Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1574874
MD5:30e5e5a39df67a1138bf84db89a5eb47
SHA1:d269595a30fd1e49086c51f629e39c15200e0149
SHA256:1d409e94b935c68a4b4841a1b2e05c6abf1ea827c419eab8bf3ee23229574160
Tags:NETexeMSILuser-jstrosch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 7544 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 30E5E5A39DF67A1138BF84DB89A5EB47)
    • powershell.exe (PID: 7788 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8016 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rXcourOVPD.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 8048 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • file.exe (PID: 6176 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 30E5E5A39DF67A1138BF84DB89A5EB47)
  • rXcourOVPD.exe (PID: 6576 cmdline: C:\Users\user\AppData\Roaming\rXcourOVPD.exe MD5: 30E5E5A39DF67A1138BF84DB89A5EB47)
    • schtasks.exe (PID: 7200 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmpAA33.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rXcourOVPD.exe (PID: 3728 cmdline: "C:\Users\user\AppData\Roaming\rXcourOVPD.exe" MD5: 30E5E5A39DF67A1138BF84DB89A5EB47)
    • rXcourOVPD.exe (PID: 5492 cmdline: "C:\Users\user\AppData\Roaming\rXcourOVPD.exe" MD5: 30E5E5A39DF67A1138BF84DB89A5EB47)
    • rXcourOVPD.exe (PID: 6976 cmdline: "C:\Users\user\AppData\Roaming\rXcourOVPD.exe" MD5: 30E5E5A39DF67A1138BF84DB89A5EB47)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7329625827:AAFusOMtNxAA4AfTt7YzeN1zaE4Sm-WxFiw/sendMessage?chat_id=8096159140", "Token": "7329625827:AAFusOMtNxAA4AfTt7YzeN1zaE4Sm-WxFiw", "Chat_id": "8096159140", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000014.00000002.3762642230.0000000002C61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x132be:$a1: get_encryptedPassword
      • 0x135a2:$a2: get_encryptedUsername
      • 0x130ca:$a3: get_timePasswordChanged
      • 0x131c5:$a4: get_passwordField
      • 0x132d4:$a5: set_encryptedPassword
      • 0x14937:$a7: get_logins
      • 0x1489a:$a10: KeyLoggerEventArgs
      • 0x14505:$a11: KeyLoggerEventArgsEventHandler
      0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x18260:$x1: $%SMTPDV$
      • 0x16c44:$x2: $#TheHashHere%&
      • 0x18208:$x3: %FTPDV$
      • 0x16be4:$x4: $%TelegramDv$
      • 0x14505:$x5: KeyLoggerEventArgs
      • 0x1489a:$x5: KeyLoggerEventArgs
      • 0x1822c:$m2: Clipboard Logs ID
      • 0x1846a:$m2: Screenshot Logs ID
      • 0x1857a:$m2: keystroke Logs ID
      • 0x18854:$m3: SnakePW
      • 0x18442:$m4: \SnakeKeylogger\
      0000000E.00000002.3761812258.0000000002F11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 20 entries
        SourceRuleDescriptionAuthorStrings
        15.2.rXcourOVPD.exe.3c228c0.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          15.2.rXcourOVPD.exe.3c228c0.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x126be:$a1: get_encryptedPassword
          • 0x129a2:$a2: get_encryptedUsername
          • 0x124ca:$a3: get_timePasswordChanged
          • 0x125c5:$a4: get_passwordField
          • 0x126d4:$a5: set_encryptedPassword
          • 0x13d37:$a7: get_logins
          • 0x13c9a:$a10: KeyLoggerEventArgs
          • 0x13905:$a11: KeyLoggerEventArgsEventHandler
          15.2.rXcourOVPD.exe.3c228c0.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1a016:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x19248:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x1967b:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1a6ba:$a5: \Kometa\User Data\Default\Login Data
          15.2.rXcourOVPD.exe.3c228c0.1.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
          • 0x13293:$s1: UnHook
          • 0x1329a:$s2: SetHook
          • 0x132a2:$s3: CallNextHook
          • 0x132af:$s4: _hook
          15.2.rXcourOVPD.exe.3c228c0.1.unpackMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
          • 0x17660:$x1: $%SMTPDV$
          • 0x16044:$x2: $#TheHashHere%&
          • 0x17608:$x3: %FTPDV$
          • 0x15fe4:$x4: $%TelegramDv$
          • 0x13905:$x5: KeyLoggerEventArgs
          • 0x13c9a:$x5: KeyLoggerEventArgs
          • 0x1762c:$m2: Clipboard Logs ID
          • 0x1786a:$m2: Screenshot Logs ID
          • 0x1797a:$m2: keystroke Logs ID
          • 0x17c54:$m3: SnakePW
          • 0x17842:$m4: \SnakeKeylogger\
          Click to see the 43 entries

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7544, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", ProcessId: 7788, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7544, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", ProcessId: 7788, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmpAA33.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmpAA33.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\rXcourOVPD.exe, ParentImage: C:\Users\user\AppData\Roaming\rXcourOVPD.exe, ParentProcessId: 6576, ParentProcessName: rXcourOVPD.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmpAA33.tmp", ProcessId: 7200, ProcessName: schtasks.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7544, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp", ProcessId: 8048, ProcessName: schtasks.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7544, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", ProcessId: 7788, ProcessName: powershell.exe

          Persistence and Installation Behavior

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7544, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp", ProcessId: 8048, ProcessName: schtasks.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-13T17:58:05.204248+010028033053Unknown Traffic192.168.2.1149725172.67.177.134443TCP
          2024-12-13T17:58:07.597260+010028033053Unknown Traffic192.168.2.1149733172.67.177.134443TCP
          2024-12-13T17:58:10.858250+010028033053Unknown Traffic192.168.2.1149747172.67.177.134443TCP
          2024-12-13T17:58:25.280469+010028033053Unknown Traffic192.168.2.1149797172.67.177.134443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-13T17:58:01.232447+010028032742Potentially Bad Traffic192.168.2.1149711132.226.8.16980TCP
          2024-12-13T17:58:03.638572+010028032742Potentially Bad Traffic192.168.2.1149711132.226.8.16980TCP
          2024-12-13T17:58:03.716713+010028032742Potentially Bad Traffic192.168.2.1149718132.226.8.16980TCP
          2024-12-13T17:58:05.966712+010028032742Potentially Bad Traffic192.168.2.1149718132.226.8.16980TCP
          2024-12-13T17:58:07.451077+010028032742Potentially Bad Traffic192.168.2.1149732132.226.8.16980TCP
