 37191 31abca0 37184->37191 37188 31ad7a8 37187->37188 37189 31abca0 DuplicateHandle 37188->37189 37190 31ad7d6 37189->37190 37190->37180 37192 31ad810 DuplicateHandle 37191->37192 37194 31ad7d6 37192->37194 37194->37180 37195 962db00 37196 962db48 WriteProcessMemory 37195->37196 37198 962db9f 37196->37198 37199 962da40 37200 962da80 VirtualAllocEx 37199->37200 37202 962dabd 37200->37202 37203 83a5d58 37204 83a5da6 DrawTextExW 37203->37204 37206 83a5dfe 37204->37206 37207 962d480 37208 962d4c0 ResumeThread 37207->37208 37210 962d4f1 37208->37210 37215 31a4668 37216 31a467a 37215->37216 37217 31a4686 37216->37217 37221 31a4779 37216->37221 37226 31a3e1c 37217->37226 37219 31a46a5 37222 31a479d 37221->37222 37230 31a4878 37222->37230 37234 31a4888 37222->37234 37227 31a3e27 37226->37227 37229 31a707e 37227->37229 37242 31a5c5c 37227->37242 37229->37219 37231 31a4888 37230->37231 37232 31a498c 37231->37232 37238 31a449c 37231->37238 37235 31a488d 37234->37235 37236 31a498c 37235->37236 37237 31a449c CreateActCtxA 37235->37237 37237->37236 37239 31a5918 CreateActCtxA 37238->37239 37241 31a59db 37239->37241 37243 31a5c67 37242->37243 37246 31a5c7c 37243->37246 37245 31a7275 37245->37229 37247 31a5c87 37246->37247 37250 31a5cac 37247->37250 37249 31a735a 37249->37245 37251 31a5cb7 37250->37251 37254 31a5cdc 37251->37254 37253 31a744d 37253->37249 37255 31a5ce7 37254->37255 37257 31a874b 37255->37257 37261 31aadf8 37255->37261 37256 31a8789 37256->37253 37257->37256 37265 31acee9 37257->37265 37270 31acef8 37257->37270 37275 31aae30 37261->37275 37278 31aae1f 37261->37278 37262 31aae0e 37262->37257 37266 31acf19 37265->37266 37267 31acf3d 37266->37267 37287 31ad0a8 37266->37287 37291 31ad097 37266->37291 37267->37256 37271 31acf19 37270->37271 37272 31acf3d 37271->37272 37273 31ad0a8 GetModuleHandleW 37271->37273 37274 31ad097 GetModuleHandleW 37271->37274 37272->37256 37273->37272 37274->37272 37282 31aaf19 37275->37282 37276 31aae3f 37276->37262 37279 31aae30 37278->37279 37281 31aaf19 GetModuleHandleW 37279->37281 37280 31aae3f 37280->37262 37281->37280 37283 31aaf39 37282->37283 37284 31aaf5c 37282->37284 37283->37284 37285 31ab160 GetModuleHandleW 37283->37285 37284->37276 37286 31ab18d 37285->37286 37286->37276 37288 31ad0b5 37287->37288 37289 31ad0ef 37288->37289 37295 31abc80 37288->37295 37289->37267 37292 31ad0b5 37291->37292 37293 31ad0ef 37292->37293 37294 31abc80 GetModuleHandleW 37292->37294 37293->37267 37294->37293 37296 31abc8b 37295->37296 37298 31ade08 37296->37298 37299 31ad2a4 37296->37299 37298->37298 37300 31ad2af 37299->37300 37301 31a5cdc GetModuleHandleW 37300->37301 37302 31ade77 37301->37302 37302->37298 37211 962e188 37212 962e211 CreateProcessA 37211->37212 37214 962e3d3 37212->37214 37214->37214

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 877 962e17c-962e21d 881 962e256-962e276 877->881 882 962e21f-962e229 877->882 887 962e278-962e282 881->887 888 962e2af-962e2de 881->888 882->881 883 962e22b-962e22d 882->883 885 962e250-962e253 883->885 886 962e22f-962e239 883->886 885->881 889 962e23b 886->889 890 962e23d-962e24c 886->890 887->888 891 962e284-962e286 887->891 898 962e2e0-962e2ea 888->898 899 962e317-962e3d1 CreateProcessA 888->899 889->890 890->890 892 962e24e 890->892 893 962e288-962e292 891->893 894 962e2a9-962e2ac 891->894 892->885 896 962e296-962e2a5 893->896 897 962e294 893->897 894->888 896->896 900 962e2a7 896->900 897->896 898->899 901 962e2ec-962e2ee 898->901 910 962e3d3-962e3d9 899->910 911 962e3da-962e460 899->911 900->894 903 962e2f0-962e2fa 901->903 904 962e311-962e314 901->904 905 962e2fe-962e30d 903->905 906 962e2fc 903->906 904->899 905->905 907 962e30f 905->907 906->905 907->904 910->911 921 962e462-962e466 911->921 922 962e470-962e474 911->922 921->922 925 962e468 921->925 923 962e476-962e47a 922->923 924 962e484-962e488 922->924 923->924 926 962e47c 923->926 927 962e48a-962e48e 924->927 928 962e498-962e49c 924->928 925->922 926->924 927->928 929 962e490 927->929 930 962e4ae-962e4b5 928->930 931 962e49e-962e4a4 928->931 929->928 932 962e4b7-962e4c6 930->932 933 962e4cc 930->933 931->930 932->933 934 962e4cd 933->934 934->934
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0962E3BE
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 4e25a5be605470f8b697e1412ade613ee7adf926782a62b3bc85b92842fb1b1a
                                                            • Instruction ID: e7125c01e1b3ec3020917eb761acdac4dad593614b3b84668b6b76f1f12bf38e
                                                            • Opcode Fuzzy Hash: 4e25a5be605470f8b697e1412ade613ee7adf926782a62b3bc85b92842fb1b1a
                                                            • Instruction Fuzzy Hash: 74A16E71D006298FDF25CFA8C8417EDBBB2FF48314F1485A9E819A7280DB759985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 936 962e188-962e21d 938 962e256-962e276 936->938 939 962e21f-962e229 936->939 944 962e278-962e282 938->944 945 962e2af-962e2de 938->945 939->938 940 962e22b-962e22d 939->940 942 962e250-962e253 940->942 943 962e22f-962e239 940->943 942->938 946 962e23b 943->946 947 962e23d-962e24c 943->947 944->945 948 962e284-962e286 944->948 955 962e2e0-962e2ea 945->955 956 962e317-962e3d1 CreateProcessA 945->956 946->947 947->947 949 962e24e 947->949 950 962e288-962e292 948->950 951 962e2a9-962e2ac 948->951 949->942 953 962e296-962e2a5 950->953 954 962e294 950->954 951->945 953->953 957 962e2a7 953->957 954->953 955->956 958 962e2ec-962e2ee 955->958 967 962e3d3-962e3d9 956->967 968 962e3da-962e460 956->968 957->951 960 962e2f0-962e2fa 958->960 961 962e311-962e314 958->961 962 962e2fe-962e30d 960->962 963 962e2fc 960->963 961->956 962->962 964 962e30f 962->964 963->962 964->961 967->968 978 962e462-962e466 968->978 979 962e470-962e474 968->979 978->979 982 962e468 978->982 980 962e476-962e47a 979->980 981 962e484-962e488 979->981 980->981 983 962e47c 980->983 984 962e48a-962e48e 981->984 985 962e498-962e49c 981->985 982->979 983->981 984->985 986 962e490 984->986 987 962e4ae-962e4b5 985->987 988 962e49e-962e4a4 985->988 986->985 989 962e4b7-962e4c6 987->989 990 962e4cc 987->990 988->987 989->990 991 962e4cd 990->991 991->991
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0962E3BE
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 0ac8411be65935c1f702d149f46f934a350854c2e2e6f27f509dd01bcf8a5203
                                                            • Instruction ID: 091d92bad0ee94224f19285b9016cbc6a8aabc75519df3de0109f35de5ab2fe2
                                                            • Opcode Fuzzy Hash: 0ac8411be65935c1f702d149f46f934a350854c2e2e6f27f509dd01bcf8a5203
                                                            • Instruction Fuzzy Hash: 09914D71D016298FDF25CFA8C8417DDBBB2FF48314F1485A9E809A7240DB759985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 993 31aaf19-31aaf37 994 31aaf39-31aaf46 call 31a98a0 993->994 995 31aaf63-31aaf67 993->995 1002 31aaf48 994->1002 1003 31aaf5c 994->1003 996 31aaf7b-31aafbc 995->996 997 31aaf69-31aaf73 995->997 1004 31aafc9-31aafd7 996->1004 1005 31aafbe-31aafc6 996->1005 997->996 1050 31aaf4e call 31ab1b0 1002->1050 1051 31aaf4e call 31ab1c0 1002->1051 1003->995 1007 31aaffb-31aaffd 1004->1007 1008 31aafd9-31aafde 1004->1008 1005->1004 1006 31aaf54-31aaf56 1006->1003 1009 31ab098-31ab116 1006->1009 1010 31ab000-31ab007 1007->1010 1011 31aafe9 1008->1011 1012 31aafe0-31aafe7 call 31aa270 1008->1012 1043 31ab118-31ab11c 1009->1043 1044 31ab11d-31ab158 1009->1044 1014 31ab009-31ab011 1010->1014 1015 31ab014-31ab01b 1010->1015 1013 31aafeb-31aaff9 1011->1013 1012->1013 1013->1010 1014->1015 1018 31ab028-31ab031 call 31aa280 1015->1018 1019 31ab01d-31ab025 1015->1019 1024 31ab03e-31ab043 1018->1024 1025 31ab033-31ab03b 1018->1025 1019->1018 1026 31ab061-31ab06e 1024->1026 1027 31ab045-31ab04c 1024->1027 1025->1024 1034 31ab070-31ab08e 1026->1034 1035 31ab091-31ab097 1026->1035 1027->1026 1029 31ab04e-31ab05e call 31aa290 call 31aa2a0 1027->1029 1029->1026 1034->1035 1043->1044 1045 31ab15a-31ab15d 1044->1045 1046 31ab160-31ab18b GetModuleHandleW 1044->1046 1045->1046 1047 31ab18d-31ab193 1046->1047 1048 31ab194-31ab1a8 1046->1048 1047->1048 1050->1006 1051->1006
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 031AB17E
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187537672.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_31a0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 12cb33d8d4277d41b0c5dc82542316e1c8c6bccf6df92dc760d1eb706084f3cf
                                                            • Instruction ID: 0ae4f9e5fdc002395ed884e22e0ad03fa06f42db64a8f3d16c56766f3ee6eaa1
                                                            • Opcode Fuzzy Hash: 12cb33d8d4277d41b0c5dc82542316e1c8c6bccf6df92dc760d1eb706084f3cf
                                                            • Instruction Fuzzy Hash: 6A8156B4A04B458FD724DF29D45479ABBF5FF88301F04892EE48AD7A40DB35E845CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1052 31a590c-31a5916 1053 31a5918-31a591c 1052->1053 1054 31a591d-31a59d9 CreateActCtxA 1052->1054 1053->1054 1056 31a59db-31a59e1 1054->1056 1057 31a59e2-31a5a3c 1054->1057 1056->1057 1064 31a5a4b-31a5a4f 1057->1064 1065 31a5a3e-31a5a41 1057->1065 1066 31a5a60 1064->1066 1067 31a5a51-31a5a5d 1064->1067 1065->1064 1068 31a5a61 1066->1068 1067->1066 1068->1068
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 031A59C9
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187537672.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_31a0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: fe45ba0ea494ff39ee3a130763830cb71597e47b83f0757d483c129e571da999
                                                            • Instruction ID: 9620f6b94cd3ba2e17d32b56c8c1d8eb0be0445b77817ffa1fa120ba4d84ac6f
                                                            • Opcode Fuzzy Hash: fe45ba0ea494ff39ee3a130763830cb71597e47b83f0757d483c129e571da999
                                                            • Instruction Fuzzy Hash: 7441EFB4D0462DCBDB24CFA9C884A8DBBB6BF49304F20806AD408AB251DB756946CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1070 31a449c-31a59d9 CreateActCtxA 1074 31a59db-31a59e1 1070->1074 1075 31a59e2-31a5a3c 1070->1075 1074->1075 1082 31a5a4b-31a5a4f 1075->1082 1083 31a5a3e-31a5a41 1075->1083 1084 31a5a60 1082->1084 1085 31a5a51-31a5a5d 1082->1085 1083->1082 1086 31a5a61 1084->1086 1085->1084 1086->1086
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 031A59C9
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187537672.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_31a0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 3348d14f096c6598509f21b8b76212da95539c6ea424c78cae4cb98171880849
                                                            • Instruction ID: e65ebe6e1b72ef7b87347eeec7c3f1777a2879ec40c57f0f2888ff0afc427848
                                                            • Opcode Fuzzy Hash: 3348d14f096c6598509f21b8b76212da95539c6ea424c78cae4cb98171880849
                                                            • Instruction Fuzzy Hash: D141D1B4D0472DCBDB24DFA9C884BDDBBB6BF49304F20806AD408AB251DB716946CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1088 962daf8-962db4e 1091 962db50-962db5c 1088->1091 1092 962db5e-962db9d WriteProcessMemory 1088->1092 1091->1092 1094 962dba6-962dbd6 1092->1094 1095 962db9f-962dba5 1092->1095 1095->1094
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0962DB90
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 7bb0d648d4b393d69e7bf637ca8da546336ab5d19e82692f281cb25a5218ad91
                                                            • Instruction ID: a4cd4eef4199643fe8b271ad62e36808ec131cecb257a8a71f346917e71422ba
                                                            • Opcode Fuzzy Hash: 7bb0d648d4b393d69e7bf637ca8da546336ab5d19e82692f281cb25a5218ad91
                                                            • Instruction Fuzzy Hash: B52155B1D003599FCB10DFA9C881BEEBBF4FB88310F10842AE919A7240C7789941CFA1
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0962D5AE
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 646fc10da2053fcc328453c45c58ff108f802fd66553595c1413eb1c5678911a
                                                            • Instruction ID: 5c49837081148aa70ac44f371a61625a46c09a1312bbbc006a2fb17375f6b6ca
                                                            • Opcode Fuzzy Hash: 646fc10da2053fcc328453c45c58ff108f802fd66553595c1413eb1c5678911a
                                                            • Instruction Fuzzy Hash: 99217A71D007098FCB10CFAAC4457EEBBF4EF49314F20802AD519A7280D7789545CFA1
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 083A5DEF
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195146819.00000000083A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 083A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_83a0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: 1b2b7ce64f838350961c6630cfbf6c2ba61f95d8599d69d9dd4c47ca059bbc05
                                                            • Instruction ID: 7c031d8e19fcf6fd9e6d8bef1b6ed448068c65694ba1b8e58b32b88716ab349c
                                                            • Opcode Fuzzy Hash: 1b2b7ce64f838350961c6630cfbf6c2ba61f95d8599d69d9dd4c47ca059bbc05
                                                            • Instruction Fuzzy Hash: EB31B1B5D012499FDB10CF99D884ADEFBF5FB88320F14846EE919A7210D374A954CFA1
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 083A5DEF
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195146819.00000000083A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 083A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_83a0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: d2747eaa3c5f9e4347828512a1448d491594b2f0748edcf62d8459b9fb273f1e
                                                            • Instruction ID: 2afa83b7be23e5067bea704736972d3d30a7c1e877d4086ce19f039b1e4ecc5b
                                                            • Opcode Fuzzy Hash: d2747eaa3c5f9e4347828512a1448d491594b2f0748edcf62d8459b9fb273f1e
                                                            • Instruction Fuzzy Hash: C621C0B5D003499FDB10CF9AD884A9EFBF5FB48310F14842EE919A7210D374A944CFA0
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0962DB90
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 3e422183fb776eb251d79ce4a74fc02e6e37f633d7c8342df9dd94b674ff0ac5
                                                            • Instruction ID: ad081f2e41a2bdf452843b6b7f38e401ec877bb6384fb2400fa1d1e85e4f435e
                                                            • Opcode Fuzzy Hash: 3e422183fb776eb251d79ce4a74fc02e6e37f633d7c8342df9dd94b674ff0ac5
                                                            • Instruction Fuzzy Hash: 982113B5D003599FCB10DFA9C885BDEBBF5FB88310F10842AE919A7240D7789954DBA1
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0962DC70
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: e5a63d82ff5a947663d0505fc4452df579537ea10befe47f082be24026afcbfe
                                                            • Instruction ID: 397759607959634ec78fadbe1d3cf2c577ecc6c58b7fcf85fb07d18f39f6ba5c
                                                            • Opcode Fuzzy Hash: e5a63d82ff5a947663d0505fc4452df579537ea10befe47f082be24026afcbfe
                                                            • Instruction Fuzzy Hash: A12148B5D003599FDB10DFAAC885AEEFBF4FF48320F10842AE919A7240C7749541DBA1
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,031AD7D6,?,?,?,?,?), ref: 031AD897
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187537672.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_31a0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 517ccdff063c6fc6a31bbc45be2461b1d643fb75e1d896012c309872d9b34a69
                                                            • Instruction ID: 2a84aa7033c82e6b3f3c8fb70c96da6e1d6d1ded387961cee98ebb31483247fd
                                                            • Opcode Fuzzy Hash: 517ccdff063c6fc6a31bbc45be2461b1d643fb75e1d896012c309872d9b34a69
                                                            • Instruction Fuzzy Hash: F72116B5C002489FDB10DFAAD985ADEFFF8EB48310F14841AE918A3310D374A954CFA1
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,031AD7D6,?,?,?,?,?), ref: 031AD897
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187537672.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_31a0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 316517703f1255ca38ae330378f59be620e655277e9ac4872e610c4138643254
                                                            • Instruction ID: 64039be6364fedaeaac19e2d8cbd716e14ab1f0a3d31b25dd7e80df6b3870c1b
                                                            • Opcode Fuzzy Hash: 316517703f1255ca38ae330378f59be620e655277e9ac4872e610c4138643254
                                                            • Instruction Fuzzy Hash: CD2116B5D007489FDB10CF9AD584ADEFBF8EB48310F14841AE918A3310D374A954CFA1
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0962DC70
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: ec5aaf9aeda4c552fbf976b2638b4b0b3cccfb574eb8e927c37af788e5a4b0ce
                                                            • Instruction ID: 8f58624277529b85cf8d43783a5603f5f02e5653d9ec617f94b678edb767783c
                                                            • Opcode Fuzzy Hash: ec5aaf9aeda4c552fbf976b2638b4b0b3cccfb574eb8e927c37af788e5a4b0ce
                                                            • Instruction Fuzzy Hash: E12128B1D003599FCB10DFAAC845ADEFBF5FF48310F108429E919A7240C7749541DBA1
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0962D5AE
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 08fc4884f3e02f14ef1bda060e383b56bbbe0adbcb27e63d96bec62c668aa8e0
                                                            • Instruction ID: dd33c86aab23bef4461467164e033f7a13f835f38dd5bfd6a3b1c103a17343fa
                                                            • Opcode Fuzzy Hash: 08fc4884f3e02f14ef1bda060e383b56bbbe0adbcb27e63d96bec62c668aa8e0
                                                            • Instruction Fuzzy Hash: C1211871D007198FDB10DFAAC4857EEBBF4EF89314F148429D519A7280DB78A945CFA1
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0962DAAE
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 1772ff4365d70c284d313c665b95c4291aaf8d81b5f202382bf551325b2045f5
                                                            • Instruction ID: 81b42b6c1f5a9c222950cc714f866c46ab487b3d72a2e6d265d58049d6e3ab3f
                                                            • Opcode Fuzzy Hash: 1772ff4365d70c284d313c665b95c4291aaf8d81b5f202382bf551325b2045f5
                                                            • Instruction Fuzzy Hash: 982167728002499FCB10DFA9C845AEEBFF5EF88320F20841AE519A7250CB35A541CFA1
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0962DAAE
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 9695e804286d8337cb618567497ffffdc18a6b44641892e566d01febbf950831
                                                            • Instruction ID: 428036623da546f4722a9042e9f7177ab777247cdba7b566efa84c57fe0010e8
                                                            • Opcode Fuzzy Hash: 9695e804286d8337cb618567497ffffdc18a6b44641892e566d01febbf950831
                                                            • Instruction Fuzzy Hash: 8B115671C002499FCB10DFAAC845ADEBFF9EB88320F20841AE519A7290C775A540CFA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 2de2296041354aec6116eb1b54a84a973c014d9f3a7aeb345646b915047199b5
                                                            • Instruction ID: 6812cb0b28e118e61c715804f4c74d6af5cc3517f892765d86577ef39a96ed76
                                                            • Opcode Fuzzy Hash: 2de2296041354aec6116eb1b54a84a973c014d9f3a7aeb345646b915047199b5
                                                            • Instruction Fuzzy Hash: 691158B1D006498FCB20DFAAC8457EEFFF4EB88324F20841AD819A7240CB35A545CFA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2195497153.0000000009620000.00000040.00000800.00020000.00000000.sdmp, Offset: 09620000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_9620000_newapp.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 6576e65e0fb7efb42277b7bdf8b731f5b934ec13668541e3e44535c4939f48a8
                                                            • Instruction ID: c5f86a087d45c07510f046440b92021e3cf16e15aa53cb36246ac616d9d30c5f
                                                            • Opcode Fuzzy Hash: 6576e65e0fb7efb42277b7bdf8b731f5b934ec13668541e3e44535c4939f48a8
                                                            • Instruction Fuzzy Hash: 491136B1D003498FCB20DFAAC4457DEFBF8EB88324F20841AD519A7240CB75A945CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 031AB17E
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187537672.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_31a0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 021b01f35f3b23a14f18197a398bb7674bb88950ccf0f854128267e922e32835
                                                            • Instruction ID: 9e18271c04f84c88e2127f6c559c26661889105fe977d180f7c6ab290bedf31d
                                                            • Opcode Fuzzy Hash: 021b01f35f3b23a14f18197a398bb7674bb88950ccf0f854128267e922e32835
                                                            • Instruction Fuzzy Hash: 7911E0B5C047898FCB10CF9AD948BDEFBF8EB88314F14845AD819A7210D379A545CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2186946786.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_16dd000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 506a56041822e28a129572dcb8b76565bc6bbd9f905ec7f659ff10e91e7af96d
                                                            • Instruction ID: 9e9c47be04c70cfa1cfe8684e25917e14c080de6ec2c95b34e62c4e5243aa400
                                                            • Opcode Fuzzy Hash: 506a56041822e28a129572dcb8b76565bc6bbd9f905ec7f659ff10e91e7af96d
                                                            • Instruction Fuzzy Hash: 942103B1904240EFDB05EF98DDC0B26BF65FB88318F64C569E9090B296C336D416CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2186946786.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_16dd000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 199f38348193bafa57f272d8080172b4ff3c64500df585bcaa5ad8a8b3813a77
                                                            • Instruction ID: 64ed6aa495405da6cdc338a257c9de271c393cf9baccb84433b5678d4f8a7fc5
                                                            • Opcode Fuzzy Hash: 199f38348193bafa57f272d8080172b4ff3c64500df585bcaa5ad8a8b3813a77
                                                            • Instruction Fuzzy Hash: F82148B1900200EFDB01EF98DDC0B6ABF65FB84324F24C56DD90A0B386C336E416C6A1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187030577.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_16ed000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 42d61c10b42d73e385c375ca383e942814e2dae7d34c5eccc17452d5a29761ac
                                                            • Instruction ID: ae0d0884bcca03a969d7b6c7cf792a2360db6db4f459c1f1ca2b418e7d4aa4a0
                                                            • Opcode Fuzzy Hash: 42d61c10b42d73e385c375ca383e942814e2dae7d34c5eccc17452d5a29761ac
                                                            • Instruction Fuzzy Hash: E221F2B1604240DFDB15DF58D9C8B26BFA5FB84354F28C66DD90A4B386C33AD447CA61
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187030577.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_16ed000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 80b1cf5c9bd36dd12e700f57137fff1d99b75d5a82ecd03d376a5023060318b3
                                                            • Instruction ID: 10bede2ae6feb710b85b5a51911983bbd87292bc729a252457997b4590fd422e
                                                            • Opcode Fuzzy Hash: 80b1cf5c9bd36dd12e700f57137fff1d99b75d5a82ecd03d376a5023060318b3
                                                            • Instruction Fuzzy Hash: 852129B5504240EFDB05DF98DDC8B25BBE5FB84324F24C66DDA094B396C336D406CA61
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187030577.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_16ed000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2fb140526b953f8b1a805f975a63846095f40a8d038d45ea757e9cd13992ed93
                                                            • Instruction ID: 5a36a87fb2cfad372ffca42d3f2c1166c28c59bff206835932f633cea2f410ad
                                                            • Opcode Fuzzy Hash: 2fb140526b953f8b1a805f975a63846095f40a8d038d45ea757e9cd13992ed93
                                                            • Instruction Fuzzy Hash: 312162755093808FDB13CF64D994715BFB1FB46214F28C6DAD8498F6A7C33A980ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2186946786.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_16dd000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction ID: f536d68146eb4e9a3227fc183305c73b454e5835ddc6a46bccf0a248f3e86049
                                                            • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction Fuzzy Hash: 7011E172804280DFCB12DF54D9C4B1ABF71FB84314F24C6A9D8490B656C336D45ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2186946786.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_16dd000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction ID: aa7b8cf17e73c27b2dd47164aa2083a2dda3b7e9deac0713d5644d0db3389efe
                                                            • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction Fuzzy Hash: 9211DF72804240DFDB12DF44D9C4B56BF71FB84324F24C2A9D9090B696C33AE45ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2187030577.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_16ed000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction ID: 4e2f440ecd2622f8f721053fadcc3ea21508b13b478dd5be52069993a8c8ca65
                                                            • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction Fuzzy Hash: 9511BB75904280DFDB02CF54D9C8B15BBA1FB84224F24C6A9D9494B796C33AD40ACB61

                                                            Execution Graph

                                                            Execution Coverage:12.6%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:230
                                                            Total number of Limit Nodes:25
                                                            execution_graph 41426 6c19e40 41427 6c19e41 GetCurrentProcess 41426->41427 41429 6c19ed1 41427->41429 41430 6c19ed8 GetCurrentThread 41427->41430 41429->41430 41431 6c19f15 GetCurrentProcess 41430->41431 41432 6c19f0e 41430->41432 41433 6c19f4b 41431->41433 41432->41431 41434 6c19f73 GetCurrentThreadId 41433->41434 41435 6c19fa4 41434->41435 41534 6c1bad0 41535 6c1badb 41534->41535 41536 6c1baeb 41535->41536 41538 6c1b074 41535->41538 41539 6c1bb20 OleInitialize 41538->41539 41540 6c1bb84 41539->41540 41540->41536 41541 6c1da30 41544 6c1da74 SetWindowsHookExA 41541->41544 41543 6c1daba 41544->41543 41545 121d030 41546 121d048 41545->41546 41547 121d0a2 41546->41547 41554 6c144c4 41546->41554 41562 6c144b4 41546->41562 41566 6c1ac85 41546->41566 41574 6c16773 41546->41574 41578 6c16650 41546->41578 41584 6c1664b 41546->41584 41555 6c144cf 41554->41555 41556 6c1ace9 41555->41556 41558 6c1acd9 41555->41558 41598 6c19e0c 41556->41598 41590 6c1b218 41558->41590 41594 6c1b1d8 41558->41594 41559 6c1ace7 41563 6c144bf 41562->41563 41602 6c144ec 41563->41602 41565 6c16787 41565->41547 41567 6c1ac88 41566->41567 41568 6c1ace9 41567->41568 41570 6c1acd9 41567->41570 41569 6c19e0c CallWindowProcW 41568->41569 41571 6c1ace7 41569->41571 41572 6c1b218 CallWindowProcW 41570->41572 41573 6c1b1d8 CallWindowProcW 41570->41573 41572->41571 41573->41571 41575 6c16780 41574->41575 41576 6c144ec GetModuleHandleW 41575->41576 41577 6c16787 41576->41577 41577->41547 41579 6c16676 41578->41579 41580 6c144b4 GetModuleHandleW 41579->41580 41581 6c16682 41580->41581 41582 6c144c4 CallWindowProcW 41581->41582 41583 6c16697 41582->41583 41583->41547 41585 6c16676 41584->41585 41586 6c144b4 GetModuleHandleW 41585->41586 41587 6c16682 41586->41587 41588 6c144c4 CallWindowProcW 41587->41588 41589 6c16697 41588->41589 41589->41547 41591 6c1b226 41590->41591 41592 6c19e0c CallWindowProcW 41591->41592 41593 6c1b302 41591->41593 41592->41591 41593->41559 41595 6c1b1dd 41594->41595 41596 6c19e0c CallWindowProcW 41595->41596 41597 6c1b302 41595->41597 41596->41595 41597->41559 41599 6c19e17 41598->41599 41600 6c1b3b2 CallWindowProcW 41599->41600 41601 6c1b361 41599->41601 41600->41601 41601->41559 41603 6c144f7 41602->41603 41604 6c137c8 GetModuleHandleW 41603->41604 41605 6c16857 41603->41605 41604->41605 41436 6c1a088 DuplicateHandle 41437 6c1a11e 41436->41437 41438 6c1bc68 41439 6c1bcc2 OleGetClipboard 41438->41439 41440 6c1bd02 41439->41440 41606 6c16498 41607 6c16500 CreateWindowExW 41606->41607 41609 6c165bc 41607->41609 41441 6c153eb 41442 6c15439 GetModuleHandleW 41441->41442 41443 6c153ee 41441->41443 41444 6c15465 41442->41444 41443->41442 41445 1260848 41447 126084e 41445->41447 41446 126091b 41447->41446 41449 1261340 41447->41449 41451 126134f 41449->41451 41450 1261454 41450->41447 41451->41450 41455 6c137f1 41451->41455 41461 6c137d8 41451->41461 41467 6c13800 41451->41467 41456 6c13812 41455->41456 41459 6c138c3 41456->41459 41473 6c10b8c 41456->41473 41458 6c13889 41478 6c10bac 41458->41478 41459->41451 41462 6c137dd 41461->41462 41463 6c10b8c GetModuleHandleW 41462->41463 41465 6c137e2 41462->41465 41464 6c13889 41463->41464 41466 6c10bac KiUserCallbackDispatcher 41464->41466 41465->41451 41466->41465 41468 6c13812 41467->41468 41469 6c10b8c GetModuleHandleW 41468->41469 41471 6c138c3 41468->41471 41470 6c13889 41469->41470 41472 6c10bac KiUserCallbackDispatcher 41470->41472 41471->41451 41472->41471 41474 6c10b97 41473->41474 41482 6c149c0 41474->41482 41489 6c149bd 41474->41489 41475 6c13a62 41475->41458 41479 6c10bb7 41478->41479 41481 6c1b643 41479->41481 41530 6c1ae3c 41479->41530 41481->41459 41483 6c149eb 41482->41483 41496 6c14f33 41483->41496 41501 6c14f41 41483->41501 41484 6c14a6e 41485 6c137c8 GetModuleHandleW 41484->41485 41486 6c14a9a 41484->41486 41485->41486 41490 6c149c0 41489->41490 41494 6c14f41 GetModuleHandleW 41490->41494 41495 6c14f33 GetModuleHandleW 41490->41495 41491 6c14a6e 41492 6c14a9a 41491->41492 41493 6c137c8 GetModuleHandleW 41491->41493 41492->41492 41493->41492 41494->41491 41495->41491 41498 6c14f3e 41496->41498 41497 6c14fee 41498->41497 41506 6c150b0 41498->41506 41516 6c150af 41498->41516 41502 6c14f6d 41501->41502 41503 6c14fee 41502->41503 41504 6c150b0 GetModuleHandleW 41502->41504 41505 6c150af GetModuleHandleW 41502->41505 41504->41503 41505->41503 41507 6c150c5 41506->41507 41509 6c150e9 41507->41509 41526 6c137c8 41507->41526 41510 6c137c8 GetModuleHandleW 41509->41510 41515 6c152b4 41509->41515 41511 6c1523a 41510->41511 41512 6c137c8 GetModuleHandleW 41511->41512 41511->41515 41513 6c15288 41512->41513 41514 6c137c8 GetModuleHandleW 41513->41514 41513->41515 41514->41515 41515->41497 41517 6c150b0 41516->41517 41518 6c137c8 GetModuleHandleW 41517->41518 41519 6c150e9 41517->41519 41518->41519 41520 6c137c8 GetModuleHandleW 41519->41520 41525 6c152b4 41519->41525 41521 6c1523a 41520->41521 41522 6c137c8 GetModuleHandleW 41521->41522 41521->41525 41523 6c15288 41522->41523 41524 6c137c8 GetModuleHandleW 41523->41524 41523->41525 41524->41525 41525->41497 41527 6c153f0 GetModuleHandleW 41526->41527 41529 6c15465 41527->41529 41529->41509 41531 6c1b658 KiUserCallbackDispatcher 41530->41531 41533 6c1b6c6 41531->41533 41533->41479 41610 12680f9 41611 1268103 41610->41611 41612 12681b9 41611->41612 41616 6c3fca0 41611->41616 41631 6c3fa60 41611->41631 41635 6c3fa50 41611->41635 41622 6c3fcaa 41616->41622 41623 6c3fa75 41616->41623 41617 6c3fe1b 41645 126e538 41617->41645 41651 126e548 41617->41651 41657 126e5fc 41617->41657 41618 6c3fc8a 41618->41612 41619 6c3fe25 41619->41612 41620 6c3fe60 41620->41612 41621 6c3fcf3 41639 126ee60 41621->41639 41642 126ee70 41621->41642 41622->41617 41622->41620 41622->41621 41623->41618 41630 6c3fca0 6 API calls 41623->41630 41624 6c3fd99 41624->41612 41630->41623 41633 6c3fa75 41631->41633 41632 6c3fc8a 41632->41612 41633->41632 41634 6c3fca0 6 API calls 41633->41634 41634->41633 41637 6c3fa75 41635->41637 41636 6c3fc8a 41636->41612 41637->41636 41638 6c3fca0 6 API calls 41637->41638 41638->41637 41664 126ee98 41639->41664 41640 126ee7e 41640->41624 41643 126ee7e 41642->41643 41644 126ee98 6 API calls 41642->41644 41643->41624 41644->41643 41647 126e943 GlobalMemoryStatusEx 41645->41647 41648 126e9af GlobalMemoryStatusEx 41645->41648 41649 126e91d GlobalMemoryStatusEx 41645->41649 41650 126e9cd GlobalMemoryStatusEx 41645->41650 41646 126e56f 41646->41619 41647->41646 41648->41646 41649->41646 41650->41646 41652 126e56f 41651->41652 41653 126e943 GlobalMemoryStatusEx 41651->41653 41654 126e9af GlobalMemoryStatusEx 41651->41654 41655 126e91d GlobalMemoryStatusEx 41651->41655 41656 126e9cd GlobalMemoryStatusEx 41651->41656 41652->41619 41653->41652 41654->41652 41655->41652 41656->41652 41658 126e544 41657->41658 41659 126e56f 41657->41659 41658->41659 41660 126e943 GlobalMemoryStatusEx 41658->41660 41661 126e9af GlobalMemoryStatusEx 41658->41661 41662 126e91d GlobalMemoryStatusEx 41658->41662 41663 126e9cd GlobalMemoryStatusEx 41658->41663 41659->41619 41660->41659 41661->41659 41662->41659 41663->41659 41665 126eeb5 41664->41665 41666 126eedd 41664->41666 41665->41640 41676 126ee98 5 API calls 41666->41676 41677 126e943 41666->41677 41682 126e9cd 41666->41682 41687 126e91d 41666->41687 41692 126e9af 41666->41692 41697 126ef80 41666->41697 41667 126eefe 41667->41640 41668 126eefa 41668->41667 41669 126efc6 GlobalMemoryStatusEx 41668->41669 41670 126eff6 41669->41670 41670->41640 41676->41668 41680 126e94b 41677->41680 41678 126efc6 GlobalMemoryStatusEx 41679 126eff6 41678->41679 41679->41668 41680->41678 41681 126e99d 41680->41681 41681->41668 41686 126e9de 41682->41686 41683 126efc6 GlobalMemoryStatusEx 41684 126eff6 41683->41684 41684->41668 41685 126ea65 41685->41668 41686->41683 41686->41685 41690 126e92e 41687->41690 41688 126efc6 GlobalMemoryStatusEx 41689 126eff6 41688->41689 41689->41668 41690->41688 41691 126e99d 41690->41691 41691->41668 41696 126e9b3 41692->41696 41693 126efc6 GlobalMemoryStatusEx 41694 126eff6 41693->41694 41694->41668 41695 126ea65 41695->41668 41696->41693 41696->41695 41698 126efc6 GlobalMemoryStatusEx 41697->41698 41699 126eff6 41698->41699 41699->41668
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-3723351465
                                                            • Opcode ID: 083ff52c1d61d1d6b7cf5d31888e802ab2b88b17109fea1a6ad7994af73ef492
                                                            • Instruction ID: 8a992c3a23ae875da92230831f25f6e1efc02c7a2dd6556edb7bd27072237d41
                                                            • Opcode Fuzzy Hash: 083ff52c1d61d1d6b7cf5d31888e802ab2b88b17109fea1a6ad7994af73ef492
                                                            • Instruction Fuzzy Hash: 01525F70E102198FDF64DF68D4807ADB7B2EB99310F24852AE409EB395DB35DD82CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 408 6c33570-6c33591 409 6c33593-6c33596 408->409 410 6c33598-6c335b7 409->410 411 6c335bc-6c335bf 409->411 410->411 412 6c33d60-6c33d62 411->412 413 6c335c5-6c335e4 411->413 414 6c33d64 412->414 415 6c33d69-6c33d6c 412->415 421 6c335e6-6c335e9 413->421 422 6c335fd-6c33607 413->422 414->415 415->409 418 6c33d72-6c33d7b 415->418 421->422 423 6c335eb-6c335fb 421->423 425 6c3360d-6c3361e call 6c3315c 422->425 423->425 428 6c33623-6c33628 425->428 429 6c33635-6c33912 428->429 430 6c3362a-6c33630 428->430 451 6c33d52-6c33d5f 429->451 452 6c33918-6c339c7 429->452 430->418 461 6c339f0 452->461 462 6c339c9-6c339ee 452->462 464 6c339f9-6c33a0c call 6c33168 461->464 462->464 467 6c33a12-6c33a34 call 6c33174 464->467 468 6c33d39-6c33d45 464->468 467->468 472 6c33a3a-6c33a44 467->472 468->452 469 6c33d4b 468->469 469->451 472->468 473 6c33a4a-6c33a55 472->473 473->468 474 6c33a5b-6c33b31 473->474 486 6c33b33-6c33b35 474->486 487 6c33b3f-6c33b6f 474->487 486->487 491 6c33b71-6c33b73 487->491 492 6c33b7d-6c33b89 487->492 491->492 493 6c33b8b-6c33b8f 492->493 494 6c33be9-6c33bed 492->494 493->494 495 6c33b91-6c33bbb 493->495 496 6c33bf3-6c33c2f 494->496 497 6c33d2a-6c33d33 494->497 504 6c33bc9-6c33be6 call 6c33180 495->504 505 6c33bbd-6c33bbf 495->505 508 6c33c31-6c33c33 496->508 509 6c33c3d-6c33c4b 496->509 497->468 497->474 504->494 505->504 508->509 512 6c33c62-6c33c6d 509->512 513 6c33c4d-6c33c58 509->513 517 6c33c85-6c33c96 512->517 518 6c33c6f-6c33c75 512->518 513->512 516 6c33c5a 513->516 516->512 522 6c33c98-6c33c9e 517->522 523 6c33cae-6c33cba 517->523 519 6c33c77 518->519 520 6c33c79-6c33c7b 518->520 519->517 520->517 524 6c33ca2-6c33ca4 522->524 525 6c33ca0 522->525 527 6c33cd2-6c33d23 523->527 528 6c33cbc-6c33cc2 523->528 524->523 525->523 527->497 529 6c33cc6-6c33cc8 528->529 530 6c33cc4 528->530 529->527 530->527
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-3723351465
                                                            • Opcode ID: f22fe4d7d72774b14a1b55be92ead860404fc09238575a8905a46d38e91d0388
                                                            • Instruction ID: 5e53c1339eb3e22bb3c5610798728db114400e35690703e5136267c2113ca7d1
                                                            • Opcode Fuzzy Hash: f22fe4d7d72774b14a1b55be92ead860404fc09238575a8905a46d38e91d0388
                                                            • Instruction Fuzzy Hash: 49324031E1065ACFDB15DF75D89459DB7B2FF89300F20C6AAD449AB254EB30AE85CB80

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 585 126e91d-126e92c 586 126e92e-126e934 585->586 587 126e98c 585->587 590 126e936-126e93c 586->590 591 126e994 586->591 588 126e98e-126e992 587->588 589 126e9ec-126e9ee 587->589 588->591 593 126e9f4 589->593 594 126e93e-126e966 590->594 595 126e99c 590->595 592 126e996 591->592 591->593 592->595 596 126ea54-126ea5a 593->596 597 126e9f5-126e9fa 593->597 608 126e975-126e984 594->608 609 126e968-126e971 594->609 598 126e9fc-126ea22 595->598 599 126e99d-126e9ae 595->599 604 126ea61-126ea63 596->604 597->598 601 126ea86-126ea8d 598->601 602 126ea24-126ea3a 598->602 617 126ea44-126ea4f 602->617 605 126ea65-126ea7e 604->605 606 126ea8e-126eaf5 604->606 605->601 633 126eaf7-126eaf9 606->633 634 126eafe-126eb0e 606->634 610 126e986-126e98b 608->610 611 126e9e4 608->611 609->608 610->587 616 126e9e6-126e9e9 611->616 611->617 619 126efa8-126eff4 GlobalMemoryStatusEx 616->619 617->596 625 126eff6-126effc 619->625 626 126effd-126f025 619->626 625->626 635 126ed9d-126eda4 633->635 636 126eb15-126eb25 634->636 637 126eb10 634->637 639 126ed84-126ed92 636->639 640 126eb2b-126eb39 636->640 637->635 643 126ed94-126ed98 call 1267b28 639->643 644 126eda5-126ee1e 639->644 640->644 645 126eb3f 640->645 643->635 644->619 645->644 646 126eb46-126eb58 645->646 647 126ec42-126ec6a 645->647 648 126eb83-126eba5 645->648 649 126ec6f-126ec97 645->649 650 126ebaa-126ebcb 645->650 651 126ed09-126ed35 645->651 652 126ebf6-126ec17 645->652 653 126ed37-126ed52 call 1260350 645->653 654 126ed54-126ed76 645->654 655 126ebd0-126ebf1 645->655 656 126ecde-126ed04 645->656 657 126ec1c-126ec3d 645->657 658 126ec9c-126ecd9 645->658 659 126eb5d-126eb7e 645->659 660 126ed78-126ed82 645->660 646->635 647->635 648->635 649->635 650->635 651->635 652->635 653->635 654->635 655->635 656->635 657->635 658->635 659->635 660->635
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2252363745.0000000001260000.00000040.00000800.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1260000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xaq$$]q
                                                            • API String ID: 0-1280934391
                                                            • Opcode ID: 6dd027df4ab3238b1f1af3a9a09c83f8ab6b81164f6b4012fdce4150351efdf2
                                                            • Instruction ID: e60a710ced4b2d27bdaf2f27f72d2a3c39c78493650744cfc5edff17b5ab690a
                                                            • Opcode Fuzzy Hash: 6dd027df4ab3238b1f1af3a9a09c83f8ab6b81164f6b4012fdce4150351efdf2
                                                            • Instruction Fuzzy Hash: E3E12474B102159FDB19EF78985827E7FABBFC8710B198469E046DB3C5CE348C428B92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1599 6c37e68-6c37e86 1600 6c37e88-6c37e8b 1599->1600 1601 6c37e8d-6c37ea7 1600->1601 1602 6c37eac-6c37eaf 1600->1602 1601->1602 1603 6c37ed2-6c37ed5 1602->1603 1604 6c37eb1-6c37ecd 1602->1604 1605 6c37ee2-6c37ee5 1603->1605 1606 6c37ed7-6c37ee1 1603->1606 1604->1603 1609 6c37ee7-6c37ef5 1605->1609 1610 6c37efc-6c37efe 1605->1610 1614 6c37f0e-6c37f24 1609->1614 1617 6c37ef7 1609->1617 1612 6c37f00 1610->1612 1613 6c37f05-6c37f08 1610->1613 1612->1613 1613->1600 1613->1614 1619 6c37f2a-6c37f33 1614->1619 1620 6c3813f-6c38149 1614->1620 1617->1610 1621 6c3814a-6c3817f 1619->1621 1622 6c37f39-6c37f56 1619->1622 1625 6c38181-6c38184 1621->1625 1631 6c3812c-6c38139 1622->1631 1632 6c37f5c-6c37f84 1622->1632 1627 6c381a7-6c381aa 1625->1627 1628 6c38186-6c381a2 1625->1628 1629 6c381b0-6c381bc 1627->1629 1630 6c38257-6c3825a 1627->1630 1628->1627 1638 6c381c7-6c381c9 1629->1638 1634 6c38260-6c3826f 1630->1634 1635 6c3848f-6c38491 1630->1635 1631->1619 1631->1620 1632->1631 1652 6c37f8a-6c37f93 1632->1652 1650 6c38271-6c3828c 1634->1650 1651 6c3828e-6c382d2 1634->1651 1636 6c38493 1635->1636 1637 6c38498-6c3849b 1635->1637 1636->1637 1637->1625 1640 6c384a1-6c384aa 1637->1640 1642 6c381e1-6c381e5 1638->1642 1643 6c381cb-6c381d1 1638->1643 1648 6c381f3 1642->1648 1649 6c381e7-6c381f1 1642->1649 1646 6c381d3 1643->1646 1647 6c381d5-6c381d7 1643->1647 1646->1642 1647->1642 1653 6c381f8-6c381fa 1648->1653 1649->1653 1650->1651 1659 6c38463-6c38479 1651->1659 1660 6c382d8-6c382e9 1651->1660 1652->1621 1657 6c37f99-6c37fb5 1652->1657 1654 6c38211-6c3824a 1653->1654 1655 6c381fc-6c381ff 1653->1655 1654->1634 1679 6c3824c-6c38256 1654->1679 1655->1640 1665 6c37fbb-6c37fe5 1657->1665 1666 6c3811a-6c38126 1657->1666 1659->1635 1670 6c382ef-6c3830c 1660->1670 1671 6c3844e-6c3845d 1660->1671 1682 6c38110-6c38115 1665->1682 1683 6c37feb-6c38013 1665->1683 1666->1631 1666->1652 1670->1671 1681 6c38312-6c38408 call 6c36690 1670->1681 1671->1659 1671->1660 1732 6c38416 1681->1732 1733 6c3840a-6c38414 1681->1733 1682->1666 1683->1682 1689 6c38019-6c38047 1683->1689 1689->1682 1695 6c3804d-6c38056 1689->1695 1695->1682 1696 6c3805c-6c3808e 1695->1696 1704 6c38090-6c38094 1696->1704 1705 6c38099-6c380b5 1696->1705 1704->1682 1708 6c38096 1704->1708 1705->1666 1706 6c380b7-6c3810e call 6c36690 1705->1706 1706->1666 1708->1705 1734 6c3841b-6c3841d 1732->1734 1733->1734 1734->1671 1735 6c3841f-6c38424 1734->1735 1736 6c38432 1735->1736 1737 6c38426-6c38430 1735->1737 1738 6c38437-6c38439 1736->1738 1737->1738 1738->1671 1739 6c3843b-6c38447 1738->1739 1739->1671
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q
                                                            • API String ID: 0-127220927
                                                            • Opcode ID: 4dc7cd6257a2dace474fe3f8c18bb0678974fa2510a0265a1f40242fb2330812
                                                            • Instruction ID: 4f13ad5c5cc0c000a8b303ab8f186ea8ef9ab9834d2d4e8f54a70a319500748d
                                                            • Opcode Fuzzy Hash: 4dc7cd6257a2dace474fe3f8c18bb0678974fa2510a0265a1f40242fb2330812
                                                            • Instruction Fuzzy Hash: 42029E31B012169FDB54DF65D8906AEB7F2FF84304F248568E815AB381DB39ED82CB91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 94c699858517a93a0b3701430cb24323f21a3decfdd7728879acc04bbf83e11b
                                                            • Instruction ID: 46d5c3fc34f04006c94408b0ef2f3915f7d9114a7ddcc20cd64700d429ffe427
                                                            • Opcode Fuzzy Hash: 94c699858517a93a0b3701430cb24323f21a3decfdd7728879acc04bbf83e11b
                                                            • Instruction Fuzzy Hash: 8F62CF31B002159FDB54DF69D584AADB7F2EF88314F248469E80AEB390DB35ED46CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d9485a1dc88a2502592897ecffa1424c2a897235aaa31cccfddf5609d901cf5a
                                                            • Instruction ID: 08192e9941339b2dd7476d9d2e208a30aab7e859c0a2318f1fbc34f5bb6c3343
                                                            • Opcode Fuzzy Hash: d9485a1dc88a2502592897ecffa1424c2a897235aaa31cccfddf5609d901cf5a
                                                            • Instruction Fuzzy Hash: 16328034B102199FDB54DF68D990BADBBB2FB89310F208529E405FB351DB39ED428B91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8124d25d7479e625075741d5464bb26832b877cb938c0379f6d43b3163457cde
                                                            • Instruction ID: 023f0a6c94b9c504f22ce146003161f6fffd8821b48d8cbbc760b7f899c1c3b2
                                                            • Opcode Fuzzy Hash: 8124d25d7479e625075741d5464bb26832b877cb938c0379f6d43b3163457cde
                                                            • Instruction Fuzzy Hash: 7412C275F102258FDF60DFA4C8806AEB7B2FB84310F64846AD859DB385DA34DD42CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 6c3adb0-6c3adce 1 6c3add0-6c3add3 0->1 2 6c3adf6-6c3adf9 1->2 3 6c3add5-6c3adf1 1->3 4 6c3adfb-6c3adff 2->4 5 6c3ae0a-6c3ae0d 2->5 3->2 6 6c3ae05 4->6 7 6c3afdc-6c3afe6 4->7 8 6c3ae0f-6c3ae18 5->8 9 6c3ae1d-6c3ae20 5->9 6->5 8->9 11 6c3ae26-6c3ae29 9->11 12 6c3afcd-6c3afd6 9->12 13 6c3ae2b-6c3ae38 11->13 14 6c3ae3d-6c3ae40 11->14 12->7 15 6c3ae6c-6c3ae75 12->15 13->14 19 6c3ae42-6c3ae55 14->19 20 6c3ae5a-6c3ae5d 14->20 17 6c3afe7-6c3b01e 15->17 18 6c3ae7b-6c3ae7f 15->18 30 6c3b020-6c3b023 17->30 21 6c3ae84-6c3ae86 18->21 19->20 23 6c3ae67-6c3ae6a 20->23 24 6c3ae5f-6c3ae64 20->24 25 6c3ae88 21->25 26 6c3ae8d-6c3ae90 21->26 23->15 23->21 24->23 25->26 26->1 29 6c3ae96-6c3aeba 26->29 43 6c3aec0-6c3aecf 29->43 44 6c3afca 29->44 31 6c3b032-6c3b035 30->31 32 6c3b025 30->32 34 6c3b03b-6c3b076 31->34 35 6c3b29e-6c3b2a1 31->35 123 6c3b025 call 6c3b307 32->123 124 6c3b025 call 6c3b318 32->124 47 6c3b269-6c3b27c 34->47 48 6c3b07c-6c3b088 34->48 36 6c3b2a3-6c3b2ad 35->36 37 6c3b2ae-6c3b2b1 35->37 39 6c3b2b3-6c3b2cf 37->39 40 6c3b2d4-6c3b2d7 37->40 38 6c3b02b-6c3b02d 38->31 39->40 45 6c3b2d9-6c3b2dd 40->45 46 6c3b2e8-6c3b2ea 40->46 60 6c3aed1-6c3aed7 43->60 61 6c3aee7-6c3af22 call 6c36690 43->61 44->12 45->34 51 6c3b2e3 45->51 52 6c3b2f1-6c3b2f4 46->52 53 6c3b2ec 46->53 49 6c3b27e 47->49 57 6c3b08a-6c3b0a3 48->57 58 6c3b0a8-6c3b0ec 48->58 49->35 51->46 52->30 54 6c3b2fa-6c3b304 52->54 53->52 57->49 77 6c3b108-6c3b147 58->77 78 6c3b0ee-6c3b100 58->78 62 6c3aedb-6c3aedd 60->62 63 6c3aed9 60->63 75 6c3af24-6c3af2a 61->75 76 6c3af3a-6c3af51 61->76 62->61 63->61 79 6c3af2e-6c3af30 75->79 80 6c3af2c 75->80 89 6c3af53-6c3af59 76->89 90 6c3af69-6c3af7a 76->90 84 6c3b22e-6c3b243 77->84 85 6c3b14d-6c3b228 call 6c36690 77->85 78->77 79->76 80->76 84->47 85->84 92 6c3af5b 89->92 93 6c3af5d-6c3af5f 89->93 97 6c3af92-6c3afc3 90->97 98 6c3af7c-6c3af82 90->98 92->90 93->90 97->44 99 6c3af86-6c3af88 98->99 100 6c3af84 98->100 99->97 100->97 123->38 124->38
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-1273862796
                                                            • Opcode ID: 4b43df185c3de4d724b19d9f92fa99932050645369dbef04b7eeb0f987a4f1ea
                                                            • Instruction ID: ecad22934ad1b43750b812d9e8d4cca426436c80d689196bb362c63e05904c92
                                                            • Opcode Fuzzy Hash: 4b43df185c3de4d724b19d9f92fa99932050645369dbef04b7eeb0f987a4f1ea
                                                            • Instruction Fuzzy Hash: 4DE18070E1021A8FDB55DFA9D4846AEB7B2EF89304F20862DE805EB344DB35DD56CB81

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 538 6c19e31-6c19e38 539 6c19e41-6c19ecf GetCurrentProcess 538->539 540 6c19e3a-6c19e3d 538->540 544 6c19ed1-6c19ed7 539->544 545 6c19ed8-6c19f0c GetCurrentThread 539->545 540->539 544->545 546 6c19f15-6c19f49 GetCurrentProcess 545->546 547 6c19f0e-6c19f14 545->547 549 6c19f52-6c19f6d call 6c1a010 546->549 550 6c19f4b-6c19f51 546->550 547->546 552 6c19f73-6c19fa2 GetCurrentThreadId 549->552 550->549 554 6c19fa4-6c19faa 552->554 555 6c19fab-6c1a00d 552->555 554->555
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 06C19EBE
                                                            • GetCurrentThread.KERNEL32 ref: 06C19EFB
                                                            • GetCurrentProcess.KERNEL32 ref: 06C19F38
                                                            • GetCurrentThreadId.KERNEL32 ref: 06C19F91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 42464208e647fdbeb0b9685e0ab95c024be3c30af52a0da61fe716354b507816
                                                            • Instruction ID: 8a4fc7b23d6568a9271b8d79289ceed73e6f2d21f0dd5408faf78a71249b48ca
                                                            • Opcode Fuzzy Hash: 42464208e647fdbeb0b9685e0ab95c024be3c30af52a0da61fe716354b507816
                                                            • Instruction Fuzzy Hash: DA5176B0D1024A9FDB54CFA9D948BDEBBF1FF49304F208459E419AB3A0D7349984CB61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 562 6c19e40-6c19ecf GetCurrentProcess 567 6c19ed1-6c19ed7 562->567 568 6c19ed8-6c19f0c GetCurrentThread 562->568 567->568 569 6c19f15-6c19f49 GetCurrentProcess 568->569 570 6c19f0e-6c19f14 568->570 572 6c19f52-6c19f6d call 6c1a010 569->572 573 6c19f4b-6c19f51 569->573 570->569 575 6c19f73-6c19fa2 GetCurrentThreadId 572->575 573->572 577 6c19fa4-6c19faa 575->577 578 6c19fab-6c1a00d 575->578 577->578