          2024-12-13T17:58:09.216680+010028032742Potentially Bad Traffic192.168.2.1149740132.226.8.16980TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000014.00000002.3762642230.0000000002A91000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7329625827:AAFusOMtNxAA4AfTt7YzeN1zaE4Sm-WxFiw/sendMessage?chat_id=8096159140", "Token": "7329625827:AAFusOMtNxAA4AfTt7YzeN1zaE4Sm-WxFiw", "Chat_id": "8096159140", "Version": "5.1"}
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeReversingLabs: Detection: 78%
          Source: file.exeReversingLabs: Detection: 78%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeJoe Sandbox ML: detected
          Source: file.exeJoe Sandbox ML: detected

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.11:49719 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.11:49726 version: TLS 1.0
          Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0B3FAFE9h4_2_0B3FA9A6
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 02BFFA39h14_2_02BFF778
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 02BFE61Fh14_2_02BFE431
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 02BFEFA9h14_2_02BFE431
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_02BFD7F0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 059615D8h14_2_05961506
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 05961011h14_2_05960D60
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596D011h14_2_0596CD68
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596F729h14_2_0596F480
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596C761h14_2_0596C4B8
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 05960751h14_2_059604A0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596BEB1h14_2_0596BC08
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596BA59h14_2_0596B7B0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596B1A9h14_2_0596AF00
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596EA21h14_2_0596E778
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596E171h14_2_0596DEC8
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596D8C1h14_2_0596D618
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 059615D8h14_2_059611B0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 059615D8h14_2_059611C0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596D469h14_2_0596D1C0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596CBB9h14_2_0596C910
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 05960BB1h14_2_05960900
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596FB81h14_2_0596F8D8
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596F2D1h14_2_0596F028
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 059602F1h14_2_05960040
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596C309h14_2_0596C060
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596EE79h14_2_0596EBD0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596E5C9h14_2_0596E320
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596B601h14_2_0596B358
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 0596DD19h14_2_0596DA70
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A47BF5h14_2_06A478B8
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A44A39h14_2_06A44790
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A46A01h14_2_06A46758
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A45741h14_2_06A45498
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A40741h14_2_06A40498
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A47709h14_2_06A47460
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A45FF1h14_2_06A45D48
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A46E59h14_2_06A46BB0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A44E91h14_2_06A44BE8
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A445B9h14_2_06A44310
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A45B99h14_2_06A458F0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A40B99h14_2_06A408F0
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A472B1h14_2_06A47008
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A402E9h14_2_06A40040
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A452E9h14_2_06A45040
          Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 06A46473h14_2_06A461C8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 0B7D0BA9h15_2_0B7D0566
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 00E4E61Fh20_2_00E4E431
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 00E4EFA9h20_2_00E4E431
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 00E4FA39h20_2_00E4F778
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_00E4E005
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_00E4D7F0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_00E4DE23
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05037BF5h20_2_050378B8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05035FF1h20_2_05035D48
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05037709h20_2_05037460
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05035741h20_2_05035498
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05030741h20_2_05030498
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05036A01h20_2_05036758
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05034A39h20_2_05034790
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05036473h20_2_050361C8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 050372B1h20_2_05037008
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 050302E9h20_2_05030040
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 050352E9h20_2_05035040
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05035B99h20_2_050358F0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05030B99h20_2_050308F0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 050345B9h20_2_05034310
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05036E59h20_2_05036BB0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 4x nop then jmp 05034E91h20_2_05034BE8

          Networking

          barindex
          Source: Yara matchFile source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPE
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
          Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49740 -> 132.226.8.169:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49718 -> 132.226.8.169:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49732 -> 132.226.8.169:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49711 -> 132.226.8.169:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49733 -> 172.67.177.134:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49725 -> 172.67.177.134:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49797 -> 172.67.177.134:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49747 -> 172.67.177.134:443