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 06C19EBE
                                                            • GetCurrentThread.KERNEL32 ref: 06C19EFB
                                                            • GetCurrentProcess.KERNEL32 ref: 06C19F38
                                                            • GetCurrentThreadId.KERNEL32 ref: 06C19F91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 19de1f1522b37f0996f975dbaaf2e8f53546046d2ea2c66c219c73dce97b9483
                                                            • Instruction ID: c5645c9e2c08c2f9a4dcbb38807c8cf464fa5ce112969b54e44ac549a6353970
                                                            • Opcode Fuzzy Hash: 19de1f1522b37f0996f975dbaaf2e8f53546046d2ea2c66c219c73dce97b9483
                                                            • Instruction Fuzzy Hash: 075155B0D1020A8FDB54DFA9D948B9EBBF1FF48314F20845DE419A73A0D734A984CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 713 6c39238-6c3925d 714 6c3925f-6c39262 713->714 715 6c39b20-6c39b23 714->715 716 6c39268-6c3927d 714->716 717 6c39b25-6c39b44 715->717 718 6c39b49-6c39b4b 715->718 724 6c39295-6c392ab 716->724 725 6c3927f-6c39285 716->725 717->718 719 6c39b52-6c39b55 718->719 720 6c39b4d 718->720 719->714 723 6c39b5b-6c39b65 719->723 720->719 730 6c392b6-6c392b8 724->730 726 6c39287 725->726 727 6c39289-6c3928b 725->727 726->724 727->724 731 6c392d0-6c39341 730->731 732 6c392ba-6c392c0 730->732 743 6c39343-6c39366 731->743 744 6c3936d-6c39389 731->744 733 6c392c2 732->733 734 6c392c4-6c392c6 732->734 733->731 734->731 743->744 749 6c393b5-6c393d0 744->749 750 6c3938b-6c393ae 744->750 755 6c393d2-6c393f4 749->755 756 6c393fb-6c39416 749->756 750->749 755->756 761 6c3943b-6c39449 756->761 762 6c39418-6c39434 756->762 763 6c3944b-6c39454 761->763 764 6c39459-6c394d3 761->764 762->761 763->723 770 6c39520-6c39535 764->770 771 6c394d5-6c394f3 764->771 770->715 775 6c394f5-6c39504 771->775 776 6c3950f-6c3951e 771->776 775->776 776->770 776->771
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: bbfbc4dc30836681ec0ba5001d86c3546d6c6e81ec4e12494fa02663464a83c9
                                                            • Instruction ID: c9db209bf3ea376e53aedf98b9dd5ca8f6f6f1c6cd40df7e2505553fff79432f
                                                            • Opcode Fuzzy Hash: bbfbc4dc30836681ec0ba5001d86c3546d6c6e81ec4e12494fa02663464a83c9
                                                            • Instruction Fuzzy Hash: F7916130B0021A9FDB54DF79D8907AFB3F2FB88600F108569D80DEB344EA759D468B92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 779 6c3d038-6c3d053 780 6c3d055-6c3d058 779->780 781 6c3d0a1-6c3d0a4 780->781 782 6c3d05a-6c3d09c 780->782 783 6c3d0a6-6c3d0e8 781->783 784 6c3d0ed-6c3d0f0 781->784 782->781 783->784 786 6c3d0f2-6c3d0f4 784->786 787 6c3d0ff-6c3d102 784->787 788 6c3d521 786->788 789 6c3d0fa 786->789 790 6c3d104-6c3d113 787->790 791 6c3d14b-6c3d14e 787->791 793 6c3d524-6c3d530 788->793 789->787 797 6c3d122-6c3d12e 790->797 798 6c3d115-6c3d11a 790->798 794 6c3d150-6c3d192 791->794 795 6c3d197-6c3d19a 791->795 793->790 800 6c3d536-6c3d823 793->800 794->795 801 6c3d1a4-6c3d1a7 795->801 802 6c3d19c-6c3d1a1 795->802 803 6c3da55-6c3da8e 797->803 804 6c3d134-6c3d146 797->804 798->797 992 6c3da4a-6c3da54 800->992 993 6c3d829-6c3d82f 800->993 805 6c3d1b6-6c3d1b9 801->805 806 6c3d1a9-6c3d1ab 801->806 802->801 818 6c3da90-6c3da93 803->818 804->791 805->793 813 6c3d1bf-6c3d1c2 805->813 811 6c3d1b1 806->811 812 6c3d3df-6c3d3e8 806->812 811->805 820 6c3d3f7-6c3d403 812->820 821 6c3d3ea-6c3d3ef 812->821 816 6c3d1e5-6c3d1e8 813->816 817 6c3d1c4-6c3d1e0 813->817 827 6c3d231-6c3d234 816->827 828 6c3d1ea-6c3d22c 816->828 817->816 825 6c3dac6-6c3dac9 818->825 826 6c3da95-6c3dac1 818->826 829 6c3d514-6c3d519 820->829 830 6c3d409-6c3d41d 820->830 821->820 834 6c3dacb 825->834 835 6c3dad8-6c3dadb 825->835 826->825 832 6c3d236-6c3d278 827->832 833 6c3d27d-6c3d280 827->833 828->827 829->788 830->788 850 6c3d423-6c3d435 830->850 832->833 838 6c3d282-6c3d2c4 833->838 839 6c3d2c9-6c3d2cc 833->839 1039 6c3dacb call 6c3dbc0 834->1039 1040 6c3dacb call 6c3dbad 834->1040 843 6c3dafe-6c3db00 835->843 844 6c3dadd-6c3daf9 835->844 838->839 854 6c3d2e9-6c3d2ec 839->854 855 6c3d2ce-6c3d2e4 839->855 851 6c3db02 843->851 852 6c3db07-6c3db0a 843->852 844->843 848 6c3dad1-6c3dad3 848->835 872 6c3d437-6c3d43d 850->872 873 6c3d459-6c3d45b 850->873 851->852 852->818 859 6c3db0c-6c3db1b 852->859 856 6c3d335-6c3d338 854->856 857 6c3d2ee-6c3d330 854->857 855->854 867 6c3d381-6c3d384 856->867 868 6c3d33a-6c3d37c 856->868 857->856 887 6c3db82-6c3db97 859->887 888 6c3db1d-6c3db80 call 6c36690 859->888 877 6c3d386-6c3d395 867->877 878 6c3d3cd-6c3d3cf 867->878 868->867 884 6c3d441-6c3d44d 872->884 885 6c3d43f 872->885 882 6c3d465-6c3d471 873->882 889 6c3d397-6c3d39c 877->889 890 6c3d3a4-6c3d3b0 877->890 880 6c3d3d1 878->880 881 6c3d3d6-6c3d3d9 878->881 880->881 881->780 881->812 909 6c3d473-6c3d47d 882->909 910 6c3d47f 882->910 895 6c3d44f-6c3d457 884->895 885->895 907 6c3db98 887->907 888->887 889->890 890->803 891 6c3d3b6-6c3d3c8 890->891 891->878 895->882 907->907 913 6c3d484-6c3d486 909->913 910->913 913->788 919 6c3d48c-6c3d4a8 call 6c36690 913->919 931 6c3d4b7-6c3d4c3 919->931 932 6c3d4aa-6c3d4af 919->932 931->829 934 6c3d4c5-6c3d512 931->934 932->931 934->788 994 6c3d831-6c3d836 993->994 995 6c3d83e-6c3d847 993->995 994->995 995->803 996 6c3d84d-6c3d860 995->996 998 6c3d866-6c3d86c 996->998 999 6c3da3a-6c3da44 996->999 1000 6c3d87b-6c3d884 998->1000 1001 6c3d86e-6c3d873 998->1001 999->992 999->993 1000->803 1002 6c3d88a-6c3d8ab 1000->1002 1001->1000 1005 6c3d8ba-6c3d8c3 1002->1005 1006 6c3d8ad-6c3d8b2 1002->1006 1005->803 1007 6c3d8c9-6c3d8e6 1005->1007 1006->1005 1007->999 1010 6c3d8ec-6c3d8f2 1007->1010 1010->803 1011 6c3d8f8-6c3d911 1010->1011 1013 6c3d917-6c3d93e 1011->1013 1014 6c3da2d-6c3da34 1011->1014 1013->803 1017 6c3d944-6c3d94e 1013->1017 1014->999 1014->1010 1017->803 1018 6c3d954-6c3d96b 1017->1018 1020 6c3d97a-6c3d995 1018->1020 1021 6c3d96d-6c3d978 1018->1021 1020->1014 1026 6c3d99b-6c3d9b4 call 6c36690 1020->1026 1021->1020 1030 6c3d9c3-6c3d9cc 1026->1030 1031 6c3d9b6-6c3d9bb 1026->1031 1030->803 1032 6c3d9d2-6c3da26 1030->1032 1031->1030 1032->1014 1039->848 1040->848
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q
                                                            • API String ID: 0-182748909
                                                            • Opcode ID: abafe4c9c6d3b07e0cdd867c6aa6a0a1d53a4950b872b2446dae1c002048e087
                                                            • Instruction ID: 6d9b6a00081f50b0e86978e49f5f696048a779f4d7e24d59ad49a056db24aed8
                                                            • Opcode Fuzzy Hash: abafe4c9c6d3b07e0cdd867c6aa6a0a1d53a4950b872b2446dae1c002048e087
                                                            • Instruction Fuzzy Hash: F3625D70A1021A8FCB55EF68D580A5DB7B3FF84304B208A68E4469F355DB79FD86CB81

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1041 6c34c78-6c34c9c 1042 6c34c9e-6c34ca1 1041->1042 1043 6c34ca3-6c34cbd 1042->1043 1044 6c34cc2-6c34cc5 1042->1044 1043->1044 1045 6c353a4-6c353a6 1044->1045 1046 6c34ccb-6c34dc3 1044->1046 1047 6c353a8 1045->1047 1048 6c353ad-6c353b0 1045->1048 1064 6c34e46-6c34e4d 1046->1064 1065 6c34dc9-6c34e11 1046->1065 1047->1048 1048->1042 1051 6c353b6-6c353c3 1048->1051 1066 6c34e53-6c34ec3 1064->1066 1067 6c34ed1-6c34eda 1064->1067 1087 6c34e16 call 6c35522 1065->1087 1088 6c34e16 call 6c35530 1065->1088 1084 6c34ec5 1066->1084 1085 6c34ece 1066->1085 1067->1051 1078 6c34e1c-6c34e38 1082 6c34e43-6c34e44 1078->1082 1083 6c34e3a 1078->1083 1082->1064 1083->1082 1084->1085 1085->1067 1087->1078 1088->1078
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fbq$XPbq$\Obq
                                                            • API String ID: 0-4057264190
                                                            • Opcode ID: 4a1def242ca81badc816ff345fa7d62ba9668e3afd27ce09aeceab4eeb9388aa
                                                            • Instruction ID: 98d46c4c4f413ffa00f3b0ad4f7775a469d80acdf2894250f564ac32a5f90e1f
                                                            • Opcode Fuzzy Hash: 4a1def242ca81badc816ff345fa7d62ba9668e3afd27ce09aeceab4eeb9388aa
                                                            • Instruction Fuzzy Hash: EC618F30F102199FEB54DFA5C8547AEBBF2FB88700F208529E106AB395DF758D458B90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2415 6c39228-6c3925d 2416 6c3925f-6c39262 2415->2416 2417 6c39b20-6c39b23 2416->2417 2418 6c39268-6c3927d 2416->2418 2419 6c39b25-6c39b44 2417->2419 2420 6c39b49-6c39b4b 2417->2420 2426 6c39295-6c392ab 2418->2426 2427 6c3927f-6c39285 2418->2427 2419->2420 2421 6c39b52-6c39b55 2420->2421 2422 6c39b4d 2420->2422 2421->2416 2425 6c39b5b-6c39b65 2421->2425 2422->2421 2432 6c392b6-6c392b8 2426->2432 2428 6c39287 2427->2428 2429 6c39289-6c3928b 2427->2429 2428->2426 2429->2426 2433 6c392d0-6c39341 2432->2433 2434 6c392ba-6c392c0 2432->2434 2445 6c39343-6c39366 2433->2445 2446 6c3936d-6c39389 2433->2446 2435 6c392c2 2434->2435 2436 6c392c4-6c392c6 2434->2436 2435->2433 2436->2433 2445->2446 2451 6c393b5-6c393d0 2446->2451 2452 6c3938b-6c393ae 2446->2452 2457 6c393d2-6c393f4 2451->2457 2458 6c393fb-6c39416 2451->2458 2452->2451 2457->2458 2463 6c3943b-6c39449 2458->2463 2464 6c39418-6c39434 2458->2464 2465 6c3944b-6c39454 2463->2465 2466 6c39459-6c394d3 2463->2466 2464->2463 2465->2425 2472 6c39520-6c39535 2466->2472 2473 6c394d5-6c394f3 2466->2473 2472->2417 2477 6c394f5-6c39504 2473->2477 2478 6c3950f-6c3951e 2473->2478 2477->2478 2478->2472 2478->2473
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q
                                                            • API String ID: 0-127220927
                                                            • Opcode ID: 015757417bc962a22c3d441638b8eb14e7f171131082f2dbdc9e06685893a2db
                                                            • Instruction ID: 4bb554f76d0a9bc2946d936ee8744b6a6ed7c349c7fc4d7c577076d95d5bd050
                                                            • Opcode Fuzzy Hash: 015757417bc962a22c3d441638b8eb14e7f171131082f2dbdc9e06685893a2db
                                                            • Instruction Fuzzy Hash: C3517370B002169FEB54DF75D994B6F73F2FB88604F108429C819EB394EA75DD068B92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fbq$XPbq
                                                            • API String ID: 0-2292610095
                                                            • Opcode ID: 5b0057025ee81f21a0d0f024d1ef09b376e43af214c6d60373ac52b3e532b100
                                                            • Instruction ID: f14cc918ca4ae85185efde6fd639df9840c762d457367542d66079bb10c3cb2b
                                                            • Opcode Fuzzy Hash: 5b0057025ee81f21a0d0f024d1ef09b376e43af214c6d60373ac52b3e532b100
                                                            • Instruction Fuzzy Hash: 0E51B070F102199FEB55DFA4C854BAEBBF2FF88700F208529E106AB395DE758C018B90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2252363745.0000000001260000.00000040.00000800.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1260000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 612b989558248a74bcc33814f6698dacc119c5327fd5272d109c444c07fe98e5
                                                            • Instruction ID: 68385a8d125600f509f3e39bdd217d611850395a7f68f6c111cf9d1d80c9afe2
                                                            • Opcode Fuzzy Hash: 612b989558248a74bcc33814f6698dacc119c5327fd5272d109c444c07fe98e5
                                                            • Instruction Fuzzy Hash: AB515B755152928FDB06EB7CD4502ED7FA5AF8A320F2A046DC5449F3C2CA358C8ACB91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2252363745.0000000001260000.00000040.00000800.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1260000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c0faebf61e5dc87097bfd32bc1543e77a97b0eee525ecd71651f1f2a148aa865
                                                            • Instruction ID: 735ecc161ba8718b82a4bc83e4f5792db6ff9ebb0f03c9d783d5797dd684fea4
                                                            • Opcode Fuzzy Hash: c0faebf61e5dc87097bfd32bc1543e77a97b0eee525ecd71651f1f2a148aa865
                                                            • Instruction Fuzzy Hash: E6415472D1039A8FCB14CFB9D8042AEBFF5AF88310F15856AD418A7381DB74A881CBD1
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06C165AA
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: c24ab68d2d346adb6c884a645856b4a2ff071237e52ff692abeb873277ab331c
                                                            • Instruction ID: 3a12818717687035210f06ac27db955dd006309d8ec60b1c72a3a201824238ec
                                                            • Opcode Fuzzy Hash: c24ab68d2d346adb6c884a645856b4a2ff071237e52ff692abeb873277ab331c
                                                            • Instruction Fuzzy Hash: B651EFB1D00349AFDB14CFAAC884ADEBFB5BF49310F24852EE418AB210D7709985CF91
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06C165AA
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 7a1d03bad836abddd7fd0cd5bc880b97434045bae6e7bfe80466e316d4fb4fdf
                                                            • Instruction ID: 3ca16a38c78af80e9b6401e70650222a7a1a03fb11f58e9ad2cf9968c140deaf
                                                            • Opcode Fuzzy Hash: 7a1d03bad836abddd7fd0cd5bc880b97434045bae6e7bfe80466e316d4fb4fdf
                                                            • Instruction Fuzzy Hash: 5B41CEB1D103099FDF14CF9AC884ADEBBB5FF49310F24812AE819AB254D775A945CF90
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 06C1B3D9
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: c4bd0c50ae9475fd404f00d4c29094f20721fbd96610f997816b85b8a6105bf4
                                                            • Instruction ID: aac5b61a387a493297300c5cbfa0fb6ce640f5331375237c600de87c89ef0454
                                                            • Opcode Fuzzy Hash: c4bd0c50ae9475fd404f00d4c29094f20721fbd96610f997816b85b8a6105bf4
                                                            • Instruction Fuzzy Hash: CC4138B4900309CFDB54CF9AC888AAABBF5FF89314F24C459D519AB321D774A941DFA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Clipboard
                                                            • String ID:
                                                            • API String ID: 220874293-0
                                                            • Opcode ID: 02b28769923ae5e73ce5f6677d0547748f319874e258b6741f13cba78f3cab24
                                                            • Instruction ID: 4b4ae90a0ce68ff44220da4ae4147558161a39209237f13826cc6852a43caaa7
                                                            • Opcode Fuzzy Hash: 02b28769923ae5e73ce5f6677d0547748f319874e258b6741f13cba78f3cab24
                                                            • Instruction Fuzzy Hash: 0031F1B0D01249DFDB24DF99C984BCEBBF5AF49314F208069E404AB294DBB46945CF65
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Clipboard
                                                            • String ID:
                                                            • API String ID: 220874293-0
                                                            • Opcode ID: 3489f7085e7e783c757ed0cd346affeafa0ef9684fa8b793b3e4fcace89a3f45
                                                            • Instruction ID: 5a35444123d04af4bd01550f585f2965e2bb79bddfca410f340f10dd28363308
                                                            • Opcode Fuzzy Hash: 3489f7085e7e783c757ed0cd346affeafa0ef9684fa8b793b3e4fcace89a3f45
                                                            • Instruction Fuzzy Hash: EA31FFB0D01249DFDB24DF99C984BCEBBF5AF49314F208069E404AB2A4DBB4A945CF65
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06C1A10F
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 045fb662d81167da961de18cd074340f934b7b9ba625e84cd7905964df4b7260
                                                            • Instruction ID: 8bb5b04ea7eb2c27cd2edf77aafb0564c2f06d62308bfe9ef9fb9f49880498dd
                                                            • Opcode Fuzzy Hash: 045fb662d81167da961de18cd074340f934b7b9ba625e84cd7905964df4b7260
                                                            • Instruction Fuzzy Hash: 3421E6B5D012499FDB10CFA9D984ADEFFF8EB49320F14801AE914A7350D374A944CF61
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0126EFE7
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2252363745.0000000001260000.00000040.00000800.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1260000_newapp.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: 0650c59ec23c87dbc8895c76e24279f990ebfbfce121aa699b840f00a7895da6
                                                            • Instruction ID: 8a4152c1ef7b6972c8da050be2ccec3b4ee489d9e154505bcdd6d0b62abebbb6
                                                            • Opcode Fuzzy Hash: 0650c59ec23c87dbc8895c76e24279f990ebfbfce121aa699b840f00a7895da6
                                                            • Instruction Fuzzy Hash: 951126B6C15266CFDB01EFA8D4453DDBFA4EF4A320F264086D444AB282D334598ACBA5
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06C1A10F
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 0871655d2b1f12a9923f3aa4f0305fc257bf656cd3e8628b0ba8fa0d359b6b00
                                                            • Instruction ID: 00b69be438940f5016cc8374a1057908f3045ac6ca7fec7d98216039d0134651
                                                            • Opcode Fuzzy Hash: 0871655d2b1f12a9923f3aa4f0305fc257bf656cd3e8628b0ba8fa0d359b6b00
                                                            • Instruction Fuzzy Hash: 5621E4B5D002499FDB10CFAAD984ADEFBF8EB49320F14801AE918A7350D378A944CF61
                                                            APIs
                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06C1DAAB
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: 49cb48d029b328af0d1b9a4d1caf0a147e03bb8a118bd70e8c5aaf86016b98af
                                                            • Instruction ID: 8e5fb4a8205f043887c1bdc1a73b87f6595bb7b6f25a390995189f30edb32e36
                                                            • Opcode Fuzzy Hash: 49cb48d029b328af0d1b9a4d1caf0a147e03bb8a118bd70e8c5aaf86016b98af
                                                            • Instruction Fuzzy Hash: B52132B5D002099FCB14CF9AD844BEEBBF5AF88320F14842AE459A7250D774A945CFA1
                                                            APIs
                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06C1DAAB
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: b7e6deb3a6cfcfe581fe65ef677d1a696da9c94b2f2d92decc4de48c8de344ae
                                                            • Instruction ID: 7c2f3bc4a0776fe5fe12c19d38323337a5e80a1dac328fddcea9e08b5f57348c
                                                            • Opcode Fuzzy Hash: b7e6deb3a6cfcfe581fe65ef677d1a696da9c94b2f2d92decc4de48c8de344ae
                                                            • Instruction Fuzzy Hash: 052110B5D002099FCB14DF9AD844BEEFBF5EF89320F14842AE419A7250C774A945CFA1
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0126EFE7
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2252363745.0000000001260000.00000040.00000800.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1260000_newapp.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: 4da90184ba53197a27cc0cd68e72fc567dbad02b7a86bb022470d1e1315d22d5
                                                            • Instruction ID: 1a423c4ca09aec4f33c54d5b5c9ecf85be3ecaa7b9b65a62d875d50b389f9054
                                                            • Opcode Fuzzy Hash: 4da90184ba53197a27cc0cd68e72fc567dbad02b7a86bb022470d1e1315d22d5
                                                            • Instruction Fuzzy Hash: CD11C2B6C152668FDB00DFA8D4457DEBBA4AF0A314F164086D454AB282D738994ACBA2
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0126EFE7
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2252363745.0000000001260000.00000040.00000800.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_1260000_newapp.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: 1f24cce4c844b351d3adae0c664886d27ea178ecd7719ecde0864b6093fc4283
                                                            • Instruction ID: 092bfa08c838098134bbb84f94b0e730bc33676ec1ec9538595b0db7e186c067
                                                            • Opcode Fuzzy Hash: 1f24cce4c844b351d3adae0c664886d27ea178ecd7719ecde0864b6093fc4283
                                                            • Instruction Fuzzy Hash: 0D1123B1C1025A9BCB10DF9AC444BDEFBF8EF48320F11816AE818B7240D378A944CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 06C15456
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: e6145e6b6e4542062076cc4e132ee50d3796e48186c89c096209a6f893be1a5f
                                                            • Instruction ID: 39755784d428ec0a5b8f2ab62ba5a004d909e644bec11f2dc33b921912bb7b4a
                                                            • Opcode Fuzzy Hash: e6145e6b6e4542062076cc4e132ee50d3796e48186c89c096209a6f893be1a5f
                                                            • Instruction Fuzzy Hash: 5D11F0B5C002498FDB20DF9AC444B9EFBF4EB89220F50845AD829B7210D375A545CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,06C1B62D), ref: 06C1B6B7
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 29ccdb6e9b04bc3a56ba354a16352b1e7cd29ed92c4d85136b5fb329e9dae6e9
                                                            • Instruction ID: 5a666677a052014ee33e86c5091d520e5d0e3a3a296ba03dd5e72d43b4b955bb
                                                            • Opcode Fuzzy Hash: 29ccdb6e9b04bc3a56ba354a16352b1e7cd29ed92c4d85136b5fb329e9dae6e9
                                                            • Instruction Fuzzy Hash: 721100B1D00249CFCB60DF9AD548B9EBBF8EB49320F20845AD519A7350C374A944CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 06C1BB75
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 1973a457eb29bcd8eb77d324b08d0891086aca6988dde200aa16e3a8f6aa37dd
                                                            • Instruction ID: fe9c62e0c66cd5abe1937f87a127c6e2b8c8b5fbcde08c6dc6e1c6c06c65a15a
                                                            • Opcode Fuzzy Hash: 1973a457eb29bcd8eb77d324b08d0891086aca6988dde200aa16e3a8f6aa37dd
                                                            • Instruction Fuzzy Hash: CD1112B1C003498FCB20DF9AD488B9EBBF8EB49320F20845AD519B7750D375A944CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,06C1B62D), ref: 06C1B6B7
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 28f834fdd2d00fe474ef33ff069bb2c625f9cff03ffd5ab713ec811c5970a80e
                                                            • Instruction ID: 540c0fe3220cc4d921be6846cb0d4fecda153298b9f3ce3e8f6084cf0dc838f8
                                                            • Opcode Fuzzy Hash: 28f834fdd2d00fe474ef33ff069bb2c625f9cff03ffd5ab713ec811c5970a80e
                                                            • Instruction Fuzzy Hash: C91112B5C002498FCB20DF9AD944BDEFBF8EB49320F20841AD519A7350C374A944CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 06C1BB75
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: bc812cdb2ca14547fd655ea0bdf4888822e82a333fc2f1c5680e87afd6a83e9a
                                                            • Instruction ID: 14ec71f00946d11377b54e7b630bdadf899623bcddc838a2bf39d29166d78e51
                                                            • Opcode Fuzzy Hash: bc812cdb2ca14547fd655ea0bdf4888822e82a333fc2f1c5680e87afd6a83e9a
                                                            • Instruction Fuzzy Hash: 0E1112B5C003498FCB20DFAAD489BDEBBF8EB49320F208419D518A7650C375A944CFA5
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 06C15456
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 7c5a589db5f8d00343140d59e6ae1f7cfecea7be142bc7e23258a908b1fc5f23
                                                            • Instruction ID: 83f63e556538f1ad374eb8542da6555a0177e27dcb6890ff3b8f574bc1cbd7f2
                                                            • Opcode Fuzzy Hash: 7c5a589db5f8d00343140d59e6ae1f7cfecea7be142bc7e23258a908b1fc5f23
                                                            • Instruction Fuzzy Hash: 1A018BB69042488FDB10DF99D4043CAFBF0AB86315F24844AC559A7252C335A55ACF61
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 06C15456