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.11:49719 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.11:49726 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: file.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E0C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B5C000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: file.exe, 0000000E.00000002.3761812258.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E0C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002ED5000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E00000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C25000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B5C000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B9E000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: file.exe, 0000000E.00000002.3761812258.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: file.exe, 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, rXcourOVPD.exe, 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: file.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E24000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 0000000F.00000002.1391876242.0000000002B30000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: file.exe, 0000000E.00000002.3761812258.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E0C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B5C000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B9E000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: file.exe, 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E0C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, rXcourOVPD.exe, 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: file.exe, 0000000E.00000002.3761812258.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B9E000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
          Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
          Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
          Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443

          System Summary

          barindex
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: file.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: file.exe PID: 7544, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: file.exe PID: 6176, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: file.exe PID: 6176, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: rXcourOVPD.exe PID: 6576, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: rXcourOVPD.exe PID: 6576, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_024BDD144_2_024BDD14
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04AC76C84_2_04AC76C8
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04AC00064_2_04AC0006
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04AC00404_2_04AC0040
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04AC76B84_2_04AC76B8
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9E1904_2_04B9E190
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_068403C84_2_068403C8
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_068427284_2_06842728
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0692A2504_2_0692A250
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0692A2404_2_0692A240
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0692C3804_2_0692C380
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_06929E184_2_06929E18
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_06929E094_2_06929E09
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0692BA504_2_0692BA50
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_069299E04_2_069299E0
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_077A37104_2_077A3710
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_077AA6E84_2_077AA6E8
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_077A0D464_2_077A0D46
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_077A00404_2_077A0040
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_077AA6C14_2_077AA6C1
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B345E404_2_0B345E40
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B34DEB04_2_0B34DEB0
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B348CB84_2_0B348CB8
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B34EB314_2_0B34EB31
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B34DEB04_2_0B34DEB0
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B3F00404_2_0B3F0040
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B3F75904_2_0B3F7590
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B3F00404_2_0B3F0040
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFB32814_2_02BFB328
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFC19014_2_02BFC190
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BF610814_2_02BF6108
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BF97E814_2_02BF97E8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFF77814_2_02BFF778
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFC75314_2_02BFC753
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFE43114_2_02BFE431
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFC47014_2_02BFC470
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BF4AD914_2_02BF4AD9
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFCA3314_2_02BFCA33
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFBBB814_2_02BFBBB8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BF688014_2_02BF6880
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFBEB014_2_02BFBEB0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFD7F014_2_02BFD7F0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFD7E014_2_02BFD7E0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BFB4F314_2_02BFB4F3
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_02BF357314_2_02BF3573
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596758814_2_05967588
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05967E7814_2_05967E78
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596328814_2_05963288
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05966DF714_2_05966DF7
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05960D5014_2_05960D50
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596CD5814_2_0596CD58
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05960D6014_2_05960D60
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596CD6814_2_0596CD68
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596049114_2_05960491
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596F48014_2_0596F480
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596C4B814_2_0596C4B8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_059604A014_2_059604A0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596C4A814_2_0596C4A8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596BC0814_2_0596BC08