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267379287.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c10000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 88907c0da8b14cd38b8a521946589cdc9c8c73a5caf6e3bbdbf599fc31cec6cf
                                                            • Instruction ID: 8bc7cdc85c9727f6899caaf102212e568fb0a8cb4c838ba141e8ac5f75c34f5f
                                                            • Opcode Fuzzy Hash: 88907c0da8b14cd38b8a521946589cdc9c8c73a5caf6e3bbdbf599fc31cec6cf
                                                            • Instruction Fuzzy Hash: 2CF058B5C00248CEDB10DF8AE4087CEBBF4AB8A316F60804AC019AB260C3799156CFA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: cf9ad23dfe80a4ead4f76078a09769ff6437a3ac22c8d2f8f0ac311f68749131
                                                            • Instruction ID: 23aa0e814ab635d82e0a0353c43e36c7f3dc356138d3c10a32258b9d9ad4755f
                                                            • Opcode Fuzzy Hash: cf9ad23dfe80a4ead4f76078a09769ff6437a3ac22c8d2f8f0ac311f68749131
                                                            • Instruction Fuzzy Hash: E241A370E1021ADFDB65EF65D45469EBBB2FF85300F20452DE406E7240DB74EA46CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 406aa9fed55244129cd6c847362555960f7b22f504a84a7808af28278edf64a1
                                                            • Instruction ID: 6c2c79aec4fb807d0825598359340a6eaf0818e91f7519c207c0941ff1e53445
                                                            • Opcode Fuzzy Hash: 406aa9fed55244129cd6c847362555960f7b22f504a84a7808af28278edf64a1
                                                            • Instruction Fuzzy Hash: F241B470E102169FDB65EF65D45469EBBB2FF85300F20852DE806EB340EB74EA46CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 8db0ed48c5a1a917e456d80b7e356f6b16d2ef07336de41c14adb6f566ae4c9d
                                                            • Instruction ID: 8fbc15fcfc0d3d6e10c829d9efb5102877c2eb4383720b8a8e6c46fa46a0844d
                                                            • Opcode Fuzzy Hash: 8db0ed48c5a1a917e456d80b7e356f6b16d2ef07336de41c14adb6f566ae4c9d
                                                            • Instruction Fuzzy Hash: 7D31D130B102169FDB559B74D95466E37A2FF89210B208538E406DB385DF3ADE468BA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: e3a509b99f38ae8c84134ee01a166abe79e142aafd2b80203982d0b9aa626d7b
                                                            • Instruction ID: d08aca8ffed22c87ab71a05831f64eddb387697aa5061d634bc7ed7e7233336c
                                                            • Opcode Fuzzy Hash: e3a509b99f38ae8c84134ee01a166abe79e142aafd2b80203982d0b9aa626d7b
                                                            • Instruction Fuzzy Hash: 7231E330B102169FDF559B74D95466E3AE3BF89210B20853CE406DB384DE3ADE41C7D5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \Obq
                                                            • API String ID: 0-2878401908
                                                            • Opcode ID: 17278ecd76a329d14f3e2ecc886466fb9483f807fe28a83661165309ea7264d9
                                                            • Instruction ID: f11caac4d4c2625733c05a8c3d96cf36fd0ace39600f34834f71475b7ea43e3e
                                                            • Opcode Fuzzy Hash: 17278ecd76a329d14f3e2ecc886466fb9483f807fe28a83661165309ea7264d9
                                                            • Instruction Fuzzy Hash: 4FF0DA30A60129DFDB14DF94E899BAE7BB2FF88605F204119E402A7294CBB41D01CBC0
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 09ff36e897d2c6b32901c6f75e5b9f6548988cb882e9ff148356300e7f926190
                                                            • Instruction ID: 9e5969923059d44da99739803154733a7112e6bf0a5f7c6d259e603c4dc5e730
                                                            • Opcode Fuzzy Hash: 09ff36e897d2c6b32901c6f75e5b9f6548988cb882e9ff148356300e7f926190
                                                            • Instruction Fuzzy Hash: 7CA18374F101198BEF64CB6DC4907BEB7B6FB99310F204429E409EB391CA39DD918B92
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 92c7f97b3f7423fc0855bdb5b5fec12eb9ea90ea0ba3ad084c1e20e8c7215937
                                                            • Instruction ID: d10da3f4b270823b7032e4a53d395716bdafb35d002bb6966a9ed2308e55222a
                                                            • Opcode Fuzzy Hash: 92c7f97b3f7423fc0855bdb5b5fec12eb9ea90ea0ba3ad084c1e20e8c7215937
                                                            • Instruction Fuzzy Hash: 49619071F000215FDB54AA6EC88066FBAD7AFD4224F254479E80EDB360DE79ED0287D1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba1cbb3c650ded0c142d34605b0214f05d438125ce54195fcfff492c78221b90
                                                            • Instruction ID: 99f17af01886652026b6c17dd233cce23c6043a65817589b81dc4932a8128645
                                                            • Opcode Fuzzy Hash: ba1cbb3c650ded0c142d34605b0214f05d438125ce54195fcfff492c78221b90
                                                            • Instruction Fuzzy Hash: 62815F71B0021A8FDB48DFA9D45476EB7F3EB88304F208529D40AEB394EB75DD468B41
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f5d9d7f5dd8dc04a85c215f3ca10a8fa92f5792296a67386818dabf8723d4f8
                                                            • Instruction ID: d967b553117a49332eb6490bc976697a92bbcbca162583e933cc1582236399f8
                                                            • Opcode Fuzzy Hash: 0f5d9d7f5dd8dc04a85c215f3ca10a8fa92f5792296a67386818dabf8723d4f8
                                                            • Instruction Fuzzy Hash: 57814E30B1021A8FDF48DFA9D45476EB7F2EB85304F208529D40AEB394DB75ED468B52
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 870230c2109db93b35cca1fe603606b4ca213be7ca1979d1c0741326c17c5527
                                                            • Instruction ID: 478a44a889239e5b0de93708efec86f49204f4750da7b659268bae1efe0ea03d
                                                            • Opcode Fuzzy Hash: 870230c2109db93b35cca1fe603606b4ca213be7ca1979d1c0741326c17c5527
                                                            • Instruction Fuzzy Hash: 0F912D30E1061A8FDF64DF68C890B9DB7B1FF89300F208699D549AB295DB70AA85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89b1fefb4eb13524075c732f0803e83bf37c843ca3b87843313e7489479461a0
                                                            • Instruction ID: febdb602dba9b7b05a4f0dd965f25f64d76e3aa2ac3bbd8814679a11c0a5bbdf
                                                            • Opcode Fuzzy Hash: 89b1fefb4eb13524075c732f0803e83bf37c843ca3b87843313e7489479461a0
                                                            • Instruction Fuzzy Hash: A9912C30E1061A8BDF64DF68C880B9DB7B1FF89310F20C699D549AB285DB70AA85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1612d46c2f3fb776dcdc2e7b615cc37b53049f500723a9e0fe3b99b172be8e38
                                                            • Instruction ID: bc0cdb5fa5186af0e61bc6dad4351160db59e9cd96fb23103c56e196c06392f9
                                                            • Opcode Fuzzy Hash: 1612d46c2f3fb776dcdc2e7b615cc37b53049f500723a9e0fe3b99b172be8e38
                                                            • Instruction Fuzzy Hash: 37714B71E002598FCB54DFA9D980AADBBF6FF88300F248929E415EB355DA34ED46CB50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c9653365814eb0e1ee9151ac331e16fc8193dd9725e472177189838df3a62f27
                                                            • Instruction ID: a66a21169aedf49bbd71b60f2e886833635ab290580cd0187b476e9a13516798
                                                            • Opcode Fuzzy Hash: c9653365814eb0e1ee9151ac331e16fc8193dd9725e472177189838df3a62f27
                                                            • Instruction Fuzzy Hash: CE714A71E002199FCB54DFA9D980AADBBF6FF88300F208929E415AB355DB34ED46CB50
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 63c6e7a127a342dfad224559666890562891f14510c358b205f7404eada8d849
                                                            • Instruction ID: a767b5c111ca07d1b0d9a0a5ac2ae5d269a6be8a40cc76fa62b45a84d8933ba5
                                                            • Opcode Fuzzy Hash: 63c6e7a127a342dfad224559666890562891f14510c358b205f7404eada8d849
                                                            • Instruction Fuzzy Hash: 21611331E002259FDB64AF78E4942ADB7B2FB84311F108C7EE52AD7241DB398E55CB81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f8000bd370cb2d5a3d9769e92c971fb7e7864ffcd4f8ef2c7ad12dba0b767f51
                                                            • Instruction ID: a9c290b3219c30d4c9f7c618baf2b6aeaba0bb4061d9c7a55f7091c37c855770
                                                            • Opcode Fuzzy Hash: f8000bd370cb2d5a3d9769e92c971fb7e7864ffcd4f8ef2c7ad12dba0b767f51
                                                            • Instruction Fuzzy Hash: A451EAB4F201159BEF646ABCD854B3F2A5AD78D310F20493EE50AD73D0DA2CCD9183A2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ac65811a5901659adef64f4ec4221d7aab29f2252eb4eb5a1bc30a656172fbee
                                                            • Instruction ID: cc56ed454a54ee3580f53daa1e6efd5a07242c59c862b476d6b43302bcf952e6
                                                            • Opcode Fuzzy Hash: ac65811a5901659adef64f4ec4221d7aab29f2252eb4eb5a1bc30a656172fbee
                                                            • Instruction Fuzzy Hash: BC51B7B4F201259BEF646ABCD954B3F2A5AD78D314F20493DE50AD7390CA2CCD9183A2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9dd080c39a49ae5fb10d84a843a2f6433285d46159b5dd743171359e5b6fe5d0
                                                            • Instruction ID: fc287c6630bfdb04b7f01a76f3c87fdbccb20ee5c27bac95dea26d31be732bca
                                                            • Opcode Fuzzy Hash: 9dd080c39a49ae5fb10d84a843a2f6433285d46159b5dd743171359e5b6fe5d0
                                                            • Instruction Fuzzy Hash: 3C416A71E006198FDF70CEA9D880AAFFBF6FB94310F50492AE116D7650D731E9458B90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 82fdb4c837b1ddb6873e9b38feee66baa7504cd7d38cbad64d0f1ce6cedf998e
                                                            • Instruction ID: 7d896e0fb0fac6689cae5895664ad68c7bfe16d7d34c15e8af819190828e860d
                                                            • Opcode Fuzzy Hash: 82fdb4c837b1ddb6873e9b38feee66baa7504cd7d38cbad64d0f1ce6cedf998e
                                                            • Instruction Fuzzy Hash: 97318375E20225CFDF608F68C4807AEBBB1FB45320FA5856AD459DB345C234EE41CB91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 81aae168ffd785a78c8b7fe0f42baa459a1d304027d8268048e6c867c4b260c3
                                                            • Instruction ID: b4ebc072b7780950d82a3c9acaabf33b5ef073bf17b6faf17f771525a1ff90cf
                                                            • Opcode Fuzzy Hash: 81aae168ffd785a78c8b7fe0f42baa459a1d304027d8268048e6c867c4b260c3
                                                            • Instruction Fuzzy Hash: 4231BB70E1071A9BCB55DF65C58069EBBF6FF84304F208929E806EB340DB74B946CB41
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c4edd7fa73b5e81598e3b4fcba732b20f6d587c22316d8e146567f0e38819713
                                                            • Instruction ID: 914b7a55d8dacaf0d137ca4b441ad22705842d00eca2fc1d5b1a7a89848b8096
                                                            • Opcode Fuzzy Hash: c4edd7fa73b5e81598e3b4fcba732b20f6d587c22316d8e146567f0e38819713
                                                            • Instruction Fuzzy Hash: 13316D31E1061A9FCB54CF64C99469EB7F2EF89310F10892DE806A7350DB35EE46CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1be0adcaf82885259f2eaaed543ea0e4e5d5750d507a034d786f6bf5e2e96064
                                                            • Instruction ID: 34df33e904c1a748191ddbd85cf41d21eae7b9d3d3d4b0d77cd5c5971c7feae1
                                                            • Opcode Fuzzy Hash: 1be0adcaf82885259f2eaaed543ea0e4e5d5750d507a034d786f6bf5e2e96064
                                                            • Instruction Fuzzy Hash: D5313A31E1061A9BCF19CF64C99569EB7F2AF89300F108929E906E7350DB75EE46CB90
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dbbcb42230e835f9961c8c6263f908c2a915b25e9ebb87a9c1f378f4387c1f56
                                                            • Instruction ID: a6839d7a394ecb6aabc247a0a0e09f4118806ec4d68aabb5e6514d2a33cb3758
                                                            • Opcode Fuzzy Hash: dbbcb42230e835f9961c8c6263f908c2a915b25e9ebb87a9c1f378f4387c1f56
                                                            • Instruction Fuzzy Hash: 06218EB5F002559FDB50CF69D880AAEBBF5EB48710F108029E909EB394E73ADD018B91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dcb26bd6f41c1ac084705d613b56c85db040fc8e4fc641be3d9bd82c9a1babf8
                                                            • Instruction ID: 530c0ca7992bc4572e83f77fa1f8b4cac83ee1e652b12284977ea18f2be4139f
                                                            • Opcode Fuzzy Hash: dcb26bd6f41c1ac084705d613b56c85db040fc8e4fc641be3d9bd82c9a1babf8
                                                            • Instruction Fuzzy Hash: C121BFB1F002169FDB41CF79D880AAEBBF5EB48710F048069E909EB344E739DD018B91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2251487337.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_121d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f695d8daa9ec80d0465a92c0fe0e6141d40ce57100a868a83d6daca2497ab1e5
                                                            • Instruction ID: 329e75232e0de122af1c2cd8e77e099fddbb77ec190515a12daacc64a0f57410
                                                            • Opcode Fuzzy Hash: f695d8daa9ec80d0465a92c0fe0e6141d40ce57100a868a83d6daca2497ab1e5
                                                            • Instruction Fuzzy Hash: 5F2137B1514208DFDB11DF58D9C8B26BBE5FB94314F24C56DD9090B24AC377D447CA62
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 33ce1543c32725690843eea15f72704edd9bd8b7c22fb806ddcbe4803036b316
                                                            • Instruction ID: 0ffbdc89df228c7277b1c0fc5d1054d1e3b65b559d94c2327898afa6fbc0815d
                                                            • Opcode Fuzzy Hash: 33ce1543c32725690843eea15f72704edd9bd8b7c22fb806ddcbe4803036b316
                                                            • Instruction Fuzzy Hash: 4721A231B101299FDF44DB6AE9506ADB7B7EB84310F248439E409E7340DB35ED558BD4
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d17a5be9afb91b9c9a9bbc53af3fdfc8fb4b86a1c41363b96e4ce2b9d86e4c76
                                                            • Instruction ID: 1ca2d100a34fd6a5f8f64a8fef92b0a3c37533525955ae6a4a12e15f06075f6c
                                                            • Opcode Fuzzy Hash: d17a5be9afb91b9c9a9bbc53af3fdfc8fb4b86a1c41363b96e4ce2b9d86e4c76
                                                            • Instruction Fuzzy Hash: 2121D571E001A59FCB649F78D8805DEBBB2EB89310F1485A9D00DE7344DA31DA41CB91
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d739c59412ccee5fa9fdc0baac2011521e614bcec566e68b94f87d101039b097
                                                            • Instruction ID: bebdc6ae25d6a3ee1f840be0d9ffc944179b26eb742eeceaaf152f0280b0daa2
                                                            • Opcode Fuzzy Hash: d739c59412ccee5fa9fdc0baac2011521e614bcec566e68b94f87d101039b097
                                                            • Instruction Fuzzy Hash: 1F11A535B105285FDB88DA69DC146AE73FAEBC8710F008139D40AE7354DF2ADC0687D1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b84fcc4e7b2a1e2b06efc0537b738ad4fd1cc20255891979b8446daedf9a608
                                                            • Instruction ID: 521a538bc729f8590911dd8a54b335b93b4c0fc8cebc4df327fb00abe2f75d35
                                                            • Opcode Fuzzy Hash: 6b84fcc4e7b2a1e2b06efc0537b738ad4fd1cc20255891979b8446daedf9a608
                                                            • Instruction Fuzzy Hash: 73115171D1076E8BCF21CFA6C94569EBBB5BF95300F10462AD805FB200DBB1A945CB81
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1b47592b8560d79ca3d0069c1bcd10ddbc56f81a77f19bb2b93ef2e7194c06bb
                                                            • Instruction ID: 42066689e1a96a5eddb6a6e144f0c59bfda40988d8dceb3b1156c262b5ded69c
                                                            • Opcode Fuzzy Hash: 1b47592b8560d79ca3d0069c1bcd10ddbc56f81a77f19bb2b93ef2e7194c06bb
                                                            • Instruction Fuzzy Hash: 0321C0B1D01269AFCB10DF9AD884ADEFFB4FB49310F50812AE918A7240D374A954CBE5
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c88bdc527559caa976dbbebf09ce546ee867bd1a14b0d41fbb0e4d7d53f396d0
                                                            • Instruction ID: dac42cf22b68bc35d53163a4d5ab2afa850bf36deb85d361db6ca35495c5a6f1
                                                            • Opcode Fuzzy Hash: c88bdc527559caa976dbbebf09ce546ee867bd1a14b0d41fbb0e4d7d53f396d0
                                                            • Instruction Fuzzy Hash: 1C01DF76B102210BEBA9D668D85972EA7C7DBC9711F20883EE10EC7385ED25DD020382
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2251487337.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_121d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction ID: 5c413dc740b4e00114f1a2d9230541a565ab859c72dab0d80fc27bc3468098c1
                                                            • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction Fuzzy Hash: BA11BB75504284CFDB12CF58D5C8B15BBA2FB84314F28C6AAD9494B65AC33BD44ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 153b29cc0135bc3576e16a72a7557d8e66828d3a23480af3b94388b740a5e7a6
                                                            • Instruction ID: c1b473bc09551790b2b2be3bdb28f5e9a88632208a2b1166dd3b888608b09f46
                                                            • Opcode Fuzzy Hash: 153b29cc0135bc3576e16a72a7557d8e66828d3a23480af3b94388b740a5e7a6
                                                            • Instruction Fuzzy Hash: 2A21CFB5D01269AFCB10DF9AD984ADEFFB4FB48310F50812AE918B7240D374A954CBA5
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 76b32075bac188ee5d1359468c9284ea5fd73f41b82da10079d84a387dd0d330
                                                            • Instruction ID: 74fc7a0e6355988f9d3959290b00bbe56185ebe81c5f878f09ca210c0535699d
                                                            • Opcode Fuzzy Hash: 76b32075bac188ee5d1359468c9284ea5fd73f41b82da10079d84a387dd0d330
                                                            • Instruction Fuzzy Hash: CF01DF76F204214BDB619678959872EA7D2DBC9620F20882DF50AC7340EE25DD034382
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d3902c5082704979a7544ba011d85d3269d2d829a06f0ff898ef4df2e9900c4
                                                            • Instruction ID: cd0e2c71bc578dc6dd766040154cb45618e5a3cad797943f17bfbb67fc9895cb
                                                            • Opcode Fuzzy Hash: 6d3902c5082704979a7544ba011d85d3269d2d829a06f0ff898ef4df2e9900c4
                                                            • Instruction Fuzzy Hash: 1B01AD31B101210BDBA9966DD44972EA7DADBC9A20F20C83DE50EC7344ED65DD024382
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dedf00212de4db3b3eb8d3d13dd2bed1f09165953ebe5d8a4e1d3b9fe662d638
                                                            • Instruction ID: 2e895643589bd636f6b22c49c7feaaadbcc68483ca8a3f043f2b4deb017e017b
                                                            • Opcode Fuzzy Hash: dedf00212de4db3b3eb8d3d13dd2bed1f09165953ebe5d8a4e1d3b9fe662d638
                                                            • Instruction Fuzzy Hash: 3F01F736F141245BEB89DD68DC507EF73EA9BC8600F10803AC10AE7344EE2ACC0A87D2
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 728f746acf76ff8e68af77aefdd4b0cedc63540b1507a1a7d9f474a016bbbc32
                                                            • Instruction ID: e05617cc5bcf3400e6033872e1a931123b8fd7f876fbab591316c403149f0073
                                                            • Opcode Fuzzy Hash: 728f746acf76ff8e68af77aefdd4b0cedc63540b1507a1a7d9f474a016bbbc32
                                                            • Instruction Fuzzy Hash: 2601A435F205214BDB65A67D959472EA7D6DBC9620F20883DF50EC7340DE25DD024385
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a7f0f3f62fcaa5cb6018dcac18b19e4ab6c5f2e1c87b8c98496d55c45b3cc460
                                                            • Instruction ID: 88cb0c9dce111732d2a9471673b4275c5ca4e6dfe59de9d70b94ed04c1397b18
                                                            • Opcode Fuzzy Hash: a7f0f3f62fcaa5cb6018dcac18b19e4ab6c5f2e1c87b8c98496d55c45b3cc460
                                                            • Instruction Fuzzy Hash: 7F01F731B104218FD761DA78E45971BA7D2DB89710F10C43DF44AC7351DD29ED128381
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 081036f3d903c9ed29e9b0cb0a8698664450cf4dfb3d26e9a99b1d81530a42d3
                                                            • Instruction ID: 7fd2f489ad8d67cc5c653466d289b009d4d5b50489046b305e472bf3f8c8e16a
                                                            • Opcode Fuzzy Hash: 081036f3d903c9ed29e9b0cb0a8698664450cf4dfb3d26e9a99b1d81530a42d3
                                                            • Instruction Fuzzy Hash: 5601F431B104208FDB60DA79E45972BB7D6DB89B10F20843CF54EC7350DE29ED128781
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f41107917a4712ef6e30d2e400afba0162508670e5cbd9a5fc09433ce65ecb9b
                                                            • Instruction ID: c2b1c4027a99ccd9052e1f8648e1febca623795b993172d4770b0f40ed0feae3
                                                            • Opcode Fuzzy Hash: f41107917a4712ef6e30d2e400afba0162508670e5cbd9a5fc09433ce65ecb9b
                                                            • Instruction Fuzzy Hash: 6EE09AB1B05118ABCBA0CEA48A8474E77EAEB45204F2088B9D809DB206F132EB128740
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60989437eb31f36a88b24c626a9401e03f262ae62647aa4789d74cd00d0c7935
                                                            • Instruction ID: cb059ecc5469a492913e8f40a4c84bbccecd7537724f7aec99010c8ecfbec094
                                                            • Opcode Fuzzy Hash: 60989437eb31f36a88b24c626a9401e03f262ae62647aa4789d74cd00d0c7935
                                                            • Instruction Fuzzy Hash: DAE01271F10218BBDF90DEB5C94575EB7EDE706214F2088B9D409DB206E576DB029780
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-2843079600
                                                            • Opcode ID: 36912d31d04ee0e3dade746ac687089ecd40940840f7045fbe7f0787e4c57d1f
                                                            • Instruction ID: 32e564be4479f8c697b440a9b47a6246c59ee393a2d3da02d99135279685b591
                                                            • Opcode Fuzzy Hash: 36912d31d04ee0e3dade746ac687089ecd40940840f7045fbe7f0787e4c57d1f
                                                            • Instruction Fuzzy Hash: 34122E70E00229CFDB64DF69C894AADB7F2BF89704F208569D409AB354DB349D81CF95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-1273862796
                                                            • Opcode ID: 5ad6a949e26b6dad5bef762f05a9b4ce5d385879770d96a0659365e33d180c4f
                                                            • Instruction ID: d7ddd9b699046e18f88b5628a2024a9755503aabca83032a251c3eb4ea05e28d
                                                            • Opcode Fuzzy Hash: 5ad6a949e26b6dad5bef762f05a9b4ce5d385879770d96a0659365e33d180c4f
                                                            • Instruction Fuzzy Hash: 7F919530A10219DFDB68DFA9D594B6E77F2FF44704F10852DE881AB290CB799D51CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-981061697
                                                            • Opcode ID: 58875e70cb97698585b06c1905e855e78c2001c92d28e6620c008c7e00d73f6b
                                                            • Instruction ID: b734d32c2361e2cb26026f8bd9a470ff6145cca90def92d455d6167fc4af9446
                                                            • Opcode Fuzzy Hash: 58875e70cb97698585b06c1905e855e78c2001c92d28e6620c008c7e00d73f6b
                                                            • Instruction Fuzzy Hash: 76F16470B10215CFDB59EF69C594A6EB7B2FF84700F208568D405AB394DB39EC82CB94
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: 83359a76adc732c828b97ea6d51bae0b27d6f3096208022a51ac5fa5263b0a77
                                                            • Instruction ID: ddd2d2fa229ef8d7ce1c6ac069ec5daf12b52bc44690ad1ac7ddf2b83b87eac6
                                                            • Opcode Fuzzy Hash: 83359a76adc732c828b97ea6d51bae0b27d6f3096208022a51ac5fa5263b0a77
                                                            • Instruction Fuzzy Hash: 79B12C30E11219CFDB54EFA9C494A6EB7B2FF84304F248529E4069B395DB75DD82CB81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR]q$LR]q$$]q$$]q
                                                            • API String ID: 0-3527005858
                                                            • Opcode ID: a992d6f779e844efb2b794f3e2befb8072a06d220a4498e483d4cfac26e990e0
                                                            • Instruction ID: 1fa4379481c4051b463807bcb28e42578f3f57b62dc291fccb0204884d9b58da
                                                            • Opcode Fuzzy Hash: a992d6f779e844efb2b794f3e2befb8072a06d220a4498e483d4cfac26e990e0
                                                            • Instruction Fuzzy Hash: 1451C130B113129FDB58EF29C880A6A77E2FF88700F14896DF406AB395DA35ED41CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2267513480.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_6c30000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: 6869b1359007fafca9ee3af8b22f3768cc5937a380ea0c8b54fb00f468ee3527
                                                            • Instruction ID: 8c47b7d24aabe45982424f87d65440fbaf502197974e2b5252685a1a06b13aea
                                                            • Opcode Fuzzy Hash: 6869b1359007fafca9ee3af8b22f3768cc5937a380ea0c8b54fb00f468ee3527
                                                            • Instruction Fuzzy Hash: 1D519274E102158FDF65DFA9D580A6EB3B2EF88300F208929E446EB350DB35DD61CB81

                                                            Execution Graph

                                                            Execution Coverage:9.9%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:56
                                                            Total number of Limit Nodes:3
                                                            execution_graph 37384 83b5d58 37386 83b5da6 DrawTextExW 37384->37386 37387 83b5dfe 37386->37387 37355 74de188 37356 74de211 CreateProcessA 37355->37356 37358 74de3d3 37356->37358 37342 187ae30 37343 187ae31 37342->37343 37346 187af19 37343->37346 37344 187ae3f 37347 187af5c 37346->37347 37348 187af39 37346->37348 37347->37344 37348->37347 37349 187b160 GetModuleHandleW 37348->37349 37350 187b18d 37349->37350 37350->37344 37338 74dda40 37339 74dda80 VirtualAllocEx 37338->37339 37341 74ddabd 37339->37341 37351 74ddbf0 37352 74ddc3b ReadProcessMemory 37351->37352 37354 74ddc7f 37352->37354 37359 74ddb00 37360 74ddb48 WriteProcessMemory 37359->37360 37362 74ddb9f 37360->37362 37363 74dd480 37364 74dd4c0 ResumeThread 37363->37364 37366 74dd4f1 37364->37366 37409 74dd530 37410 74dd560 Wow64SetThreadContext 37409->37410 37412 74dd5bd 37410->37412 37367 187d5c8 37368 187d5c9 37367->37368 37372 187d797 37368->37372 37376 187d7a8 37368->37376 37369 187d6fb 37373 187d7a8 37372->37373 37380 187bca0 37373->37380 37377 187d7ad 37376->37377 37378 187bca0 DuplicateHandle 37377->37378 37379 187d7d6 37378->37379 37379->37369 37381 187d810 DuplicateHandle 37380->37381 37383 187d7d6 37381->37383 37383->37369 37388 1874668 37389 1874669 37388->37389 37390 1874686 37389->37390 37392 1874779 37389->37392 37393 187477c 37392->37393 37397 1874888 37393->37397 37401 1874878 37393->37401 37399 1874889 37397->37399 37398 187498c 37398->37398 37399->37398 37405 187449c 37399->37405 37403 187487c 37401->37403 37402 187498c 37402->37402 37403->37402 37404 187449c CreateActCtxA 37403->37404 37404->37402 37406 1875918 CreateActCtxA 37405->37406 37408 18759db 37406->37408

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 597 74de17c-74de21d 601 74de21f-74de229 597->601 602 74de256-74de276 597->602 601->602 603 74de22b-74de22d 601->603 607 74de2af-74de2de 602->607 608 74de278-74de282 602->608 605 74de22f-74de239 603->605 606 74de250-74de253 603->606 609 74de23d-74de24c 605->609 610 74de23b 605->610 606->602 618 74de317-74de3d1 CreateProcessA 607->618 619 74de2e0-74de2ea 607->619 608->607 611 74de284-74de286 608->611 609->609 612 74de24e 609->612 610->609 613 74de2a9-74de2ac 611->613 614 74de288-74de292 611->614 612->606 613->607 616 74de294 614->616 617 74de296-74de2a5 614->617 616->617 617->617 620 74de2a7 617->620 630 74de3da-74de460 618->630 631 74de3d3-74de3d9 618->631 619->618 621 74de2ec-74de2ee 619->621 620->613 623 74de311-74de314 621->623 624 74de2f0-74de2fa 621->624 623->618 625 74de2fc 624->625 626 74de2fe-74de30d 624->626 625->626 626->626 627 74de30f 626->627 627->623 641 74de470-74de474 630->641 642 74de462-74de466 630->642 631->630 644 74de484-74de488 641->644 645 74de476-74de47a 641->645 642->641 643 74de468 642->643 643->641 647 74de498-74de49c 644->647 648 74de48a-74de48e 644->648 645->644 646 74de47c 645->646 646->644 650 74de4ae-74de4b5 647->650 651 74de49e-74de4a4 647->651 648->647 649 74de490 648->649 649->647 652 74de4cc 650->652 653 74de4b7-74de4c6 650->653 651->650 655 74de4cd 652->655 653->652 655->655
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 074DE3BE
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 6f5b93ec62e958d48735ccfded22b8b11c943eb85153a860d791658395c395fc
                                                            • Instruction ID: 8edff42fee799c495ec9eff4e41f268296c8b803e7dabf8a78ae4e94aa8bc7bb
                                                            • Opcode Fuzzy Hash: 6f5b93ec62e958d48735ccfded22b8b11c943eb85153a860d791658395c395fc
                                                            • Instruction Fuzzy Hash: DDA161B1D0022ACFDB20CF68C9557EEBBB1FF48314F14856AD859A7240DB749985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 656 74de188-74de21d 658 74de21f-74de229 656->658 659 74de256-74de276 656->659 658->659 660 74de22b-74de22d 658->660 664 74de2af-74de2de 659->664 665 74de278-74de282 659->665 662 74de22f-74de239 660->662 663 74de250-74de253 660->663 666 74de23d-74de24c 662->666 667 74de23b 662->667 663->659 675 74de317-74de3d1 CreateProcessA 664->675 676 74de2e0-74de2ea 664->676 665->664 668 74de284-74de286 665->668 666->666 669 74de24e 666->669 667->666 670 74de2a9-74de2ac 668->670 671 74de288-74de292 668->671 669->663 670->664 673 74de294 671->673 674 74de296-74de2a5 671->674 673->674 674->674 677 74de2a7 674->677 687 74de3da-74de460 675->687 688 74de3d3-74de3d9 675->688 676->675 678 74de2ec-74de2ee 676->678 677->670 680 74de311-74de314 678->680 681 74de2f0-74de2fa 678->681 680->675 682 74de2fc 681->682 683 74de2fe-74de30d 681->683 682->683 683->683 684 74de30f 683->684 684->680 698 74de470-74de474 687->698 699 74de462-74de466 687->699 688->687 701 74de484-74de488 698->701 702 74de476-74de47a 698->702 699->698 700 74de468 699->700 700->698 704 74de498-74de49c 701->704 705 74de48a-74de48e 701->705 702->701 703 74de47c 702->703 703->701 707 74de4ae-74de4b5 704->707 708 74de49e-74de4a4 704->708 705->704 706 74de490 705->706 706->704 709 74de4cc 707->709 710 74de4b7-74de4c6 707->710 708->707 712 74de4cd 709->712 710->709 712->712
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 074DE3BE
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 4443f2b43868653785d86d3d56e79474adccdc949f0efdf883d99ec43c89fe20
                                                            • Instruction ID: 935b01458c5f9bc0351d9a9dd8e17157856ee33a5cc3d2c92f417a87686634f4
                                                            • Opcode Fuzzy Hash: 4443f2b43868653785d86d3d56e79474adccdc949f0efdf883d99ec43c89fe20
                                                            • Instruction Fuzzy Hash: 1B9160B1D0022ACFDB20CF68C9547EEBBB2FF48314F14856AD849A7240DB749985CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 713 187af19-187af37 714 187af63-187af67 713->714 715 187af39-187af46 call 18798a0 713->715 717 187af7b-187afbc 714->717 718 187af69-187af73 714->718 721 187af5c 715->721 722 187af48 715->722 724 187afbe-187afc6 717->724 725 187afc9-187afd7 717->725 718->717 721->714 770 187af4e call 187b1b0 722->770 771 187af4e call 187b1c0 722->771 724->725 726 187affb-187affd 725->726 727 187afd9-187afde 725->727 732 187b000-187b007 726->732 729 187afe0-187afe7 call 187a270 727->729 730 187afe9 727->730 728 187af54-187af56 728->721 731 187b098-187b116 728->731 734 187afeb-187aff9 729->734 730->734 763 187b11d-187b158 731->763 764 187b118-187b11c 731->764 735 187b014-187b01b 732->735 736 187b009-187b011 732->736 734->732 739 187b01d-187b025 735->739 740 187b028-187b031 call 187a280 735->740 736->735 739->740 744 187b033-187b03b 740->744 745 187b03e-187b043 740->745 744->745 746 187b045-187b04c 745->746 747 187b061-187b06e 745->747 746->747 749 187b04e-187b05e call 187a290 call 187a2a0 746->749 754 187b091-187b097 747->754 755 187b070-187b08e 747->755 749->747 755->754 765 187b160-187b18b GetModuleHandleW 763->765 766 187b15a-187b15d 763->766 764->763 767 187b194-187b1a8 765->767 768 187b18d-187b193 765->768 766->765 768->767 770->728 771->728
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0187B17E
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2271302020.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_1870000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 16a5bb12e7bd464d4d957557859dc6494f456968bf7741bb6b418b31508a96ef
                                                            • Instruction ID: 50ca0e069403050b803238f79e913956801ba70f12019c171d0bdfa0b02be6bb
                                                            • Opcode Fuzzy Hash: 16a5bb12e7bd464d4d957557859dc6494f456968bf7741bb6b418b31508a96ef
                                                            • Instruction Fuzzy Hash: C1817770A00B458FD729DF29D04479ABBF2FF88314F04892DE58AD7A50DB35EA45CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 772 187590c-187590e 773 1875915-1875916 772->773 774 1875910 772->774 775 187591d-18759d9 CreateActCtxA 773->775 776 1875918-187591c 773->776 774->773 778 18759e2-1875a3c 775->778 779 18759db-18759e1 775->779 776->775 786 1875a3e-1875a41 778->786 787 1875a4b-1875a4f 778->787 779->778 786->787 788 1875a51-1875a5d 787->788 789 1875a60 787->789 788->789 791 1875a61 789->791 791->791
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 018759C9
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2271302020.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_1870000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 5a7e49baf35a32eceb68c2feb92c146cca3bfac5de82a2d47116371d38d7485b
                                                            • Instruction ID: 68469b6bf9381a689fe44807498eb5fe41fa060102927c42f4c5a976072fe59d
                                                            • Opcode Fuzzy Hash: 5a7e49baf35a32eceb68c2feb92c146cca3bfac5de82a2d47116371d38d7485b
                                                            • Instruction Fuzzy Hash: BE41C1B1D00719CBDB24DFA9C884BDDBBB5BF49314F20806AD408AB251DB75AA46CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 792 187449c-18759d9 CreateActCtxA 796 18759e2-1875a3c 792->796 797 18759db-18759e1 792->797 804 1875a3e-1875a41 796->804 805 1875a4b-1875a4f 796->805 797->796 804->805 806 1875a51-1875a5d 805->806 807 1875a60 805->807 806->807 809 1875a61 807->809 809->809
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 018759C9
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2271302020.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_1870000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 40b69d7779325c131b77ab32e555b35531ccf972a974b1fe1bb73aa2a073966a
                                                            • Instruction ID: 3795817cab8dab9e1317eb4e2a99e4a31fc054d45a158db0b0b8428256204b56
                                                            • Opcode Fuzzy Hash: 40b69d7779325c131b77ab32e555b35531ccf972a974b1fe1bb73aa2a073966a
                                                            • Instruction Fuzzy Hash: 9541C0B0C0071DCBDB24DFA9C884BDDBBB5BF49314F20806AD408AB251DB75AA46CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 810 74ddaf8-74ddb4e 813 74ddb5e-74ddb9d WriteProcessMemory 810->813 814 74ddb50-74ddb5c 810->814 816 74ddb9f-74ddba5 813->816 817 74ddba6-74ddbd6 813->817 814->813 816->817
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 074DDB90
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 8ce9fe8828060f9aaa8d7211e7f09d8c62caeb7b958f4a07d6da39e61a21aa9b
                                                            • Instruction ID: 51b1036b99034987e12ea10b32e1c40a39581fa67f7905069e5641eba075bfb5
                                                            • Opcode Fuzzy Hash: 8ce9fe8828060f9aaa8d7211e7f09d8c62caeb7b958f4a07d6da39e61a21aa9b
                                                            • Instruction Fuzzy Hash: 6B2159B5D003099FDB10DFA9C845BEEBBF5FB88310F10842AE559A7240C7749941CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 821 74dd528-74dd52c 822 74dd52e-74dd55c 821->822 823 74dd560-74dd57b 821->823 822->823 826 74dd57d-74dd589 823->826 827 74dd58b-74dd58e 823->827 826->827 828 74dd595-74dd5bb Wow64SetThreadContext 827->828 829 74dd5bd-74dd5c3 828->829 830 74dd5c4-74dd5f4 828->830 829->830
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 074DD5AE
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: be6c9f2242006d191209c6e8f62993363cde47455ec333908e5cbc9b67e9222f
                                                            • Instruction ID: 0c62879da8699e40866c4d1c25c067487e9730f59049d6c0a40f09bee45e8053
                                                            • Opcode Fuzzy Hash: be6c9f2242006d191209c6e8f62993363cde47455ec333908e5cbc9b67e9222f
                                                            • Instruction Fuzzy Hash: 452168B5D002099FDB10CFAAC8457EEBBF4AF89214F10842AD459A7241D73899458FA1
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 083B5DEF
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2292328948.00000000083B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 083B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_83b0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: c2fb287dc54532350163dc0a616c638729372fcc94cbc527f5f2bc660095d718
                                                            • Instruction ID: 59d4d9a775c77ab75665bf4b494a359288d51774435b99f40c2f98e7e7ee0be6
                                                            • Opcode Fuzzy Hash: c2fb287dc54532350163dc0a616c638729372fcc94cbc527f5f2bc660095d718
                                                            • Instruction Fuzzy Hash: F231D1B5D002499FDB10CF9AD884ADEBBF5FB88310F14842EE919A7610D374A944CFA1
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0187D7D6,?,?,?,?,?), ref: 0187D897
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2271302020.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_1870000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: cf1811b497d1e2a74d31aed0f266d547ea93a5779acd786c10e48cf6ad4537b2
                                                            • Instruction ID: abd069794894dd4227a3f98da5416a6e0906735fbde262dc381bf11fa39f6b3d
                                                            • Opcode Fuzzy Hash: cf1811b497d1e2a74d31aed0f266d547ea93a5779acd786c10e48cf6ad4537b2
                                                            • Instruction Fuzzy Hash: E92155B5C002499FDB10CFAAD884ADEBFF4EF49320F14851AE958E7250C378A945CFA1
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 083B5DEF
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2292328948.00000000083B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 083B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_83b0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: d5dd3f6b6490870c5343520140d4f520bca280ca383c18c8e6e132f885705562
                                                            • Instruction ID: 2e65ca5a41260fd19e5390b747b97fb021786150eb5fe05ce3d6930ff3bcd299
                                                            • Opcode Fuzzy Hash: d5dd3f6b6490870c5343520140d4f520bca280ca383c18c8e6e132f885705562
                                                            • Instruction Fuzzy Hash: 8821AEB5D003499FDB10CF9AD884ADEBBF5AB88320F14842EE919A7610D775A944CFA1
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 074DDB90
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 2e6feafdd99ce6d280bab0016fdd76f56e327d1ce34d3ae760c860294700f857
                                                            • Instruction ID: 37b70ecc9119a185655eff6bebb2812887c385ca096dcb0c21606089fd75479a
                                                            • Opcode Fuzzy Hash: 2e6feafdd99ce6d280bab0016fdd76f56e327d1ce34d3ae760c860294700f857
                                                            • Instruction Fuzzy Hash: 032144B5D003499FCB10CFA9C885BEEBBF4FF88314F10842AE959A7240C7789940CBA1
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 074DDC70
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 8a4548168f9fc9d804e5dd77fac9e49f1a8275fbbbc382cf3f9fca3762119fbd
                                                            • Instruction ID: 1e5996949b809239ee5ff9d38f77e53dd2323834b74386d5d44f57066e2e81a3
                                                            • Opcode Fuzzy Hash: 8a4548168f9fc9d804e5dd77fac9e49f1a8275fbbbc382cf3f9fca3762119fbd
                                                            • Instruction Fuzzy Hash: 0F214AB5D003499FDB10CFAAD885ADEFBF4FF88320F50842AE519A7240C7749941DBA1
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0187D7D6,?,?,?,?,?), ref: 0187D897
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2271302020.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_1870000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: bed69ed5fae7bc43c86ec508e002b87e530ee0d413e046534bcdb365c59cf0ee
                                                            • Instruction ID: cbe047b47c14d6ecd4a860a8d2b5fa85a1e7be21cef8c4f969fbf3fef8c8bed1
                                                            • Opcode Fuzzy Hash: bed69ed5fae7bc43c86ec508e002b87e530ee0d413e046534bcdb365c59cf0ee
                                                            • Instruction Fuzzy Hash: 802103B5D002489FDB10CF9AD884AEEBFF8EB48310F14842AE918A3310D374A954CFA1
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 074DD5AE
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: ac9c75df86450890e0dda20060bee1434b80d9f267ed262f38b8e71291971a28
                                                            • Instruction ID: 2b15d349ad711b41f4bd438fc96a738c221db1389a361a924f8c506b443afb37
                                                            • Opcode Fuzzy Hash: ac9c75df86450890e0dda20060bee1434b80d9f267ed262f38b8e71291971a28
                                                            • Instruction Fuzzy Hash: FE2138B1D003098FDB10DFAAC4857EEBBF4EF88314F10842AD459A7240DB78A945CFA1
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 074DDC70
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 545f31a64e96ceb35018afed527f0fa94435b48f05a5c3aff514afda8433e26f
                                                            • Instruction ID: f8d9f996b5fbce85983f93142d3283c40fbb8160a0005a402606dac98923a8e0
                                                            • Opcode Fuzzy Hash: 545f31a64e96ceb35018afed527f0fa94435b48f05a5c3aff514afda8433e26f
                                                            • Instruction Fuzzy Hash: 682125B1D003499FDB10DFAAC885AEEFBF5FF88310F50842AE559A7240C7789941DBA1
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 074DDAAE
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: bbbd376947a78ae4f648a5dc140da392621615546a0855a50cbbeb30d04b9f49
                                                            • Instruction ID: e242f9ae92e85d4a0d080bf57a80e8fd72e5e02033377f29f85fed79ac363054
                                                            • Opcode Fuzzy Hash: bbbd376947a78ae4f648a5dc140da392621615546a0855a50cbbeb30d04b9f49
                                                            • Instruction Fuzzy Hash: 22216AB6D002099FDB10DFA9D8446DEBFF5EF88320F14841AD519A7250CB359541CFA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 088a61f6cfca4655c0154ed028d2078914fc6a6adb2834af975d84584b1f87e0
                                                            • Instruction ID: 4baa7878b17ba466369c536cc4546b6e8ef32e925b0c2b3a1065606a4832dbfd
                                                            • Opcode Fuzzy Hash: 088a61f6cfca4655c0154ed028d2078914fc6a6adb2834af975d84584b1f87e0
                                                            • Instruction Fuzzy Hash: 2D113AB5D002498BDB10DFAAC4457DEFBF4AB88214F24841AD559A7240CB356545CBA1
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 074DDAAE
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: a31165b12138b5451311509a9f00860e77f1c5c2c87181631956ba9567e68be9
                                                            • Instruction ID: c261a553946119020ad859a17931469189699627bf2c7268c3afda844f51d88d
                                                            • Opcode Fuzzy Hash: a31165b12138b5451311509a9f00860e77f1c5c2c87181631956ba9567e68be9
                                                            • Instruction Fuzzy Hash: CF1156B5D002499FCB10DFAAC844ADFBFF5EF88320F20841AE519A7250CB75A941CFA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2291285339.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_74d0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 09dd9bc657cd45d9218a269f96e2e31a7d0f35311f8491b88428d8697b0d9ab7
                                                            • Instruction ID: 74efd148d366ed572ac470b8effddaa4b95ffa6ff0846266b55cc42b6896faec
                                                            • Opcode Fuzzy Hash: 09dd9bc657cd45d9218a269f96e2e31a7d0f35311f8491b88428d8697b0d9ab7
                                                            • Instruction Fuzzy Hash: 091128B5D002498FDB20DFAAC4457DEFBF4AB88324F20841AD419A7240CB75A945CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0187B17E
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2271302020.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_1870000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: c6fdd757f23fcb5687412c1b117610651b98d2049afd4d0fdf7c3188e148a0d5
                                                            • Instruction ID: f463bfa1db6cd61eb1448e5749d3815d5c3b37746dc7f537763480d6137f2fb9
                                                            • Opcode Fuzzy Hash: c6fdd757f23fcb5687412c1b117610651b98d2049afd4d0fdf7c3188e148a0d5
                                                            • Instruction Fuzzy Hash: 0211F2B5C007498FDB20CF9AD848ADEFBF5EF88324F10842AD519A7210D379A645CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270311002.000000000181D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0181D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_181d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 536bb0d28c9005cadf0246245b06be9ed67db09b66a20bcdb6c33a5aacd6975a
                                                            • Instruction ID: cd599dd206b78a194ff780453d8d3a4233749d29b9431d34f9a05f3fa364680d
                                                            • Opcode Fuzzy Hash: 536bb0d28c9005cadf0246245b06be9ed67db09b66a20bcdb6c33a5aacd6975a
                                                            • Instruction Fuzzy Hash: EF2167B2500244DFDB05DF58D9C8B66BF69FB88318F24C66DE8098B24AC336D516CBB1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270311002.000000000181D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0181D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_181d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4f6c5308b2ec49bf2f8776d41586c1a97a3e324751514338168e3ef448c51c93
                                                            • Instruction ID: 6c2790cd7cbf709692fc08b5c43209c9da855ef2e2d00588b0ab43af542a95e0
                                                            • Opcode Fuzzy Hash: 4f6c5308b2ec49bf2f8776d41586c1a97a3e324751514338168e3ef448c51c93
                                                            • Instruction Fuzzy Hash: AC217FB2540204DFDB05DF44D5C4B56BF69FB84314F24C66DD9098F24AC336E516C7A1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270957987.000000000182D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0182D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_182d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf8a07682a9101ea5f7d513e235f67d0fbe1c440ccb8e2fe35fbc8052f8d5a82
                                                            • Instruction ID: 11ff0f462e646872e1f87acdc2d38b003037a567808b5c893e720f1d4c8cc660
                                                            • Opcode Fuzzy Hash: bf8a07682a9101ea5f7d513e235f67d0fbe1c440ccb8e2fe35fbc8052f8d5a82