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596F47114_2_0596F471
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596B7B014_2_0596B7B0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596B7A014_2_0596B7A0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_059677A814_2_059677A8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596AF0014_2_0596AF00
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596E77814_2_0596E778
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596E76814_2_0596E768
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596DEB814_2_0596DEB8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596DEC814_2_0596DEC8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596AEEF14_2_0596AEEF
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596D61814_2_0596D618
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05966E0014_2_05966E00
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596D60914_2_0596D609
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05967E2A14_2_05967E2A
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596D1B014_2_0596D1B0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596D1C014_2_0596D1C0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596C91014_2_0596C910
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596C90314_2_0596C903
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596090014_2_05960900
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596F8D814_2_0596F8D8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596F8C914_2_0596F8C9
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_059608F014_2_059608F0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596F01814_2_0596F018
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596000614_2_05960006
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596F02814_2_0596F028
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596C05014_2_0596C050
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596004014_2_05960040
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596C06014_2_0596C060
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596EBD014_2_0596EBD0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596EBC114_2_0596EBC1
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596BBF814_2_0596BBF8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596E31014_2_0596E310
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596E32014_2_0596E320
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596B35814_2_0596B358
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596B34814_2_0596B348
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596DA7014_2_0596DA70
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596327814_2_05963278
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_0596DA6314_2_0596DA63
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4A6B014_2_06A4A6B0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A47EB314_2_06A47EB3
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4BFE814_2_06A4BFE8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A48D8014_2_06A48D80
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4AD0014_2_06A4AD00
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A40D4814_2_06A40D48
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A49A1814_2_06A49A18
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A493D014_2_06A493D0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4B35014_2_06A4B350
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A478B814_2_06A478B8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4A06014_2_06A4A060
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4B9A014_2_06A4B9A0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4A6A314_2_06A4A6A3
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4478314_2_06A44783
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4479014_2_06A44790
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A46FFB14_2_06A46FFB
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4BFD814_2_06A4BFD8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A47F0014_2_06A47F00
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4674814_2_06A46748
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4675814_2_06A46758
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4048814_2_06A40488
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4548B14_2_06A4548B
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4549814_2_06A45498
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4049814_2_06A40498
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4ACF014_2_06A4ACF0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4746014_2_06A47460
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4745014_2_06A47450
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A435A814_2_06A435A8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A40D3914_2_06A40D39
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A45D3B14_2_06A45D3B
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A48D7014_2_06A48D70
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A45D4814_2_06A45D48
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A49A0714_2_06A49A07
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A46BA014_2_06A46BA0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A46BB014_2_06A46BB0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A44BE814_2_06A44BE8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A493C014_2_06A493C0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A44BD814_2_06A44BD8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4430014_2_06A44300
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4431014_2_06A44310
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4B34014_2_06A4B340
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A428A814_2_06A428A8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A478A814_2_06A478A8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A458E014_2_06A458E0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A408E114_2_06A408E1
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A458F014_2_06A458F0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A408F014_2_06A408F0
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4503314_2_06A45033
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4000714_2_06A40007
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4700814_2_06A47008
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4004014_2_06A40040
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4504014_2_06A45040
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4A05014_2_06A4A050
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A461B814_2_06A461B8
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4B99B14_2_06A4B99B
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A461C814_2_06A461C8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_028FDD1415_2_028FDD14
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_050B76C815_2_050B76C8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_050B000615_2_050B0006
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_050B004015_2_050B0040
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_050B76B815_2_050B76B8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_050B5A5215_2_050B5A52
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06F303C815_2_06F303C8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06F3272815_2_06F32728
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06FFA25015_2_06FFA250
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06FFA24015_2_06FFA240
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06FFC38015_2_06FFC380
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06FF9E1815_2_06FF9E18
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06FF9E0915_2_06FF9E09
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06FFBA5015_2_06FFBA50
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_06FF99E015_2_06FF99E0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 15_2_0B7D245815_2_0B7D2458
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4C19020_2_00E4C190
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4610820_2_00E46108
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4B32820_2_00E4B328
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4C47020_2_00E4C470
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4E43120_2_00E4E431
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E497E820_2_00E497E8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4F77820_2_00E4F778
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4C75320_2_00E4C753
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4673020_2_00E46730
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E44AD920_2_00E44AD9
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4CA3320_2_00E4CA33
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4BBB820_2_00E4BBB8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4BEB020_2_00E4BEB0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4B4F320_2_00E4B4F3
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4357320_2_00E43573
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4D7E020_2_00E4D7E0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_00E4D7F020_2_00E4D7F0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503AD0020_2_0503AD00
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05030D4820_2_05030D48
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05038D8020_2_05038D80
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503BFE820_2_0503BFE8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05037E0820_2_05037E08
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503A6B020_2_0503A6B0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503B9A020_2_0503B9A0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503A06020_2_0503A060
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050378B820_2_050378B8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503B35020_2_0503B350
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050393D020_2_050393D0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05039A1820_2_05039A18
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05035D3B20_2_05035D3B
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05030D3920_2_05030D39
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05035D4820_2_05035D48
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05038D6F20_2_05038D6F
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050335A820_2_050335A8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503745020_2_05037450
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503746020_2_05037460
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503548B20_2_0503548B
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503048820_2_05030488
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503549820_2_05035498
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503049820_2_05030498
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503ACF020_2_0503ACF0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05037F0020_2_05037F00
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503674720_2_05036747
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503675820_2_05036758
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503478320_2_05034783
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503479020_2_05034790
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503BFD820_2_0503BFD8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05036FFC20_2_05036FFC
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503A6A220_2_0503A6A2
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503B99120_2_0503B991
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503B99B20_2_0503B99B
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050361B820_2_050361B8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050361C820_2_050361C8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503000620_2_05030006
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503700820_2_05037008
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503503320_2_05035033
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503004020_2_05030040
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503504020_2_05035040
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503A05020_2_0503A050
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050328A820_2_050328A8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050378A820_2_050378A8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050308E120_2_050308E1
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050358E020_2_050358E0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050358F020_2_050358F0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050308F020_2_050308F0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503430020_2_05034300
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503431020_2_05034310
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_0503B34020_2_0503B340
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05036BA020_2_05036BA0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05036BB020_2_05036BB0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_050393C020_2_050393C0
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05034BD820_2_05034BD8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05034BE820_2_05034BE8
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_05039A0720_2_05039A07