                                                            • Instruction Fuzzy Hash: 562129B1504204EFDB06DF98D5C0B25BFA5FB85328F34C66DD9098B352C336E586CA61
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270957987.000000000182D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0182D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_182d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5a92600407c6cdcca340e9ab638c5d7165deb32da7ab55b7f4f49fad18331bee
                                                            • Instruction ID: 7810268399f502637ca3536de55cfb7ed9547497cd5da85b7cf7c40fa7d781b0
                                                            • Opcode Fuzzy Hash: 5a92600407c6cdcca340e9ab638c5d7165deb32da7ab55b7f4f49fad18331bee
                                                            • Instruction Fuzzy Hash: 742145B1504244DFCB12CF58D4C0B16BF65EB84314F20C66DD80A8B2A2C33AC487CA61
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270311002.000000000181D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0181D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_181d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction ID: ebed69312175b82a6d9ef1565c9b333f7487565d8a98cbec42bc05e838f99499
                                                            • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction Fuzzy Hash: 6C110372444240CFDB16CF44D5C4B56BF71FB84324F24C6A9D9094B65BC33AE55ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270311002.000000000181D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0181D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_181d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction ID: c6ff0aff53b79717923b9acaa64ef947b06aa3e5e43807464d055ee2b188aa3a
                                                            • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                            • Instruction Fuzzy Hash: AB110372404280CFCB06CF54D5C4B56BF71FB84314F24C6A9E8494B65BC336D55ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270957987.000000000182D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0182D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_182d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction ID: 92fea14e1bb1a7e9c7221a90bfc85edc3703ad535e1afc804cb15b242d8e546a
                                                            • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction Fuzzy Hash: 9811DD75504280CFDB12CF58D5C4B15FFA2FB84314F24C6AAD8498B6A6C33AD54BCBA2
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270957987.000000000182D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0182D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_182d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction ID: 0b692b8c606bf4ed97104e12a6b81b66d35e924b55cbecbda1a4324da13668f4
                                                            • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction Fuzzy Hash: F611BB75904280DFDB02CF54D5C4B15BFA2FB85324F24C6A9D8498B696C33AE44ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270311002.000000000181D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0181D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_181d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 345028085b36d3609f82ba45820dfb0a15ce0a3592434b2f1937dee4dc0a4fcf
                                                            • Instruction ID: 4eb21c11087351a507e8e1abe8478614cced6501521a2b11c5cb6a8c83c2c092
                                                            • Opcode Fuzzy Hash: 345028085b36d3609f82ba45820dfb0a15ce0a3592434b2f1937dee4dc0a4fcf
                                                            • Instruction Fuzzy Hash: 29012B724043849AF7104FA9DDC8767FFACDF80324F18CE1AED098A18AC3389940C671
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2270311002.000000000181D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0181D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_181d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf70d084c6520b54fdad24b1ab1e650e2ecb8d4b8d9784d497ca56ec78d7390a
                                                            • Instruction ID: 1a4df6c570437aa8c7f277095b4f45487ad7fb7506808c2c0aaba97007d98319
                                                            • Opcode Fuzzy Hash: bf70d084c6520b54fdad24b1ab1e650e2ecb8d4b8d9784d497ca56ec78d7390a
                                                            • Instruction Fuzzy Hash: 27F062724043849EF7118A19DDC8B66FFACEB81774F18CA5AED084A296C3799844CA71

                                                            Execution Graph

                                                            Execution Coverage:12.2%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:170
                                                            Total number of Limit Nodes:19
                                                            execution_graph 38159 112d030 38160 112d048 38159->38160 38161 112d0a2 38160->38161 38169 69e677e 38160->38169 38173 69eac61 38160->38173 38182 69e6650 38160->38182 38188 69e44b4 38160->38188 38192 69e44c4 38160->38192 38200 69eac78 38160->38200 38208 69e664a 38160->38208 38170 69e6780 38169->38170 38214 69e44ec 38170->38214 38172 69e6787 38172->38161 38174 69eac7a 38173->38174 38175 69eac6a 38173->38175 38176 69eace9 38174->38176 38178 69eacd9 38174->38178 38175->38161 38230 69e9e0c 38176->38230 38222 69eb218 38178->38222 38226 69eb1d8 38178->38226 38179 69eace7 38179->38179 38183 69e6676 38182->38183 38184 69e44b4 GetModuleHandleW 38183->38184 38185 69e6682 38184->38185 38186 69e44c4 CallWindowProcW 38185->38186 38187 69e6697 38186->38187 38187->38161 38189 69e44bf 38188->38189 38190 69e44ec GetModuleHandleW 38189->38190 38191 69e6787 38190->38191 38191->38161 38193 69e44cf 38192->38193 38194 69eace9 38193->38194 38196 69eacd9 38193->38196 38195 69e9e0c CallWindowProcW 38194->38195 38197 69eace7 38195->38197 38198 69eb218 CallWindowProcW 38196->38198 38199 69eb1d8 CallWindowProcW 38196->38199 38197->38197 38198->38197 38199->38197 38202 69eac88 38200->38202 38201 69eace9 38203 69e9e0c CallWindowProcW 38201->38203 38202->38201 38204 69eacd9 38202->38204 38205 69eace7 38203->38205 38206 69eb218 CallWindowProcW 38204->38206 38207 69eb1d8 CallWindowProcW 38204->38207 38205->38205 38206->38205 38207->38205 38209 69e6676 38208->38209 38210 69e44b4 GetModuleHandleW 38209->38210 38211 69e6682 38210->38211 38212 69e44c4 CallWindowProcW 38211->38212 38213 69e6697 38212->38213 38213->38161 38215 69e44f7 38214->38215 38217 69e6857 38215->38217 38218 69e37c8 38215->38218 38219 69e53f0 GetModuleHandleW 38218->38219 38221 69e5465 38219->38221 38221->38217 38223 69eb226 38222->38223 38224 69e9e0c CallWindowProcW 38223->38224 38225 69eb302 38223->38225 38224->38223 38225->38179 38227 69eb1dd 38226->38227 38228 69e9e0c CallWindowProcW 38227->38228 38229 69eb302 38227->38229 38228->38227 38229->38179 38231 69e9e17 38230->38231 38232 69eb3b2 CallWindowProcW 38231->38232 38233 69eb361 38231->38233 38232->38233 38233->38179 38234 2cd0848 38236 2cd084e 38234->38236 38235 2cd091b 38236->38235 38239 2cd1457 38236->38239 38247 2cd1340 38236->38247 38241 2cd1356 38239->38241 38242 2cd145b 38239->38242 38240 2cd1454 38240->38236 38241->38240 38246 2cd1457 4 API calls 38241->38246 38254 2cd80f9 38241->38254 38259 69e3800 38241->38259 38265 69e37d8 38241->38265 38242->38236 38246->38241 38249 2cd1356 38247->38249 38248 2cd1454 38248->38236 38249->38248 38250 69e37d8 2 API calls 38249->38250 38251 69e3800 2 API calls 38249->38251 38252 2cd1457 4 API calls 38249->38252 38253 2cd80f9 2 API calls 38249->38253 38250->38249 38251->38249 38252->38249 38253->38249 38255 2cd8103 38254->38255 38256 2cd81b9 38255->38256 38271 6a0fa60 38255->38271 38275 6a0fa50 38255->38275 38256->38241 38260 69e3812 38259->38260 38263 69e38c3 38260->38263 38279 69e0b8c 38260->38279 38262 69e3889 38284 69e0bac 38262->38284 38263->38241 38266 69e37dd 38265->38266 38267 69e0b8c GetModuleHandleW 38266->38267 38269 69e38c3 38266->38269 38268 69e3889 38267->38268 38270 69e0bac KiUserCallbackDispatcher 38268->38270 38269->38241 38270->38269 38272 6a0fa75 38271->38272 38273 6a0fc8a 38272->38273 38274 6a0fca0 GlobalMemoryStatusEx GlobalMemoryStatusEx 38272->38274 38273->38256 38274->38272 38277 6a0fa75 38275->38277 38276 6a0fc8a 38276->38256 38277->38276 38278 6a0fca0 GlobalMemoryStatusEx GlobalMemoryStatusEx 38277->38278 38278->38277 38280 69e0b97 38279->38280 38288 69e49ab 38280->38288 38294 69e49c0 38280->38294 38281 69e3a62 38281->38262 38285 69e0bb7 38284->38285 38287 69eb643 38285->38287 38325 69eae3c 38285->38325 38287->38263 38289 69e49c0 38288->38289 38300 69e4f31 38289->38300 38290 69e4a6e 38291 69e37c8 GetModuleHandleW 38290->38291 38292 69e4a9a 38290->38292 38291->38292 38295 69e49eb 38294->38295 38299 69e4f31 GetModuleHandleW 38295->38299 38296 69e4a6e 38297 69e37c8 GetModuleHandleW 38296->38297 38298 69e4a9a 38296->38298 38297->38298 38299->38296 38301 69e4f6d 38300->38301 38302 69e4fee 38301->38302 38305 69e50a0 38301->38305 38315 69e50b0 38301->38315 38306 69e50b0 38305->38306 38307 69e37c8 GetModuleHandleW 38306->38307 38308 69e50e9 38306->38308 38307->38308 38309 69e37c8 GetModuleHandleW 38308->38309 38314 69e52b4 38308->38314 38310 69e523a 38309->38310 38311 69e37c8 GetModuleHandleW 38310->38311 38310->38314 38312 69e5288 38311->38312 38313 69e37c8 GetModuleHandleW 38312->38313 38312->38314 38313->38314 38314->38302 38316 69e50c5 38315->38316 38317 69e37c8 GetModuleHandleW 38316->38317 38318 69e50e9 38316->38318 38317->38318 38319 69e37c8 GetModuleHandleW 38318->38319 38320 69e52b4 38318->38320 38321 69e523a 38319->38321 38320->38302 38321->38320 38322 69e37c8 GetModuleHandleW 38321->38322 38323 69e5288 38322->38323 38323->38320 38324 69e37c8 GetModuleHandleW 38323->38324 38324->38320 38326 69eb658 KiUserCallbackDispatcher 38325->38326 38328 69eb6c6 38326->38328 38328->38285 38329 69e6498 38330 69e6500 CreateWindowExW 38329->38330 38332 69e65bc 38330->38332 38332->38332 38344 69ea088 DuplicateHandle 38345 69ea11e 38344->38345 38346 69ebc68 38347 69ebcc2 OleGetClipboard 38346->38347 38348 69ebd02 38347->38348 38349 69e53e8 38350 69e53f0 GetModuleHandleW 38349->38350 38352 69e5465 38350->38352 38333 69ebad0 38334 69ebadb 38333->38334 38335 69ebaeb 38334->38335 38337 69eb074 38334->38337 38338 69ebb20 OleInitialize 38337->38338 38339 69ebb84 38338->38339 38339->38335 38340 69eda30 38341 69eda74 SetWindowsHookExA 38340->38341 38343 69edaba 38341->38343 38353 69e9e40 38354 69e9e41 GetCurrentProcess 38353->38354 38356 69e9ed8 GetCurrentThread 38354->38356 38357 69e9ed1 38354->38357 38358 69e9f0e 38356->38358 38359 69e9f15 GetCurrentProcess 38356->38359 38357->38356 38358->38359 38360 69e9f4b 38359->38360 38361 69e9f73 GetCurrentThreadId 38360->38361 38362 69e9fa4 38361->38362

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 124 6a03570-6a03591 125 6a03593-6a03596 124->125 126 6a03598-6a035b7 125->126 127 6a035bc-6a035bf 125->127 126->127 128 6a03d60-6a03d62 127->128 129 6a035c5-6a035e4 127->129 131 6a03d64 128->131 132 6a03d69-6a03d6c 128->132 137 6a035e6-6a035e9 129->137 138 6a035fd-6a03607 129->138 131->132 132->125 134 6a03d72-6a03d7b 132->134 137->138 139 6a035eb-6a035fb 137->139 142 6a0360d-6a0361e call 6a0315c 138->142 139->142 144 6a03623-6a03628 142->144 145 6a03635-6a03912 144->145 146 6a0362a-6a03630 144->146 167 6a03d52-6a03d5f 145->167 168 6a03918-6a039c7 145->168 146->134 177 6a039f0 168->177 178 6a039c9-6a039ee 168->178 180 6a039f9-6a03a0c call 6a03168 177->180 178->180 183 6a03a12-6a03a34 call 6a03174 180->183 184 6a03d39-6a03d45 180->184 183->184 188 6a03a3a-6a03a44 183->188 184->168 185 6a03d4b 184->185 185->167 188->184 189 6a03a4a-6a03a55 188->189 189->184 190 6a03a5b-6a03b31 189->190 202 6a03b33-6a03b35 190->202 203 6a03b3f-6a03b6f 190->203 202->203 207 6a03b71-6a03b73 203->207 208 6a03b7d-6a03b89 203->208 207->208 209 6a03be9-6a03bed 208->209 210 6a03b8b-6a03b8f 208->210 211 6a03bf3-6a03c2f 209->211 212 6a03d2a-6a03d33 209->212 210->209 213 6a03b91-6a03bbb 210->213 224 6a03c31-6a03c33 211->224 225 6a03c3d-6a03c4b 211->225 212->184 212->190 220 6a03bc9-6a03be6 call 6a03180 213->220 221 6a03bbd-6a03bbf 213->221 220->209 221->220 224->225 228 6a03c62-6a03c6d 225->228 229 6a03c4d-6a03c58 225->229 233 6a03c85-6a03c96 228->233 234 6a03c6f-6a03c75 228->234 229->228 232 6a03c5a 229->232 232->228 238 6a03c98-6a03c9e 233->238 239 6a03cae-6a03cba 233->239 235 6a03c77 234->235 236 6a03c79-6a03c7b 234->236 235->233 236->233 240 6a03ca0 238->240 241 6a03ca2-6a03ca4 238->241 243 6a03cd2-6a03d23 239->243 244 6a03cbc-6a03cc2 239->244 240->239 241->239 243->212 245 6a03cc4 244->245 246 6a03cc6-6a03cc8 244->246 245->243 246->243
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-3723351465
                                                            • Opcode ID: 7126598b41e2aa386cad8cab9e6f11203d9378bff04ae509616e0808be3226d1
                                                            • Instruction ID: e9f1172fe15acc8bdb9af5eb25986351f95e437f27296b3774d36c04495a1b9e
                                                            • Opcode Fuzzy Hash: 7126598b41e2aa386cad8cab9e6f11203d9378bff04ae509616e0808be3226d1
                                                            • Instruction Fuzzy Hash: 9B323231E1061ACFDB54EF75D89459DB7B2FFC9300F20CAA9D449AB254EB30A985CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 845 6a07e68-6a07e86 846 6a07e88-6a07e8b 845->846 847 6a07eac-6a07eaf 846->847 848 6a07e8d-6a07ea7 846->848 849 6a07eb1-6a07ecd 847->849 850 6a07ed2-6a07ed5 847->850 848->847 849->850 851 6a07ee2-6a07ee5 850->851 852 6a07ed7-6a07ee1 850->852 855 6a07ee7-6a07ef5 851->855 856 6a07efc-6a07efe 851->856 860 6a07f0e-6a07f24 855->860 863 6a07ef7 855->863 857 6a07f00 856->857 858 6a07f05-6a07f08 856->858 857->858 858->846 858->860 865 6a07f2a-6a07f33 860->865 866 6a0813f-6a08149 860->866 863->856 867 6a07f39-6a07f56 865->867 868 6a0814a-6a08158 865->868 876 6a0812c-6a08139 867->876 877 6a07f5c-6a07f84 867->877 871 6a0815a-6a0817f 868->871 872 6a081af-6a081bc 868->872 874 6a08181-6a08184 871->874 875 6a081c7-6a081c9 872->875 878 6a08186-6a081a2 874->878 879 6a081a7-6a081aa 874->879 881 6a081e1-6a081e5 875->881 882 6a081cb-6a081d1 875->882 876->865 876->866 877->876 900 6a07f8a-6a07f93 877->900 878->879 879->872 880 6a08257-6a0825a 879->880 886 6a08260-6a0826f 880->886 887 6a0848f-6a08491 880->887 888 6a081f3 881->888 889 6a081e7-6a081f1 881->889 884 6a081d3 882->884 885 6a081d5-6a081d7 882->885 884->881 885->881 901 6a08271-6a0828c 886->901 902 6a0828e-6a082d2 886->902 891 6a08493 887->891 892 6a08498-6a0849b 887->892 893 6a081f8-6a081fa 888->893 889->893 891->892 892->874 897 6a084a1-6a084aa 892->897 894 6a08211-6a0824a 893->894 895 6a081fc-6a081ff 893->895 894->886 924 6a0824c-6a08256 894->924 895->897 900->868 903 6a07f99-6a07fb5 900->903 901->902 909 6a08463-6a08479 902->909 910 6a082d8-6a082e9 902->910 912 6a0811a-6a08126 903->912 913 6a07fbb-6a07fe5 903->913 909->887 919 6a0844e-6a0845d 910->919 920 6a082ef-6a0830c 910->920 912->876 912->900 928 6a08110-6a08115 913->928 929 6a07feb-6a08013 913->929 919->909 919->910 920->919 930 6a08312-6a08408 call 6a06690 920->930 928->912 929->928 936 6a08019-6a08047 929->936 979 6a08416 930->979 980 6a0840a-6a08414 930->980 936->928 941 6a0804d-6a08056 936->941 941->928 943 6a0805c-6a0808e 941->943 951 6a08090-6a08094 943->951 952 6a08099-6a080b5 943->952 951->928 954 6a08096 951->954 952->912 953 6a080b7-6a0810e call 6a06690 952->953 953->912 954->952 981 6a0841b-6a0841d 979->981 980->981 981->919 982 6a0841f-6a08424 981->982 983 6a08432 982->983 984 6a08426-6a08430 982->984 985 6a08437-6a08439 983->985 984->985 985->919 986 6a0843b-6a08447 985->986 986->919
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q
                                                            • API String ID: 0-127220927
                                                            • Opcode ID: 985dcb60ed816616d0ed1c0c618a9c3cf7134e26199fdbd4e670058ab350b526
                                                            • Instruction ID: 94339e25dc84acdc4fba27d25a7719fe82b2b3fff5cf72cadcafe05ef16dc32c
                                                            • Opcode Fuzzy Hash: 985dcb60ed816616d0ed1c0c618a9c3cf7134e26199fdbd4e670058ab350b526
                                                            • Instruction Fuzzy Hash: F8028030B0021A9FEF54EB64E8906AEB7E2FF84314F248569D815DB394DB35EC46CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b8ab3d822edf6020233346e102d9ebd5b3f3c8e6a2b99af2f95a0db94f191026
                                                            • Instruction ID: 5e0219dc2cd93766cc274df5c512e34bacbf9f956392aa1234d12253afa9165b
                                                            • Opcode Fuzzy Hash: b8ab3d822edf6020233346e102d9ebd5b3f3c8e6a2b99af2f95a0db94f191026
                                                            • Instruction Fuzzy Hash: B862A134B002058FEB64EB64E594AADB7F2FF84318F248469E406DB394DB35ED56CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: de57c141dd17457d545dbc4cf6d404156c61d250e6b8f85aa60cbdb34887b831
                                                            • Instruction ID: cb383723eb841e4c8065021c4f934409c0a1146d46d17f317de97b3033ed6c3f
                                                            • Opcode Fuzzy Hash: de57c141dd17457d545dbc4cf6d404156c61d250e6b8f85aa60cbdb34887b831
                                                            • Instruction Fuzzy Hash: AE329834B002099FEF54EB68E890B6DB7B2FB88320F218525E506EB395DB35DC45CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 36a6a8f267b90fcb52a1288fc70efdb3dd5b37f243ac4165b9213f05b970ea2a
                                                            • Instruction ID: 23f2238f0f1119b712bea239d9cadc48ee97af9210680c05402639dcfe3acce2
                                                            • Opcode Fuzzy Hash: 36a6a8f267b90fcb52a1288fc70efdb3dd5b37f243ac4165b9213f05b970ea2a
                                                            • Instruction Fuzzy Hash: 9A22D275F002158FEF64EF64E9846AEB7B2EB84320F248466D9599F384DA34DC45CF90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37a303f3f4034b1a7da2e660556a34d332148c676359fa807060bdc7e1482d17
                                                            • Instruction ID: 59d712b4665dda84b00c954a8ba1047cf51fab90165949398e5fec4a29a97a4b
                                                            • Opcode Fuzzy Hash: 37a303f3f4034b1a7da2e660556a34d332148c676359fa807060bdc7e1482d17
                                                            • Instruction Fuzzy Hash: 5E225374E101098BEF64EB58E5907ADB7B2EB49310F248465E405EF3D5CB36DC81CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 6a0adb0-6a0adce 1 6a0add0-6a0add3 0->1 2 6a0add5-6a0adf1 1->2 3 6a0adf6-6a0adf9 1->3 2->3 4 6a0ae0a-6a0ae0d 3->4 5 6a0adfb-6a0adff 3->5 9 6a0ae1d-6a0ae20 4->9 10 6a0ae0f-6a0ae18 4->10 7 6a0ae05 5->7 8 6a0afdc-6a0afe6 5->8 7->4 11 6a0ae26-6a0ae29 9->11 12 6a0afcd-6a0afd6 9->12 10->9 15 6a0ae2b-6a0ae38 11->15 16 6a0ae3d-6a0ae40 11->16 12->8 13 6a0ae6c-6a0ae75 12->13 17 6a0afe7-6a0b01e 13->17 18 6a0ae7b-6a0ae7f 13->18 15->16 19 6a0ae42-6a0ae55 16->19 20 6a0ae5a-6a0ae5d 16->20 30 6a0b020-6a0b023 17->30 23 6a0ae84-6a0ae86 18->23 19->20 21 6a0ae67-6a0ae6a 20->21 22 6a0ae5f-6a0ae64 20->22 21->13 21->23 22->21 26 6a0ae88 23->26 27 6a0ae8d-6a0ae90 23->27 26->27 27->1 29 6a0ae96-6a0aeba 27->29 47 6a0aec0-6a0aecf 29->47 48 6a0afca 29->48 31 6a0b032-6a0b035 30->31 32 6a0b025 call 6a0b307 30->32 33 6a0b03b-6a0b076 31->33 34 6a0b29e-6a0b2a1 31->34 36 6a0b02b-6a0b02d 32->36 45 6a0b269-6a0b27c 33->45 46 6a0b07c-6a0b088 33->46 37 6a0b2a3-6a0b2ad 34->37 38 6a0b2ae-6a0b2b1 34->38 36->31 41 6a0b2b3-6a0b2cf 38->41 42 6a0b2d4-6a0b2d7 38->42 41->42 43 6a0b2e8-6a0b2ea 42->43 44 6a0b2d9-6a0b2dd 42->44 51 6a0b2f1-6a0b2f4 43->51 52 6a0b2ec 43->52 44->33 50 6a0b2e3 44->50 53 6a0b27e 45->53 60 6a0b0a8-6a0b0ec 46->60 61 6a0b08a-6a0b0a3 46->61 57 6a0aed1-6a0aed7 47->57 58 6a0aee7-6a0af22 call 6a06690 47->58 48->12 50->43 51->30 56 6a0b2fa-6a0b304 51->56 52->51 53->34 62 6a0aed9 57->62 63 6a0aedb-6a0aedd 57->63 77 6a0af24-6a0af2a 58->77 78 6a0af3a-6a0af51 58->78 75 6a0b108-6a0b147 60->75 76 6a0b0ee-6a0b100 60->76 61->53 62->58 63->58 84 6a0b14d-6a0b228 call 6a06690 75->84 85 6a0b22e-6a0b243 75->85 76->75 79 6a0af2c 77->79 80 6a0af2e-6a0af30 77->80 90 6a0af53-6a0af59 78->90 91 6a0af69-6a0af7a 78->91 79->78 80->78 84->85 85->45 93 6a0af5b 90->93 94 6a0af5d-6a0af5f 90->94 97 6a0af92-6a0afc3 91->97 98 6a0af7c-6a0af82 91->98 93->91 94->91 97->48 100 6a0af84 98->100 101 6a0af86-6a0af88 98->101 100->97 101->97
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-1273862796
                                                            • Opcode ID: 2e5968b48868aade0dd3bd4f8de3d6c276ee4bfb9f1008838298c20c5a40f587
                                                            • Instruction ID: cea7f9079faa9b0a488c0faeb1150ece96d17ce80ecdd1b83a618c3a6fbd458b
                                                            • Opcode Fuzzy Hash: 2e5968b48868aade0dd3bd4f8de3d6c276ee4bfb9f1008838298c20c5a40f587
                                                            • Instruction Fuzzy Hash: C5E17230E1030A8FDB65EB68E5906AEB7F2FF89304F208569D509DB385DB359846CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 254 6a0b730-6a0b752 255 6a0b754-6a0b757 254->255 256 6a0b759-6a0b75b 255->256 257 6a0b75e-6a0b761 255->257 256->257 258 6a0b763-6a0b7c0 call 6a06690 257->258 259 6a0b7c5-6a0b7c8 257->259 258->259 260 6a0b7ca-6a0b7ce 259->260 261 6a0b7ef-6a0b7f2 259->261 264 6a0b7d4-6a0b7e4 260->264 265 6a0bacb-6a0bae4 260->265 262 6a0b802-6a0b805 261->262 263 6a0b7f4-6a0b7fd 261->263 267 6a0b8a2-6a0b8ab 262->267 268 6a0b80b-6a0b80e 262->268 263->262 277 6a0b8d3-6a0b8d6 264->277 278 6a0b7ea 264->278 279 6a0bae6-6a0bb06 265->279 280 6a0bb08-6a0bb0b 265->280 274 6a0b8b1 267->274 275 6a0ba8a-6a0ba93 267->275 272 6a0b810-6a0b814 268->272 273 6a0b825-6a0b828 268->273 272->265 281 6a0b81a-6a0b820 272->281 282 6a0b82a-6a0b836 273->282 283 6a0b83b-6a0b83e 273->283 285 6a0b8b6-6a0b8b9 274->285 275->265 284 6a0ba95-6a0ba9c 275->284 286 6a0b8db-6a0b8de 277->286 278->261 279->280 288 6a0bb0d-6a0bb29 280->288 289 6a0bb2e-6a0bb31 280->289 281->273 282->283 290 6a0b840-6a0b847 283->290 291 6a0b852-6a0b855 283->291 292 6a0baa1-6a0baa4 284->292 285->277 293 6a0b8bb-6a0b8be 285->293 294 6a0b8e0-6a0b8e4 286->294 295 6a0b8f5-6a0b8f8 286->295 288->289 297 6a0bb37-6a0bb5f 289->297 298 6a0bd9d-6a0bd9f 289->298 299 6a0b8fa-6a0b903 290->299 300 6a0b84d 290->300 303 6a0b867-6a0b86a 291->303 304 6a0b857 291->304 301 6a0baa6-6a0baa9 292->301 302 6a0baae-6a0bab0 292->302 305 6a0b8c0-6a0b8c9 293->305 306 6a0b8ce-6a0b8d1 293->306 294->265 314 6a0b8ea-6a0b8f0 294->314 295->299 315 6a0b908-6a0b90b 295->315 344 6a0bb61-6a0bb64 297->344 345 6a0bb69-6a0bbad 297->345 310 6a0bda1 298->310 311 6a0bda6-6a0bda9 298->311 299->315 300->291 301->302 312 6a0bab2 302->312 313 6a0bab7-6a0baba 302->313 307 6a0b877-6a0b87a 303->307 308 6a0b86c-6a0b872 303->308 317 6a0b85f-6a0b862 304->317 305->306 306->277 306->286 319 6a0b87c-6a0b880 307->319 320 6a0b89d-6a0b8a0 307->320 308->307 310->311 311->280 323 6a0bdaf-6a0bdb8 311->323 312->313 313->255 318 6a0bac0-6a0baca 313->318 314->295 321 6a0b932-6a0b935 315->321 322 6a0b90d-6a0b911 315->322 317->303 319->265 325 6a0b886-6a0b896 319->325 320->267 320->285 329 6a0b937-6a0b93a 321->329 330 6a0b94c-6a0b94f 321->330 322->265 327 6a0b917-6a0b927 322->327 325->322 342 6a0b898 325->342 327->260 343 6a0b92d 327->343 329->265 333 6a0b940-6a0b947 329->333 330->277 332 6a0b951-6a0b954 330->332 334 6a0b956-6a0b972 332->334 335 6a0b977-6a0b97a 332->335 333->330 334->335 340 6a0b98a-6a0b98d 335->340 341 6a0b97c-6a0b985 335->341 347 6a0b995-6a0b998 340->347 348 6a0b98f-6a0b990 340->348 341->340 342->320 343->321 344->323 370 6a0bd92-6a0bd9c 345->370 371 6a0bbb3-6a0bbbc 345->371 350 6a0b99a-6a0b99e 347->350 351 6a0b9af-6a0b9b2 347->351 348->347 350->265 354 6a0b9a4-6a0b9aa 350->354 355 6a0b9b4-6a0b9b9 351->355 356 6a0b9bc-6a0b9bf 351->356 354->351 355->356 357 6a0b9c1-6a0b9c4 356->357 358 6a0b9cf-6a0b9d2 356->358 357->329 360 6a0b9ca 357->360 361 6a0b9f4-6a0b9f7 358->361 362 6a0b9d4-6a0b9ef 358->362 360->358 361->277 363 6a0b9fd-6a0ba00 361->363 362->361 366 6a0ba02-6a0ba17 363->366 367 6a0ba3f-6a0ba42 363->367 366->265 378 6a0ba1d-6a0ba3a 366->378 368 6a0ba44-6a0ba59 367->368 369 6a0ba7c-6a0ba7f 367->369 368->265 379 6a0ba5b-6a0ba77 368->379 369->357 372 6a0ba85-6a0ba88 369->372 373 6a0bbc2-6a0bc2e call 6a06690 371->373 374 6a0bd88-6a0bd8d 371->374 372->275 372->292 389 6a0bc34-6a0bc39 373->389 390 6a0bd28-6a0bd3d 373->390 374->370 378->367 379->369 392 6a0bc55 389->392 393 6a0bc3b-6a0bc41 389->393 390->374 396 6a0bc57-6a0bc5d 392->396 394 6a0bc43-6a0bc45 393->394 395 6a0bc47-6a0bc49 393->395 399 6a0bc53 394->399 395->399 397 6a0bc72-6a0bc7f 396->397 398 6a0bc5f-6a0bc65 396->398 406 6a0bc81-6a0bc87 397->406 407 6a0bc97-6a0bca4 397->407 400 6a0bd13-6a0bd22 398->400 401 6a0bc6b 398->401 399->396 400->389 400->390 401->397 402 6a0bca6-6a0bcb3 401->402 403 6a0bcda-6a0bce7 401->403 415 6a0bcb5-6a0bcbb 402->415 416 6a0bccb-6a0bcd8 402->416 412 6a0bce9-6a0bcef 403->412 413 6a0bcff-6a0bd0c 403->413 408 6a0bc89 406->408 409 6a0bc8b-6a0bc8d 406->409 407->400 408->407 409->407 419 6a0bcf1 412->419 420 6a0bcf3-6a0bcf5 412->420 413->400 417 6a0bcbd 415->417 418 6a0bcbf-6a0bcc1 415->418 416->400 417->416 418->416 419->413 420->413