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeCode function: 20_2_055F8A0C20_2_055F8A0C
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\rXcourOVPD.exe 1D409E94B935C68A4B4841A1B2E05C6ABF1EA827C419EAB8BF3EE23229574160
          Source: file.exe, 00000004.00000002.1360884679.00000000067CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.E vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorlib.dllT vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $_q,\\StringFileInfo\\040904B0\\OriginalFilename vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedaDgl.exe" vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $_q,\\StringFileInfo\\000004B0\\OriginalFilename vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Windows.Forms.dllT vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.dllT vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Drawing.dllT vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Configuration.dllT vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Core.dllT vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Xml.dllT vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.VisualBasic.DLLT vs file.exe
          Source: file.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs file.exe
          Source: file.exe, 00000004.00000002.1361185726.0000000006B80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs file.exe
          Source: file.exe, 00000004.00000002.1360656745.0000000006720000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs file.exe
          Source: file.exe, 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs file.exe
          Source: file.exe, 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs file.exe
          Source: file.exe, 00000004.00000002.1358186546.0000000003729000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs file.exe
          Source: file.exe, 00000004.00000000.1283506304.0000000000192000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamedaDgl.exe" vs file.exe
          Source: file.exe, 00000004.00000002.1356112223.00000000008EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
          Source: file.exe, 0000000E.00000002.3758482219.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs file.exe
          Source: file.exe, 0000000E.00000002.3758725117.0000000000F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dll] vs file.exe
          Source: file.exeBinary or memory string: OriginalFilenamedaDgl.exe" vs file.exe
          Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: file.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: file.exe PID: 7544, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: file.exe PID: 6176, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: file.exe PID: 6176, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: rXcourOVPD.exe PID: 6576, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: rXcourOVPD.exe PID: 6576, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: rXcourOVPD.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 4.2.file.exe.37f17a0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 4.2.file.exe.38117c0.0.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 4.2.file.exe.38117c0.0.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 4.2.file.exe.38117c0.0.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 4.2.file.exe.38117c0.0.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, Gu3LccITshv3oFDMFh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 4.2.file.exe.6b80000.5.raw.unpack, TLLCCEdYsihF24ts6B.csSecurity API names: _0020.SetAccessControl
          Source: 4.2.file.exe.6b80000.5.raw.unpack, TLLCCEdYsihF24ts6B.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 4.2.file.exe.6b80000.5.raw.unpack, TLLCCEdYsihF24ts6B.csSecurity API names: _0020.AddAccessRule
          Source: 4.2.file.exe.38e3958.2.raw.unpack, TLLCCEdYsihF24ts6B.csSecurity API names: _0020.SetAccessControl
          Source: 4.2.file.exe.38e3958.2.raw.unpack, TLLCCEdYsihF24ts6B.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 4.2.file.exe.38e3958.2.raw.unpack, TLLCCEdYsihF24ts6B.csSecurity API names: _0020.AddAccessRule
          Source: 4.2.file.exe.38e3958.2.raw.unpack, Gu3LccITshv3oFDMFh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@22/15@2/2
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\rXcourOVPD.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMutant created: \Sessions\1\BaseNamedObjects\IgoEEBVqTtvyFLIsavSVbgG
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7176:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8028:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7800:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8072:120:WilError_03
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9DEF.tmpJump to behavior
          Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: file.exe, 0000000E.00000002.3761812258.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002FCD000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F9A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3765060536.0000000003DD2000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F7C000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002CDB000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002CCB000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002D1D000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3765693270.0000000003B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: file.exeReversingLabs: Detection: 78%
          Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp"
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe C:\Users\user\AppData\Roaming\rXcourOVPD.exe
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmpAA33.tmp"
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmpAA33.tmp"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: iconcodecservice.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: iconcodecservice.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: mscoree.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: kernel.appcore.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: version.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: uxtheme.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: windows.storage.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: wldp.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: profapi.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: cryptsp.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: rsaenh.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: cryptbase.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: rasapi32.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: rasman.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: rtutils.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: mswsock.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: winhttp.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: ondemandconnroutehelper.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: iphlpapi.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: dhcpcsvc6.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: dhcpcsvc.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: dnsapi.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: winnsi.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: rasadhlp.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: fwpuclnt.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: secur32.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: sspicli.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: schannel.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: mskeyprotect.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: ntasn1.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: ncrypt.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: ncryptsslp.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: msasn1.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: gpapi.dll
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeSection loaded: dpapi.dll
          Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: 4.2.file.exe.6b80000.5.raw.unpack, TLLCCEdYsihF24ts6B.cs.Net Code: cXTGuykCBp System.Reflection.Assembly.Load(byte[])
          Source: 4.2.file.exe.38e3958.2.raw.unpack, TLLCCEdYsihF24ts6B.cs.Net Code: cXTGuykCBp System.Reflection.Assembly.Load(byte[])
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B93064 push ss; ret 4_2_04B952E6
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9D470 push ebx; ret 4_2_04B9D47E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9F560 push esp; ret 4_2_04B9F56E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B950A9 push ss; ret 4_2_04B950AE
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9F190 pushad ; ret 4_2_04B9F19E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B98220 push eax; mov dword ptr [esp], ecx4_2_04B98224
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9D211 push eax; ret 4_2_04B9D21E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B98210 push eax; mov dword ptr [esp], ecx4_2_04B98224
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9F209 push ebp; ret 4_2_04B9F216
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9F3CF push esp; ret 4_2_04B9F3E6
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9D330 push eax; ret 4_2_04B9D33E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B98D01 push eax; ret 4_2_04B98D33
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9DE30 push esp; ret 4_2_04B9DE39
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B94E20 push cs; ret 4_2_04B94E26
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9EFF1 pushad ; ret 4_2_04B9EFFE
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9EA19 push ebp; ret 4_2_04B9EA26
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9DA10 push eax; ret 4_2_04B9DA1E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_04B9EB77 push ebp; ret 4_2_04B9EB86
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0684965F push eax; ret 4_2_0684966E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_06849730 push eax; ret 4_2_0684975E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0684E18A push eax; retf 4_2_0684E1A9
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0684F8E0 push edi; iretd 4_2_0684F8E6
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_077A6661 push dword ptr [edi+08418B06h]; ret 4_2_077A6673
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B34F978 push es; ret 4_2_0B34F987
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B3495A0 push es; ret 4_2_0B3495AE
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B3495DB push es; ret 4_2_0B3495E6
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B3F213F push es; ret 4_2_0B3F215E
          Source: C:\Users\user\Desktop\file.exeCode function: 4_2_0B3F2130 push es; ret 4_2_0B3F215E
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05962EFB pushad ; iretd 14_2_05962F01
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05962890 push eax; retf 14_2_05962891
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_06A4DA21 push esp; iretd 14_2_06A4DA35
          Source: file.exeStatic PE information: section name: .text entropy: 7.595806466843068
          Source: rXcourOVPD.exe.4.drStatic PE information: section name: .text entropy: 7.595806466843068
          Source: 4.2.file.exe.6b80000.5.raw.unpack, f2bIYw5HsYatqje517.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'vOcBW482my', 'BswBDXLDQs', 'MUgBztGMWj', 'QVP9Rv8cOH', 'gyE9URdmUo', 'akI9B2hWtN', 'kQQ990G6um', 'IhIZlVDaCViN61ZRAND'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, TLLCCEdYsihF24ts6B.csHigh entropy of concatenated method names: 'rwk9vxgDYI', 'efK9buOLdt', 'ph99TMQtUf', 'J9h95XNyMK', 'o7T9KvniEF', 'Nkk96DnLWY', 'zIi9ifk7rm', 'ufc9d6uIMy', 'Y0E9ArjySW', 'dMT9HkJuBR'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, WXQhAuTtwVUMKNvKl0.csHigh entropy of concatenated method names: 'Dispose', 'tohUWFxhA1', 'h2VBqlhHAE', 'r7UDktkXVS', 'SmiUDsm7mK', 'nAZUzVP9Eu', 'ProcessDialogKey', 'Y7bBRPgQQj', 'PWNBUJgZKm', 'OvfBBIikgd'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, aD3FN2Fse7siwHW4tW.csHigh entropy of concatenated method names: 'elWibIcqTB', 'gpli53ToUr', 'orei6u96Ag', 'o886DdrlUt', 'Goy6zPQaCV', 'pUciRSpdDP', 'gbJiUNX9fP', 'HoAiBjuxPl', 'RsXi9RTywQ', 'o8CiG1rbJk'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, H1wHKjUG7C2enf6PVRU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'BEf3nDXkex', 'JXf3Qjs8tt', 'iNK3SZKRP8', 'dxa3379yvC', 'xDZ3xen5lM', 'BTk3hjL3iF', 'BdV3yFBpiU'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, DikgdCDkjxIte2PlHA.csHigh entropy of concatenated method names: 'aKZQ5BH09l', 'z1MQKX7PC7', 'wpqQ6JFnhp', 'Dk5QiPNB12', 'm67QnngKeX', 'n7GQdmLCVY', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, YKaaB7sFnGxbxImEpX.csHigh entropy of concatenated method names: 'Rd5KLWbMGU', 'SeKKor1jA9', 'svT5cwEIu5', 'ePQ5rO0j00', 'MaK5EnBExi', 'pBx54Cuu6k', 'lTB5FWTRc6', 'xRW5ks4jX2', 'IpW5wbXKVH', 'pCl58QnJaH'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, ejZIv3204H9gEM16dT.csHigh entropy of concatenated method names: 'zgUp84NEvi', 'Bh2pjF2GwB', 'KQkp2LGQoO', 'KYApM0pPIj', 'Bqfpq55uDo', 'J9vpcd9J8k', 'kavprkWBHd', 'Ah3pEl0pIw', 'a7xp4bYg4l', 'ytmpFP10Nd'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, Clabo97eqthAWGxWJ3.csHigh entropy of concatenated method names: 'klJ5JE660y', 'L7t5ZD8JDd', 'MIl5IlCAs8', 'qTW57ZCC17', 