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-3723351465
                                                            • Opcode ID: c58040b9b97a162077670adcc67b40c805cbbaa37ac2ad2b8563db34e3b0cb43
                                                            • Instruction ID: 3a2a7eed57dd73909be99b5980c2370b98d7a659baa8def95244857102aadaf1
                                                            • Opcode Fuzzy Hash: c58040b9b97a162077670adcc67b40c805cbbaa37ac2ad2b8563db34e3b0cb43
                                                            • Instruction Fuzzy Hash: 4D026030E1010A8FEFA4EF68E6806ADB7B1EF45314F248566D405DF295DB36DC85CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 423 69e9e31-69e9e38 424 69e9e3a-69e9e40 423->424 425 69e9e41-69e9ecf GetCurrentProcess 423->425 424->425 430 69e9ed8-69e9f0c GetCurrentThread 425->430 431 69e9ed1-69e9ed7 425->431 432 69e9f0e-69e9f14 430->432 433 69e9f15-69e9f49 GetCurrentProcess 430->433 431->430 432->433 435 69e9f4b-69e9f51 433->435 436 69e9f52-69e9f6d call 69ea010 433->436 435->436 439 69e9f73-69e9fa2 GetCurrentThreadId 436->439 440 69e9fab-69ea00d 439->440 441 69e9fa4-69e9faa 439->441 441->440
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 069E9EBE
                                                            • GetCurrentThread.KERNEL32 ref: 069E9EFB
                                                            • GetCurrentProcess.KERNEL32 ref: 069E9F38
                                                            • GetCurrentThreadId.KERNEL32 ref: 069E9F91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 5f7a938f309a94e2429df2cfe1d3c4be91294eda519e1db15ead7c1f951c92ba
                                                            • Instruction ID: 9c05ccfa288920c52db4805369d4cb1d1cd504c4878d2fe3cc5134249c7e1ac0
                                                            • Opcode Fuzzy Hash: 5f7a938f309a94e2429df2cfe1d3c4be91294eda519e1db15ead7c1f951c92ba
                                                            • Instruction Fuzzy Hash: 105187B0D103499FDB55CFAAD848B9EBFF5AF48304F20885DE109A7760C7345844CB62

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 448 69e9e40-69e9ecf GetCurrentProcess 453 69e9ed8-69e9f0c GetCurrentThread 448->453 454 69e9ed1-69e9ed7 448->454 455 69e9f0e-69e9f14 453->455 456 69e9f15-69e9f49 GetCurrentProcess 453->456 454->453 455->456 458 69e9f4b-69e9f51 456->458 459 69e9f52-69e9f6d call 69ea010 456->459 458->459 462 69e9f73-69e9fa2 GetCurrentThreadId 459->462 463 69e9fab-69ea00d 462->463 464 69e9fa4-69e9faa 462->464 464->463
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 069E9EBE
                                                            • GetCurrentThread.KERNEL32 ref: 069E9EFB
                                                            • GetCurrentProcess.KERNEL32 ref: 069E9F38
                                                            • GetCurrentThreadId.KERNEL32 ref: 069E9F91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 55ab5b40be505636e8dc408fa6ff6775a9245a1df50cb1d98266f2315bba7faf
                                                            • Instruction ID: 2680be971b81734da689608df8bce95c5681d3d22e92cdc8ab7ef1d9ceeb1bb8
                                                            • Opcode Fuzzy Hash: 55ab5b40be505636e8dc408fa6ff6775a9245a1df50cb1d98266f2315bba7faf
                                                            • Instruction Fuzzy Hash: 4A5164B0D103098FDB54DFAAD848B9EBBF5FF88314F208459E10AA77A0D7389944CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 471 6a09238-6a0925d 472 6a0925f-6a09262 471->472 473 6a09b20-6a09b23 472->473 474 6a09268-6a0927d 472->474 475 6a09b25-6a09b44 473->475 476 6a09b49-6a09b4b 473->476 481 6a09295-6a092ab 474->481 482 6a0927f-6a09285 474->482 475->476 478 6a09b52-6a09b55 476->478 479 6a09b4d 476->479 478->472 483 6a09b5b-6a09b65 478->483 479->478 488 6a092b6-6a092b8 481->488 484 6a09287 482->484 485 6a09289-6a0928b 482->485 484->481 485->481 489 6a092d0-6a09341 488->489 490 6a092ba-6a092c0 488->490 501 6a09343-6a09366 489->501 502 6a0936d-6a09389 489->502 491 6a092c2 490->491 492 6a092c4-6a092c6 490->492 491->489 492->489 501->502 507 6a093b5-6a093d0 502->507 508 6a0938b-6a093ae 502->508 513 6a093d2-6a093f4 507->513 514 6a093fb-6a09416 507->514 508->507 513->514 519 6a09418-6a09434 514->519 520 6a0943b-6a09449 514->520 519->520 521 6a09459-6a094d3 520->521 522 6a0944b-6a09454 520->522 528 6a09520-6a09535 521->528 529 6a094d5-6a094f3 521->529 522->483 528->473 533 6a094f5-6a09504 529->533 534 6a0950f-6a0951e 529->534 533->534 534->528 534->529
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: 73f2461a90a388026e56ba1ce89ed07d8a331ee8c56b913a8de81b09728fb4f1
                                                            • Instruction ID: 8334f22358d40886a5c44c13ade4e26cf601183a2ab39006837cdfdb9e462e83
                                                            • Opcode Fuzzy Hash: 73f2461a90a388026e56ba1ce89ed07d8a331ee8c56b913a8de81b09728fb4f1
                                                            • Instruction Fuzzy Hash: 97914270B0020A9FDB54EF65D9607AFB7F2BB88704F108469D41DEB385EB309D468B92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 537 6a0d038-6a0d053 538 6a0d055-6a0d058 537->538 539 6a0d0a1-6a0d0a4 538->539 540 6a0d05a-6a0d09c 538->540 541 6a0d0a6-6a0d0e8 539->541 542 6a0d0ed-6a0d0f0 539->542 540->539 541->542 543 6a0d0f2-6a0d0f4 542->543 544 6a0d0ff-6a0d102 542->544 546 6a0d521 543->546 547 6a0d0fa 543->547 548 6a0d104-6a0d113 544->548 549 6a0d14b-6a0d14e 544->549 556 6a0d524-6a0d530 546->556 547->544 554 6a0d122-6a0d12e 548->554 555 6a0d115-6a0d11a 548->555 551 6a0d150-6a0d192 549->551 552 6a0d197-6a0d19a 549->552 551->552 557 6a0d1a4-6a0d1a7 552->557 558 6a0d19c-6a0d1a1 552->558 559 6a0d134-6a0d146 554->559 560 6a0da55-6a0da8e 554->560 555->554 556->548 562 6a0d536-6a0d823 556->562 565 6a0d1b6-6a0d1b9 557->565 566 6a0d1a9-6a0d1ab 557->566 558->557 559->549 580 6a0da90-6a0da93 560->580 750 6a0d829-6a0d82f 562->750 751 6a0da4a-6a0da54 562->751 565->556 568 6a0d1bf-6a0d1c2 565->568 571 6a0d1b1 566->571 572 6a0d3df-6a0d3e8 566->572 574 6a0d1c4-6a0d1e0 568->574 575 6a0d1e5-6a0d1e8 568->575 571->565 578 6a0d3f7-6a0d403 572->578 579 6a0d3ea-6a0d3ef 572->579 574->575 583 6a0d231-6a0d234 575->583 584 6a0d1ea-6a0d22c 575->584 585 6a0d514-6a0d519 578->585 586 6a0d409-6a0d41d 578->586 579->578 587 6a0da95-6a0dac1 580->587 588 6a0dac6-6a0dac9 580->588 590 6a0d236-6a0d278 583->590 591 6a0d27d-6a0d280 583->591 584->583 585->546 586->546 613 6a0d423-6a0d435 586->613 587->588 594 6a0dad8-6a0dadb 588->594 595 6a0dacb call 6a0dbad 588->595 590->591 596 6a0d282-6a0d2c4 591->596 597 6a0d2c9-6a0d2cc 591->597 598 6a0dadd-6a0daf9 594->598 599 6a0dafe-6a0db00 594->599 608 6a0dad1-6a0dad3 595->608 596->597 606 6a0d2e9-6a0d2ec 597->606 607 6a0d2ce-6a0d2e4 597->607 598->599 610 6a0db02 599->610 611 6a0db07-6a0db0a 599->611 617 6a0d335-6a0d338 606->617 618 6a0d2ee-6a0d330 606->618 607->606 608->594 610->611 611->580 620 6a0db0c-6a0db1b 611->620 635 6a0d437-6a0d43d 613->635 636 6a0d459-6a0d45b 613->636 625 6a0d381-6a0d384 617->625 626 6a0d33a-6a0d37c 617->626 618->617 645 6a0db82-6a0db97 620->645 646 6a0db1d-6a0db80 call 6a06690 620->646 629 6a0d386-6a0d395 625->629 630 6a0d3cd-6a0d3cf 625->630 626->625 638 6a0d3a4-6a0d3b0 629->638 639 6a0d397-6a0d39c 629->639 642 6a0d3d1 630->642 643 6a0d3d6-6a0d3d9 630->643 647 6a0d441-6a0d44d 635->647 648 6a0d43f 635->648 640 6a0d465-6a0d471 636->640 638->560 652 6a0d3b6-6a0d3c8 638->652 639->638 662 6a0d473-6a0d47d 640->662 663 6a0d47f 640->663 642->643 643->538 643->572 667 6a0db98 645->667 646->645 649 6a0d44f-6a0d457 647->649 648->649 649->640 652->630 673 6a0d484-6a0d486 662->673 663->673 667->667 673->546 675 6a0d48c-6a0d4a8 call 6a06690 673->675 690 6a0d4b7-6a0d4c3 675->690 691 6a0d4aa-6a0d4af 675->691 690->585 692 6a0d4c5-6a0d512 690->692 691->690 692->546 752 6a0d831-6a0d836 750->752 753 6a0d83e-6a0d847 750->753 752->753 753->560 754 6a0d84d-6a0d860 753->754 756 6a0d866-6a0d86c 754->756 757 6a0da3a-6a0da44 754->757 758 6a0d87b-6a0d884 756->758 759 6a0d86e-6a0d873 756->759 757->750 757->751 758->560 760 6a0d88a-6a0d8ab 758->760 759->758 763 6a0d8ba-6a0d8c3 760->763 764 6a0d8ad-6a0d8b2 760->764 763->560 765 6a0d8c9-6a0d8e6 763->765 764->763 765->757 768 6a0d8ec-6a0d8f2 765->768 768->560 769 6a0d8f8-6a0d911 768->769 771 6a0d917-6a0d93e 769->771 772 6a0da2d-6a0da34 769->772 771->560 775 6a0d944-6a0d94e 771->775 772->757 772->768 775->560 776 6a0d954-6a0d96b 775->776 778 6a0d97a-6a0d995 776->778 779 6a0d96d-6a0d978 776->779 778->772 784 6a0d99b-6a0d9b4 call 6a06690 778->784 779->778 788 6a0d9c3-6a0d9cc 784->788 789 6a0d9b6-6a0d9bb 784->789 788->560 790 6a0d9d2-6a0da26 788->790 789->788 790->772
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q
                                                            • API String ID: 0-182748909
                                                            • Opcode ID: 951b321354e0a2257043fdf9b29d73b84ccd976a7eaef035b47326ede4df4924
                                                            • Instruction ID: 9a0cf4e0849c6fe496fce34ec0042b6f3f7cb8006320fac55330caba41840ab6
                                                            • Opcode Fuzzy Hash: 951b321354e0a2257043fdf9b29d73b84ccd976a7eaef035b47326ede4df4924
                                                            • Instruction Fuzzy Hash: F8623030A0020A8FDB55EF68E590A5EB7E3FF84314B218968E4099F359DB75ED46CBC1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 798 6a04c78-6a04c9c 799 6a04c9e-6a04ca1 798->799 800 6a04cc2-6a04cc5 799->800 801 6a04ca3-6a04cbd 799->801 802 6a053a4-6a053a6 800->802 803 6a04ccb-6a04dc3 800->803 801->800 804 6a053a8 802->804 805 6a053ad-6a053b0 802->805 821 6a04e46-6a04e4d 803->821 822 6a04dc9-6a04e16 call 6a05522 803->822 804->805 805->799 808 6a053b6-6a053c3 805->808 823 6a04ed1-6a04eda 821->823 824 6a04e53-6a04ec3 821->824 835 6a04e1c-6a04e38 822->835 823->808 841 6a04ec5 824->841 842 6a04ece 824->842 838 6a04e43-6a04e44 835->838 839 6a04e3a 835->839 838->821 839->838 841->842 842->823
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fbq$XPbq$\Obq
                                                            • API String ID: 0-4057264190
                                                            • Opcode ID: 94efd96273f8bfce9b4b627f41e3b5962d39cced88fa77ab783f54fad70f1eef
                                                            • Instruction ID: 6adff6176f320295528220f107ad47b8f5108cd222c390b2e6b7e7aafa7f0da9
                                                            • Opcode Fuzzy Hash: 94efd96273f8bfce9b4b627f41e3b5962d39cced88fa77ab783f54fad70f1eef
                                                            • Instruction Fuzzy Hash: 2E616130F00219DFEB64EFA4D8547AEBBF6FB88710F208429D105AB394DB754C458B51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1283 6a09228-6a0925d 1284 6a0925f-6a09262 1283->1284 1285 6a09b20-6a09b23 1284->1285 1286 6a09268-6a0927d 1284->1286 1287 6a09b25-6a09b44 1285->1287 1288 6a09b49-6a09b4b 1285->1288 1293 6a09295-6a092ab 1286->1293 1294 6a0927f-6a09285 1286->1294 1287->1288 1290 6a09b52-6a09b55 1288->1290 1291 6a09b4d 1288->1291 1290->1284 1295 6a09b5b-6a09b65 1290->1295 1291->1290 1300 6a092b6-6a092b8 1293->1300 1296 6a09287 1294->1296 1297 6a09289-6a0928b 1294->1297 1296->1293 1297->1293 1301 6a092d0-6a09341 1300->1301 1302 6a092ba-6a092c0 1300->1302 1313 6a09343-6a09366 1301->1313 1314 6a0936d-6a09389 1301->1314 1303 6a092c2 1302->1303 1304 6a092c4-6a092c6 1302->1304 1303->1301 1304->1301 1313->1314 1319 6a093b5-6a093d0 1314->1319 1320 6a0938b-6a093ae 1314->1320 1325 6a093d2-6a093f4 1319->1325 1326 6a093fb-6a09416 1319->1326 1320->1319 1325->1326 1331 6a09418-6a09434 1326->1331 1332 6a0943b-6a09449 1326->1332 1331->1332 1333 6a09459-6a094d3 1332->1333 1334 6a0944b-6a09454 1332->1334 1340 6a09520-6a09535 1333->1340 1341 6a094d5-6a094f3 1333->1341 1334->1295 1340->1285 1345 6a094f5-6a09504 1341->1345 1346 6a0950f-6a0951e 1341->1346 1345->1346 1346->1340 1346->1341
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q
                                                            • API String ID: 0-127220927
                                                            • Opcode ID: 53c8de769156a7443ba82c73beebcee7ad9677e82b72329e258c461797af6a34
                                                            • Instruction ID: b71c2af3261ec19178522abb622717eef18851be16f373ad9a832da6d899f902
                                                            • Opcode Fuzzy Hash: 53c8de769156a7443ba82c73beebcee7ad9677e82b72329e258c461797af6a34
                                                            • Instruction Fuzzy Hash: 9B516430B001099FEB54EB74E960BAFB7F2BB88744F108469D419DB385EA309C42CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fbq$XPbq
                                                            • API String ID: 0-2292610095
                                                            • Opcode ID: 447d25dc9091355e7de1b3148b5ca8f9fc8922921f68741ba25aac229c7f7200
                                                            • Instruction ID: 8185d72f068c214d50020edfc9c50fce6319086ef773a663d2ae1cbe4f1dee89
                                                            • Opcode Fuzzy Hash: 447d25dc9091355e7de1b3148b5ca8f9fc8922921f68741ba25aac229c7f7200
                                                            • Instruction Fuzzy Hash: 75516270F102099FEB54DFA5C854BAEBBF6FF88710F208529D105AB395DB759C018B91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4473150259.0000000002CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2cd0000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 040aaa399efd5bf38a3354d515756726a59270a8e1f789259d42d8311baa67fc
                                                            • Instruction ID: 804b7d74daf9c6218f10c75c800044afcef293190f3a32f9fb704401ae6bc603
                                                            • Opcode Fuzzy Hash: 040aaa399efd5bf38a3354d515756726a59270a8e1f789259d42d8311baa67fc
                                                            • Instruction Fuzzy Hash: FB416472E043968FCB04DF79D8042EEBBF5AF89310F1485ABD404EB281DB389845CBA1
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069E65AA
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 9da23dba8da45a54c198f8a19a86ab55f50bfa5e78f7eee956ead734809c722b
                                                            • Instruction ID: 9ff89de3634cd84315bff1c7b1b7e8bd292e8bf021b5e9ab97143051577d58bf
                                                            • Opcode Fuzzy Hash: 9da23dba8da45a54c198f8a19a86ab55f50bfa5e78f7eee956ead734809c722b
                                                            • Instruction Fuzzy Hash: 8651DEB1D10309AFDB14CF9AD884ADEBBB5FF48310F24812AE419AB211D775A985CF91
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069E65AA
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 46d261f69e28c655b4215a107c0e04fe3ba63d29d30727d224e279d4d8d01337
                                                            • Instruction ID: a98d9dbfd01fee2f393fe16336a701bb3295b5beb5123c8563c43101d4d43112
                                                            • Opcode Fuzzy Hash: 46d261f69e28c655b4215a107c0e04fe3ba63d29d30727d224e279d4d8d01337
                                                            • Instruction Fuzzy Hash: 0E41DEB1D10309DFDB14CF9AD884ADEBBB5BF88310F24812AE819AB210D775A845CF90
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 069EB3D9
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: b39b3e38825197c865dff68a48091fc1107656aa1a13d4b30450a899fdac87e9
                                                            • Instruction ID: 3b3c71c2825225f22c99875fffee36595945220d7a30d032dc425cb6bd4cc5c3
                                                            • Opcode Fuzzy Hash: b39b3e38825197c865dff68a48091fc1107656aa1a13d4b30450a899fdac87e9
                                                            • Instruction Fuzzy Hash: 15415AB4A00309CFDB54CF99C988AAEBBF5FB88314F248859D519A7725D374A841CBA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Clipboard
                                                            • String ID:
                                                            • API String ID: 220874293-0
                                                            • Opcode ID: 89c122b343aa16d71dc01d4233225b8dc190d940f1425442af69b4f445e3745f
                                                            • Instruction ID: f8916e60cadc07d3c60fd126368421c5cdb6d48e747a96e00beb588beee71912
                                                            • Opcode Fuzzy Hash: 89c122b343aa16d71dc01d4233225b8dc190d940f1425442af69b4f445e3745f
                                                            • Instruction Fuzzy Hash: 783103B4D01248DFDB20CF99C984BCEBBF5AB48314F24802AE505AB294DB746985CB65
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Clipboard
                                                            • String ID:
                                                            • API String ID: 220874293-0
                                                            • Opcode ID: bd7ed48b090d84b8bb931ec17c1a6a4f4214462ac9ad8d97b7ecf8baa98a20b1
                                                            • Instruction ID: 9878bdeb05a51aab1ad53edcff116bc9dfd9b025a77240398bb724bb85c13197
                                                            • Opcode Fuzzy Hash: bd7ed48b090d84b8bb931ec17c1a6a4f4214462ac9ad8d97b7ecf8baa98a20b1
                                                            • Instruction Fuzzy Hash: 073102B4E01248DFDB14CF99C984BCEBBF5EF48314F20801AE505AB294D774A985CF55
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069EA10F
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 83a11b7755999996527f1646ef29fd178065f67ba22d828ef854a9aba02f68b3
                                                            • Instruction ID: bed54f042ff1ddb90a76c7a13ad5e20aa88c48570f4a3676ec4c1235dcb50315
                                                            • Opcode Fuzzy Hash: 83a11b7755999996527f1646ef29fd178065f67ba22d828ef854a9aba02f68b3
                                                            • Instruction Fuzzy Hash: AF21E5B5D002499FDB10CFAAD884ADEFFF8EB48310F14801AE914A3250D378A954CF61
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069EA10F
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 5a1c3a1422e84516a637c598963ae9a7a9fdf6b7697c6d12c5d15e2278af2594
                                                            • Instruction ID: d5f3e5f2178da6bb126f2719928d430283944cf234480b6ce221279bc4d0e149
                                                            • Opcode Fuzzy Hash: 5a1c3a1422e84516a637c598963ae9a7a9fdf6b7697c6d12c5d15e2278af2594
                                                            • Instruction Fuzzy Hash: 1421C4B5D002499FDB10CF9AD984ADEFFF8EB48310F14841AE918A3350D378A954CF65
                                                            APIs
                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 069EDAAB
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: f2be19e400c382f6ee3bd3f4310a5d3cf1ff57f77ab9bcea36dd962ea4a456bb
                                                            • Instruction ID: 0fcf5ca80797f4be1761944ae9f8a1a4a0606fd3724454bd7859e54159c5d128
                                                            • Opcode Fuzzy Hash: f2be19e400c382f6ee3bd3f4310a5d3cf1ff57f77ab9bcea36dd962ea4a456bb
                                                            • Instruction Fuzzy Hash: 7C2115B5D002099FCB54DF9AD844BDEFBF9EF88320F14841AE459A7250C774AA45CFA1
                                                            APIs
                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 069EDAAB
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: 492df8e1e2c4cab3e4dc5cfd519e240608c6ec2c88f06d0c6eada5acb0927f88
                                                            • Instruction ID: df5ce9930a7a459843405086da3bca8d3526f997fa0d0c8898047a3dbac42e03
                                                            • Opcode Fuzzy Hash: 492df8e1e2c4cab3e4dc5cfd519e240608c6ec2c88f06d0c6eada5acb0927f88
                                                            • Instruction Fuzzy Hash: 8E2115B5D002099FCB14DF9AD844BDEFBF9EF88320F14841AD419A7250C774A944CFA1
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 02CDEFE7
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4473150259.0000000002CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2cd0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: 0a2104b4e4e7635a25f9e03506419bfb18fb99a6f91533c9e512b463fac7e8e5
                                                            • Instruction ID: dbfdf61d110a76a6b053db8a71b85437b9e1661d47c56c3924e0bfaf9d532349
                                                            • Opcode Fuzzy Hash: 0a2104b4e4e7635a25f9e03506419bfb18fb99a6f91533c9e512b463fac7e8e5
                                                            • Instruction Fuzzy Hash: 131123B1C0025A9BCB10DF9AD444BDEFBF4EF48320F11816AE818A7240D378A944CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 069E5456
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: ab579ee0a6362bd077008775641e9e0b46e552f40551bf2ce85ee1aca844f146
                                                            • Instruction ID: 7bbec6d9f90816c353dacd16fac3a9877c463d07d2b195ce0f5ab5729b404441
                                                            • Opcode Fuzzy Hash: ab579ee0a6362bd077008775641e9e0b46e552f40551bf2ce85ee1aca844f146
                                                            • Instruction Fuzzy Hash: 101102B5D002498FCB10DF9AD844ADEFBF8EB89314F21852AD829B7610D379A545CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 069E5456
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: a15b4c3f8bc8227d83690d156c8c8a6036ab9e367fbc9d0a0019e817e6120e9a
                                                            • Instruction ID: 00ad1cac0e98f24cb3930666d883d4ed67620b60a8f90a9361debbdd3197de07
                                                            • Opcode Fuzzy Hash: a15b4c3f8bc8227d83690d156c8c8a6036ab9e367fbc9d0a0019e817e6120e9a
                                                            • Instruction Fuzzy Hash: 841120B5C003498FCB10DF9AD844BDEFBF8EB88214F11841AD419B7610D375A945CFA1
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 069EBB75
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 5cd5e26d3440b69adddbb28d3a708f18c06e3e613a2b96e70720b450a888dd91
                                                            • Instruction ID: 4a0da85b424fefa304127a9f6439e19c78f53a6b5cfa7012b7d4f8322337a492
                                                            • Opcode Fuzzy Hash: 5cd5e26d3440b69adddbb28d3a708f18c06e3e613a2b96e70720b450a888dd91
                                                            • Instruction Fuzzy Hash: 72113AB5D003498FCB10DF9AD985BDEBFF8EB49310F148459D518A3640C375A544CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,069EB62D), ref: 069EB6B7
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: f49c5480431d04dc2325766df88d4998006377b0b1aa881fc25557dab0ad9507
                                                            • Instruction ID: 58cdaa0b95cbf4f4e1807df3ce22092e04f96da097c1ce0120cb47371ab3c6bc
                                                            • Opcode Fuzzy Hash: f49c5480431d04dc2325766df88d4998006377b0b1aa881fc25557dab0ad9507
                                                            • Instruction Fuzzy Hash: 3D1100B5C002498FCB20DF9AD985BDEBFF8EB48720F20845AD519A3250C379A944CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,069EB62D), ref: 069EB6B7
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 558f7ac7d46729a63e462230c3c5dca2d41d7249fcf9585c2b8a7d8a7be670ca
                                                            • Instruction ID: fea0f4f2f841c9d4d4144aaf7a83626d80da8098f737ca7fc70cd01381f0057a
                                                            • Opcode Fuzzy Hash: 558f7ac7d46729a63e462230c3c5dca2d41d7249fcf9585c2b8a7d8a7be670ca
                                                            • Instruction Fuzzy Hash: 3D1130B1C00349CFCB20DF9AD988B9EBBF8EB48320F20841AD519A3740C374A944CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 069EBB75
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 8760e7baf0e40573e47d77b02e8a6d7180135be02818336146a637f8c8b9fcb7
                                                            • Instruction ID: 8d6ee300d04facab57c9f60d5ec6c8a6841968b3445bdd49577c62f8b0db32a0
                                                            • Opcode Fuzzy Hash: 8760e7baf0e40573e47d77b02e8a6d7180135be02818336146a637f8c8b9fcb7
                                                            • Instruction Fuzzy Hash: 2E1145B1D00349CFCB20DF9AD588B9EBBF8EB48320F24841AD519A3750C378A944CFA5
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 069E5456
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493487142.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_69e0000_newapp.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 49eb41403beb1fba22340ddee303d1dbc7ce1a3a953545e36fe82014adb532f2
                                                            • Instruction ID: 13093220e1d5a06d6d792d7514784636d1e82918a61dd48ef425bf45b8ef1f0a
                                                            • Opcode Fuzzy Hash: 49eb41403beb1fba22340ddee303d1dbc7ce1a3a953545e36fe82014adb532f2
                                                            • Instruction Fuzzy Hash: 0F0165F5D056088FCB10CF9AD4047CAFBF0AF89319F25859AC159AB252D336A456CFA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: e8bd20be27e302716ed43255e1604d17f8f651ce7dd912edb0ee56b308f371ce
                                                            • Instruction ID: e91d8f063ce3f475eae827fb5c7d6f83e8cbba8168e029bc6e53c167053940e8
                                                            • Opcode Fuzzy Hash: e8bd20be27e302716ed43255e1604d17f8f651ce7dd912edb0ee56b308f371ce
                                                            • Instruction Fuzzy Hash: 9C41B371E0060A9FEB65FFB5D45069EBBF2BF85300F244529E405DB284DB74E946CB81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 76c6cc38976de14ef800b97f67c9831dd33fbeca8f79241509405bc7604f0fc7
                                                            • Instruction ID: 2300e9df379f9646ea7362564fa3fab351a942ddd463c3b3a9ec4f511ee95794
                                                            • Opcode Fuzzy Hash: 76c6cc38976de14ef800b97f67c9831dd33fbeca8f79241509405bc7604f0fc7
                                                            • Instruction Fuzzy Hash: DA41D030B103018FEB59ABB4E45476EBBE2AB8D350F1044B8D406DB389DE35CD46CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 28f86ab5b535934a2cf863df8809b28be8cf49067145c5cd642748745d21478c
                                                            • Instruction ID: 6c52beda1068d70ccd8cfe7bf5c2ff3bb35df5ecd4f00f191362b587f1465b9a
                                                            • Opcode Fuzzy Hash: 28f86ab5b535934a2cf863df8809b28be8cf49067145c5cd642748745d21478c
                                                            • Instruction Fuzzy Hash: 3D31B030B103068FEB59ABB4E45876E7AE2AB8D354F204478D406DB388DE35DE458B91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \Obq
                                                            • API String ID: 0-2878401908
                                                            • Opcode ID: 7ca837a876b186971886b15acea028bc03e8b02a82260e1c0f0e61881936e9e0
                                                            • Instruction ID: 1ac1bdaf1b659d595735ba768090b8f9691c73811ab1ee2fbc2bf977e2da0bfc
                                                            • Opcode Fuzzy Hash: 7ca837a876b186971886b15acea028bc03e8b02a82260e1c0f0e61881936e9e0
                                                            • Instruction Fuzzy Hash: C6F0DA30A54219DBDB14EF94E998BAEBBF2FF88711F204119E502A7294CBB01C41CBC0
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ada7f96d5979036d1ec1adc86d6e543f7c3e23d46b7f34768918117512b0199d
                                                            • Instruction ID: 9d37f1c9e590f2a47b899f4eadd3f39de1a4f47fe2ae25ff231970078fdaf383
                                                            • Opcode Fuzzy Hash: ada7f96d5979036d1ec1adc86d6e543f7c3e23d46b7f34768918117512b0199d
                                                            • Instruction Fuzzy Hash: AC61B071F000224BDB54AB6AD88065FFAD7AFD8224B254479E80EDB364DE65ED0287D2
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d12e1fb1b1d584cbd5194b227aec731142be468da4d633500a7f2598b873a7fa
                                                            • Instruction ID: e23748cd3cc5586e46cc83ff004abc4452c33d698bca3b2116617b25ed11c3c7
                                                            • Opcode Fuzzy Hash: d12e1fb1b1d584cbd5194b227aec731142be468da4d633500a7f2598b873a7fa
                                                            • Instruction Fuzzy Hash: 20814030B0020A9FDB54EFA4D4546AEB7F3FB89304F218529D50AEB394EB35DC468B51
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 25b7a6d2c74d0a6d5f4e7bf1934d70144dc9352201837652f6f7dae8805bc8f2
                                                            • Instruction ID: 94872117fc210db9aa674dcbaab2be3df19f1ffc58dc3bb32a23afcd4b43c8df
                                                            • Opcode Fuzzy Hash: 25b7a6d2c74d0a6d5f4e7bf1934d70144dc9352201837652f6f7dae8805bc8f2
                                                            • Instruction Fuzzy Hash: 0C914E30E1061ACFEF60DF64C890B9DB7B1FF89310F2085A9D549AB295DB70AA85CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0362bd935214051f97480b1f817e8c9eef2a721101a26960d2ef671ca19a7623
                                                            • Instruction ID: a97d2a35bc63f466f6243e72ad6d94f8469b9227795ead1dd2d136e641d4af94
                                                            • Opcode Fuzzy Hash: 0362bd935214051f97480b1f817e8c9eef2a721101a26960d2ef671ca19a7623
                                                            • Instruction Fuzzy Hash: B9913D30E1061ACBEF64DF68C880B9DB7B1FF89314F208599D54DAB285DB70AA85CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7420c602a324e50a2b56319f5b8cc594619758d75a2ffde26ef9cfdfa5e7e32b
                                                            • Instruction ID: fdd21531fc7d126df77e4f14f4e2cd06624eacbd1aecba7d27b1629db91457d3
                                                            • Opcode Fuzzy Hash: 7420c602a324e50a2b56319f5b8cc594619758d75a2ffde26ef9cfdfa5e7e32b
                                                            • Instruction Fuzzy Hash: FB715F70A002099FDB54EFA9D990A9DFBF6FF88300F258469E415EB394DB30E946CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d528adb63727824a5036177f3854e190b80e2e4649c08614456b73d3729d77b8
                                                            • Instruction ID: 624c1386588f986fcd4ff9538a998c7b0a6b218f44ada391cfca544034fb2302
                                                            • Opcode Fuzzy Hash: d528adb63727824a5036177f3854e190b80e2e4649c08614456b73d3729d77b8
                                                            • Instruction Fuzzy Hash: 8F712D70A002099FDB54EFA9D990A9DFBF6FF88304F258469E815EB354DB30E946CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b060cad978eec7c3ae888f686064d712cf9c803078a32002a97acd36161a82c
                                                            • Instruction ID: e5ae08013cdd012db7adcec5ab633b9c3817a7bc791ab18b2211eb20a52383b6
                                                            • Opcode Fuzzy Hash: 6b060cad978eec7c3ae888f686064d712cf9c803078a32002a97acd36161a82c
                                                            • Instruction Fuzzy Hash: 5851F331E00109DFEB64BB78F4546ADBBB2FB85314F108879E90AEB284DB358C45CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aa0e699bfbb609ea9095b0f922d94886cae7ae539a7025700094e058f466fd66
                                                            • Instruction ID: e5bba14c4bdeb4dbc83f76956c4bf41f76cca770cd80788187a19753f8e3e039
                                                            • Opcode Fuzzy Hash: aa0e699bfbb609ea9095b0f922d94886cae7ae539a7025700094e058f466fd66
                                                            • Instruction Fuzzy Hash: EB51A574B201055FFF74676CE86472F365AD78D310F21452AE90ADB3D5CA68CC9287E2
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6689aef5242636d00cb468599b2b9c1b14b3c854e739af2147ad190d3372ae19
                                                            • Instruction ID: 1adda7761a16770c7c59c2208044bae496bd3b1059cec555db3ff0ebe29e21a9
                                                            • Opcode Fuzzy Hash: 6689aef5242636d00cb468599b2b9c1b14b3c854e739af2147ad190d3372ae19
                                                            • Instruction Fuzzy Hash: 25518074B201059FFF74676CE864B2F365AD78D310F21442AE90ADB3D5CA68DC9287E2
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 58c9b3fbe786dd89b6071afa043e12212e8b745305470f9adc3d407efc57a26d
                                                            • Instruction ID: 9b5e62221119f0089e60d5a56e0ffd1cde20b6fde2824747427c5585ce96773f
                                                            • Opcode Fuzzy Hash: 58c9b3fbe786dd89b6071afa043e12212e8b745305470f9adc3d407efc57a26d
                                                            • Instruction Fuzzy Hash: 8F418F75E006098FEF60DFA9E980AAFFBF2EB54310F14492AE115DB690D731E9458F90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eba9120fb4205408f8640587f7a7ceb63fdf7225a9a525d28139aa3c963fd7ab
                                                            • Instruction ID: 888a6f87fa1a301e1541aeb2a49ed442b87f789879be9dd8fb20109ad91bba11
                                                            • Opcode Fuzzy Hash: eba9120fb4205408f8640587f7a7ceb63fdf7225a9a525d28139aa3c963fd7ab
                                                            • Instruction Fuzzy Hash: 6E31B271E102058FEF60AFA9D6806AEBBA1FB45320F258866D859DF285C234DD41DF91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fccedd4cd1d33d1d64d64297c5c42606a53fa44b569a8f49c9dad9461db8572f
                                                            • Instruction ID: f4546007235ed908b15872fc1f93ec8445c57235b5a0fe3f30b18c5894722f90
                                                            • Opcode Fuzzy Hash: fccedd4cd1d33d1d64d64297c5c42606a53fa44b569a8f49c9dad9461db8572f
                                                            • Instruction Fuzzy Hash: 7731C030E003069FDB55DF64E8A869EFBB2AF89300F10C529E916EB390DB719946CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d65707dcb5db90c9bfb5097c70743f6d0bbd3250316ec50ecdf7c3bfd5bdc068
                                                            • Instruction ID: 7ea2dfce8eddd37bdba3d6031e61bc038a002056a091cda3a107cd558095f365
                                                            • Opcode Fuzzy Hash: d65707dcb5db90c9bfb5097c70743f6d0bbd3250316ec50ecdf7c3bfd5bdc068
                                                            • Instruction Fuzzy Hash: 1A31A731E1070A9BDB65EFA5D49068EBBB2FF85314F208929E405EB244DB74A9468B81
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5c4b515f89de3c608370246ee88ba6be3785a1100f218c1279c10cac425aa7fd
                                                            • Instruction ID: c461e5cdb8bbbffac24fd27073b354a451cd993ec663104a19c98f014009a84f
                                                            • Opcode Fuzzy Hash: 5c4b515f89de3c608370246ee88ba6be3785a1100f218c1279c10cac425aa7fd
                                                            • Instruction Fuzzy Hash: 42316130E0060A9FDB55DF64E85869EB7B2AF89300F10C529E916EB344DB75AD46CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dee05673b001b18356240a7d9615cc5e54e24883f3ebfdda93306e253e268e80
                                                            • Instruction ID: c41f71888d57ae3f409b032967aab92053057b31565e7a3ac5a6224a75af4cce
                                                            • Opcode Fuzzy Hash: dee05673b001b18356240a7d9615cc5e54e24883f3ebfdda93306e253e268e80
                                                            • Instruction Fuzzy Hash: FA219F71F01209AFDB10DF78EC90AAEBBF5EB48714F148029E909EB394D735D8018B91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 155bd8f4da219c825f7e8640152a846e28cddd172b3e54f9e82c173a3d7745f7
                                                            • Instruction ID: 312f337b37efbeb2539593ed27385a06c6a14406110d7d6ec9295f113c298213
                                                            • Opcode Fuzzy Hash: 155bd8f4da219c825f7e8640152a846e28cddd172b3e54f9e82c173a3d7745f7
                                                            • Instruction Fuzzy Hash: 72216075F002199FEB50EF69E890AAEB7F5FB48714F108029E909EB394E735D901CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2a951bb9a0d8af00c97710d7afe87c29f884e4f374b92bb903c9a170ee050772
                                                            • Instruction ID: 8e314e07e0f05411ea3b830a5eb483f8a8124080322e34938011a202c9741633
                                                            • Opcode Fuzzy Hash: 2a951bb9a0d8af00c97710d7afe87c29f884e4f374b92bb903c9a170ee050772
                                                            • Instruction Fuzzy Hash: 00210D34B002159FE751EB74F55469EF7F2DB89310B108466E50AD7282DA31DD06C791
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4470524278.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_112d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 12595ecdc8bae7a19330704e9fb19df44fda6a6e198c0c1c0c91148a596173c1
                                                            • Instruction ID: d60598172f87ede453d2e95547e84bd99b93db492bf0a4dc4e991d17c0a55829
                                                            • Opcode Fuzzy Hash: 12595ecdc8bae7a19330704e9fb19df44fda6a6e198c0c1c0c91148a596173c1
                                                            • Instruction Fuzzy Hash: CC2125B1504200DFDF19DF58E9C0B26BBA5FB84314F24C56DD9094B266C33AD427CA66
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 95be01bafe80a870d298206566cddae23841f20273fbd248dde9c38cf961c96c
                                                            • Instruction ID: f90fd7604dfc32a17afcd3505e2fda0760c2f869e21f47bc17a941ef907408c7
                                                            • Opcode Fuzzy Hash: 95be01bafe80a870d298206566cddae23841f20273fbd248dde9c38cf961c96c
                                                            • Instruction Fuzzy Hash: 0F210870E002165FDF64AF78D8405DEBBF1EB85310F1045A9D01AEB380DA31DA41CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a2594c870e52156bd4044fec754f4bb8d6caf22e39765d8164a699b606f724b
                                                            • Instruction ID: bc3ceafdcd67e9e3c6f9cf68b0fcb6e37056510e00b33a468b6723758007040b
                                                            • Opcode Fuzzy Hash: 0a2594c870e52156bd4044fec754f4bb8d6caf22e39765d8164a699b606f724b
                                                            • Instruction Fuzzy Hash: 6521A230F102199FEF44EB69F86069EB7B7EB85314F248425E409EB384DB31ED568B94
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 81f5bbea0df30aee832d456850d60b88bccc6be392d1c150dfb91a2d2e542c77
                                                            • Instruction ID: 3829c272602917438635fd37001e363ac1c677d113f488cc016f26ef8e9bdaa8
                                                            • Opcode Fuzzy Hash: 81f5bbea0df30aee832d456850d60b88bccc6be392d1c150dfb91a2d2e542c77
                                                            • Instruction Fuzzy Hash: 72119C31B042124BEB61A63CA81075FFBC6EBCE721F21542AE399CB3C5DA11CC024393
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 405e65cbbf32d0e1209ca3ee3910dae052ceeefe5c570a4b716fa386827abe8e
                                                            • Instruction ID: 40c02c43c307af52b54020eb5930d53d31100b630216b5baf89f55a13cf64e9e
                                                            • Opcode Fuzzy Hash: 405e65cbbf32d0e1209ca3ee3910dae052ceeefe5c570a4b716fa386827abe8e
                                                            • Instruction Fuzzy Hash: F9118231B001199FEB54EA68DC146AF72FAFBC8310B008139C60AEB384DE65DC0287D1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 00513daa697345812293a52e82e2c391879be651e400e5af67e8a26b74b2bb55
                                                            • Instruction ID: 267cf777aa565285e4491cc6bcca0040d5cfad773a621bc3345e9b36486413f7
                                                            • Opcode Fuzzy Hash: 00513daa697345812293a52e82e2c391879be651e400e5af67e8a26b74b2bb55
                                                            • Instruction Fuzzy Hash: F7012431B101120FDB31A67CA85076FBBDBDBCA320F10886AF90EDB381DA14CD424392
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51a5e79fc6c0a4e6189c8067b26b460adba762a53a8b8acb60c312a9ac18e1a0
                                                            • Instruction ID: 39b6a5136cd505996c02ae53d84d01f53ebc4c7a33fd152468b10a095a5f8a87
                                                            • Opcode Fuzzy Hash: 51a5e79fc6c0a4e6189c8067b26b460adba762a53a8b8acb60c312a9ac18e1a0
                                                            • Instruction Fuzzy Hash: 1E01B931B091159BEF55EA68DC106EF76EBEBC9310F014039D549E7284DF66880647D2
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1336b737af87d34be9c76cc5c6c1f58a6afeb6c5b3224b91e71c07f5b39c4024
                                                            • Instruction ID: 9169889814aea99cd5b4f76d48666301cb046d20f092fefc7413a945cdb0c991
                                                            • Opcode Fuzzy Hash: 1336b737af87d34be9c76cc5c6c1f58a6afeb6c5b3224b91e71c07f5b39c4024
                                                            • Instruction Fuzzy Hash: 8C21C3B5D01259AFDB00DF9AD884A9EFFF4FB49310F10812AE518A7241D374A954CBA5
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 13a9cd2c4adb595ac399c9d693396496119cb7973d4b5b075cf36b01695d060d
                                                            • Instruction ID: 7daf95761a13d3421627deb0217d440e7bf39e6690658c4ccfc0db5ed5f9c96a
                                                            • Opcode Fuzzy Hash: 13a9cd2c4adb595ac399c9d693396496119cb7973d4b5b075cf36b01695d060d
                                                            • Instruction Fuzzy Hash: BA2106B1D002599FCB00DF9AD884ACEFFF4FB49310F10811AE918A7240C378A954CFA5
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4470524278.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_112d000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction ID: 9180fbc8ef242bc15a2ae82d3a95bb915f3e4e3cf282a72cd21675b870eb0f6e
                                                            • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                            • Instruction Fuzzy Hash: E211DD75504280CFDB16CF58E5C4B15FFB1FB84314F28C6AAD8494B666C33AD45ACB62
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2abf1782b9aa0c796e35dc926126f368b0335d1ed187810b77124a0b2ade12cd
                                                            • Instruction ID: 1f5397bca4996299e7cc9e23ebfdf6a97b464743cd6fe76ba57d0d10d6a33900
                                                            • Opcode Fuzzy Hash: 2abf1782b9aa0c796e35dc926126f368b0335d1ed187810b77124a0b2ade12cd
                                                            • Instruction Fuzzy Hash: 75016231B001124BEB65A66DA41471FF7DBEBCDB24F20883AE60ECB388DD65DC024392
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e168e138fd9e599a339d0d06075ff92678dc078c47ae16de7bb7de3677ad7905
                                                            • Instruction ID: 19ca3a102c567e693eb8a4e8897fd32f76ce620b61a39de178d2b6a73479d013
                                                            • Opcode Fuzzy Hash: e168e138fd9e599a339d0d06075ff92678dc078c47ae16de7bb7de3677ad7905
                                                            • Instruction Fuzzy Hash: 22018135B105120FEB75A67DA45472FB6D6DBC9720F208839E90EDB384DA25DD024386
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e2b1c727298b5aa1f743755f9458c1b1e4d72af9e37b020bde2a6aa3bb189e72
                                                            • Instruction ID: 2c038c4c3144b14e630874f7a81ba5609b2e100af909e5a8acdc323065a0c771
                                                            • Opcode Fuzzy Hash: e2b1c727298b5aa1f743755f9458c1b1e4d72af9e37b020bde2a6aa3bb189e72
                                                            • Instruction Fuzzy Hash: CB018134B001155FEB60EA38F46871AB7D6DB89714F208439E60ECB395DE26DD068791
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 664219308e01b28cbc11a4d7b651c169754b3b258351dd0c4d22400f6f875c76
                                                            • Instruction ID: afe4c49b236db9457fa086505783e16f41fd28fdbad90cbd16e85545fff037a7
                                                            • Opcode Fuzzy Hash: 664219308e01b28cbc11a4d7b651c169754b3b258351dd0c4d22400f6f875c76
                                                            • Instruction Fuzzy Hash: C901CD31F102295FDB54EB79F85069EB776F785364F104539E906EB384DB31980587D0
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8a3d6d579ff7d6e8e1846f83aa56bf853d95ed21aecaf08fa60491010f708fbe
                                                            • Instruction ID: 0f0823c055793fc22214983dd8ec0af73cf6a640c98a0629c50a26a784c5fe72
                                                            • Opcode Fuzzy Hash: 8a3d6d579ff7d6e8e1846f83aa56bf853d95ed21aecaf08fa60491010f708fbe
                                                            • Instruction Fuzzy Hash: A8E09BB59091055FEB50EF60DDC475E7B99DB05318F2048A5D405CF182E177DA518751
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-2843079600
                                                            • Opcode ID: 027f0ab1ced4c99910e2cf26b9f90caa3fb94b959da75a88260dd438060d1d91
                                                            • Instruction ID: 6592c3e1383c025006e0869daca90cc7b5d199b5a408521d786ec36415c6e80f
                                                            • Opcode Fuzzy Hash: 027f0ab1ced4c99910e2cf26b9f90caa3fb94b959da75a88260dd438060d1d91
                                                            • Instruction Fuzzy Hash: 3B120F30E012198FEB64EF69D8946ADB7F2BF89304F208569D409AB354DB30ED85CF91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-1273862796
                                                            • Opcode ID: 236c23f2b1179b6ed38e741535e847c2c500a4503e24efa786d232b970405a72
                                                            • Instruction ID: 4a309006c58c6ca2d070690fc74f9a3b2d1bf3ecc5594aebae72737d8f57537f
                                                            • Opcode Fuzzy Hash: 236c23f2b1179b6ed38e741535e847c2c500a4503e24efa786d232b970405a72
                                                            • Instruction Fuzzy Hash: F7917030E10309DFEB68EF69E594B6EB7F2BF44304F208529E9059B296DB749D41CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-981061697
                                                            • Opcode ID: 53a45dc0e69521408a5f05249ea8505d753752097597dae32abe004b645fb1b5
                                                            • Instruction ID: 397b121cd93e219693048b5a7d30bd1f7803fe3da5d201718579587ce292b6d9
                                                            • Opcode Fuzzy Hash: 53a45dc0e69521408a5f05249ea8505d753752097597dae32abe004b645fb1b5
                                                            • Instruction Fuzzy Hash: 51F12C74B11209DFDB59EFA8D490A6EB7B2FF84300F258569D4069B398DB35EC42CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: c519d969c82c7892a921958c3c730acb152514386dc9c74b462f61f5e28c1a6e
                                                            • Instruction ID: 3480c009135607275fe514a7075e8c0dc0eed4c9d33dd12b493a1273027362aa
                                                            • Opcode Fuzzy Hash: c519d969c82c7892a921958c3c730acb152514386dc9c74b462f61f5e28c1a6e
                                                            • Instruction Fuzzy Hash: 36B12D30A10209CFEB58EF69D4906AEB7B3FF84344F248429D4069B394DB79DC86CB85
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR]q$LR]q$$]q$$]q
                                                            • API String ID: 0-3527005858
                                                            • Opcode ID: 75358f0471fe065ca8791d602015cfb229372884e1bf9aeaae2e3b10d809e40d
                                                            • Instruction ID: 5da922aa4fad1063bc83677c4321376dba3864708aa4ec9787740db858e5a54d
                                                            • Opcode Fuzzy Hash: 75358f0471fe065ca8791d602015cfb229372884e1bf9aeaae2e3b10d809e40d
                                                            • Instruction Fuzzy Hash: 1451C6307002069FEB58FB68E450A6AB7F2FF44304F158969E4059B3D4DB34EC41CB95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4493805686.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_6a00000_newapp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: aba3b7417514c78d7b59da08f4340a16790f74f563c2a2daf0c362916aaef57f
                                                            • Instruction ID: fbc80f738654c20810bd5429a2f7b1b3e1d668c1cc6daccd3bb1bb1e20336935
                                                            • Opcode Fuzzy Hash: aba3b7417514c78d7b59da08f4340a16790f74f563c2a2daf0c362916aaef57f
                                                            • Instruction Fuzzy Hash: 6651A530E103058FEB65EB68E59066EB7F6EF45310F248529E606DB385DB31DC41CB81