'MHd5pPcxNQ', 'HZA5esIYjg', 'vU95aB8eIm', 'sZw5l6hokB', 'TrQ5nfqBT1', 'F1F5QdU8En'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, fPgQQjWjWNJgZKmmvf.csHigh entropy of concatenated method names: 'f6unXMGCpb', 'scwnqTrwjp', 'CtrncYRQNK', 'LvAnrBP5qp', 'NuTnEC91R3', 'ymxn4Yn7FN', 'SeRnFa6VLI', 'V9WnkN9kZG', 'yQRnwVuxyh', 'zeMn81gl2Q'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, afGEjvURtp2vPLdIck5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SaJQmG0UPF', 'zX6QjRQPdA', 'wkTQtLgP4n', 'M97Q2scW3P', 'yEeQMFBRlO', 'AGmQVAFXA2', 'P88QCQbXTg'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, DAU8UcGBhxVOQThrt9.csHigh entropy of concatenated method names: 'OlqUiu3Lcc', 'gshUdv3oFD', 'deqUHthAWG', 'vWJUP3DKaa', 'DmEUppXJdP', 'udDUe1HF84', 'hNsYoKNjxgswTbOBb8', 'MjYpE7BfDyWwG9MUWd', 'loAUUC1Hv3', 'vK7U9idPiN'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, rqsGGKqqiMvyjqsarR.csHigh entropy of concatenated method names: 'rIr1S8X6WdKukH9IghR', 'mXIpxsXS9R6HbPjjOE2', 'SyE6lSafZU', 'pKP6nbg3yK', 'AwE6QLMURO', 'nIvQl3X9DeEKFWdu4Wm', 'rAk89UXyxYthlNoB5Js'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, AdP3dDX1HF845moAt1.csHigh entropy of concatenated method names: 'W7a6v02nar', 'G8K6TVA7xb', 'U5G6K3gaP5', 'mlK6iW1tnj', 'G6J6ddL1Jl', 'kRxKfqPDIJ', 'dWqK0eIWDG', 'MSkKNAy1CR', 'lFgKOd3SEB', 'VhjKWPmtrr'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, wJScZWV5dIbfbnZf6F.csHigh entropy of concatenated method names: 'ToString', 'uq4emPVxi8', 'MxXeq9Y68P', 'bqmec0Ur0b', 'QBjer45b81', 'WE3eEDh4bo', 'sIfe44KBek', 'jFMeFnHdlu', 'eBRekfqAT7', 'dywewk8OZi'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, lPmUAfzqLScwnGQDWH.csHigh entropy of concatenated method names: 'GDJQZKDFOD', 'BpTQIjSpSZ', 'Aq2Q71PAWs', 'bw9QXZgOHM', 'aVFQqx9XRN', 'K3cQrycfD3', 'cHqQE06Sxb', 'HOdQygyPFr', 'PitQ1i1R6s', 'FWEQYW4mAl'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, TlidgCUUD0JX3EXUMrO.csHigh entropy of concatenated method names: 'SGgQDmUhGQ', 'FpjQzE1YYS', 'cTgSR44xqp', 'yEgSUShtJ8', 'UG1SBU4pSa', 'wyGS91wdFd', 'Dy8SG7oYKb', 'IDTSvsoiJQ', 'loaSbT5Hv6', 'gHPST6rGmy'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, Gu3LccITshv3oFDMFh.csHigh entropy of concatenated method names: 'bjdT26vupF', 'onGTMZk25O', 'H8RTVS5c6B', 'Eq9TCry0Gw', 'UrRTfwZJyZ', 'BSjT0f7yiN', 'dbHTNkr1yj', 'sHkTOytoN2', 'aNOTWSPDge', 'bIPTDmQ56A'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, CR3bRGBCAmZgaoaiBv.csHigh entropy of concatenated method names: 'UoDuNy0lO', 'IAHJWf8HZ', 'GYvZmSLPC', 'dPRoEkR4n', 'cb37BrdWR', 'yeis8DD8i', 'EVjAhIU9IPwtyZCmbJ', 'lPwWLtPb22pUHUbsfm', 'Pp1lP0MNH', 'vPkQvP6KS'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, XSXCsxt8MVV4UfkZJI.csHigh entropy of concatenated method names: 'WvkgIaQaIV', 'cHWg7NGqHW', 'ELhgXTKWEU', 'BbHgqvMgWk', 'z3igreS2OU', 'R9agEnlPRS', 'RlogFDeOFP', 'op7gkrjXfO', 'o6sg8VwNyo', 'h2wgmsuoFK'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, dab2jcN1RSohFxhA1V.csHigh entropy of concatenated method names: 'ayhnp6aoDY', 'ru8naPVIiD', 'fg9nnapXAb', 'tOlnSxbmqb', 'hRvnxnlroo', 'zdFnychQ2n', 'Dispose', 'tShlbfrIu7', 'hZxlTgmP2c', 'fSgl5vdmAO'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, vAa5gWwrVs4mA315dh.csHigh entropy of concatenated method names: 'sIqi1QwF6b', 'DFjiYdJthP', 'p5RiucQWeE', 'GStiJyYlOy', 'G99iLmO2Yh', 'Tc8iZHyW04', 'l2hioj3Y0x', 'VUtiItlRbN', 'Iufi7E8evp', 'ivOisKPtxL'
          Source: 4.2.file.exe.6b80000.5.raw.unpack, pg1UhnUByfQeqNVmatA.csHigh entropy of concatenated method names: 'ToString', 'PpiSIu1QY4', 'EcGS79IBuB', 'heOSs3yqi8', 'uSJSXB585Z', 'lEQSq7LHKy', 'KS3Sc6qjDS', 'MRUSrwLUpF', 't1iCnHaexdXkUWqWis1', 'jYxv1faFJ1mrTEtXeiw'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, f2bIYw5HsYatqje517.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'vOcBW482my', 'BswBDXLDQs', 'MUgBztGMWj', 'QVP9Rv8cOH', 'gyE9URdmUo', 'akI9B2hWtN', 'kQQ990G6um', 'IhIZlVDaCViN61ZRAND'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, TLLCCEdYsihF24ts6B.csHigh entropy of concatenated method names: 'rwk9vxgDYI', 'efK9buOLdt', 'ph99TMQtUf', 'J9h95XNyMK', 'o7T9KvniEF', 'Nkk96DnLWY', 'zIi9ifk7rm', 'ufc9d6uIMy', 'Y0E9ArjySW', 'dMT9HkJuBR'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, WXQhAuTtwVUMKNvKl0.csHigh entropy of concatenated method names: 'Dispose', 'tohUWFxhA1', 'h2VBqlhHAE', 'r7UDktkXVS', 'SmiUDsm7mK', 'nAZUzVP9Eu', 'ProcessDialogKey', 'Y7bBRPgQQj', 'PWNBUJgZKm', 'OvfBBIikgd'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, aD3FN2Fse7siwHW4tW.csHigh entropy of concatenated method names: 'elWibIcqTB', 'gpli53ToUr', 'orei6u96Ag', 'o886DdrlUt', 'Goy6zPQaCV', 'pUciRSpdDP', 'gbJiUNX9fP', 'HoAiBjuxPl', 'RsXi9RTywQ', 'o8CiG1rbJk'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, H1wHKjUG7C2enf6PVRU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'BEf3nDXkex', 'JXf3Qjs8tt', 'iNK3SZKRP8', 'dxa3379yvC', 'xDZ3xen5lM', 'BTk3hjL3iF', 'BdV3yFBpiU'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, DikgdCDkjxIte2PlHA.csHigh entropy of concatenated method names: 'aKZQ5BH09l', 'z1MQKX7PC7', 'wpqQ6JFnhp', 'Dk5QiPNB12', 'm67QnngKeX', 'n7GQdmLCVY', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, YKaaB7sFnGxbxImEpX.csHigh entropy of concatenated method names: 'Rd5KLWbMGU', 'SeKKor1jA9', 'svT5cwEIu5', 'ePQ5rO0j00', 'MaK5EnBExi', 'pBx54Cuu6k', 'lTB5FWTRc6', 'xRW5ks4jX2', 'IpW5wbXKVH', 'pCl58QnJaH'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, ejZIv3204H9gEM16dT.csHigh entropy of concatenated method names: 'zgUp84NEvi', 'Bh2pjF2GwB', 'KQkp2LGQoO', 'KYApM0pPIj', 'Bqfpq55uDo', 'J9vpcd9J8k', 'kavprkWBHd', 'Ah3pEl0pIw', 'a7xp4bYg4l', 'ytmpFP10Nd'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, Clabo97eqthAWGxWJ3.csHigh entropy of concatenated method names: 'klJ5JE660y', 'L7t5ZD8JDd', 'MIl5IlCAs8', 'qTW57ZCC17', 'MHd5pPcxNQ', 'HZA5esIYjg', 'vU95aB8eIm', 'sZw5l6hokB', 'TrQ5nfqBT1', 'F1F5QdU8En'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, fPgQQjWjWNJgZKmmvf.csHigh entropy of concatenated method names: 'f6unXMGCpb', 'scwnqTrwjp', 'CtrncYRQNK', 'LvAnrBP5qp', 'NuTnEC91R3', 'ymxn4Yn7FN', 'SeRnFa6VLI', 'V9WnkN9kZG', 'yQRnwVuxyh', 'zeMn81gl2Q'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, afGEjvURtp2vPLdIck5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SaJQmG0UPF', 'zX6QjRQPdA', 'wkTQtLgP4n', 'M97Q2scW3P', 'yEeQMFBRlO', 'AGmQVAFXA2', 'P88QCQbXTg'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, DAU8UcGBhxVOQThrt9.csHigh entropy of concatenated method names: 'OlqUiu3Lcc', 'gshUdv3oFD', 'deqUHthAWG', 'vWJUP3DKaa', 'DmEUppXJdP', 'udDUe1HF84', 'hNsYoKNjxgswTbOBb8', 'MjYpE7BfDyWwG9MUWd', 'loAUUC1Hv3', 'vK7U9idPiN'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, rqsGGKqqiMvyjqsarR.csHigh entropy of concatenated method names: 'rIr1S8X6WdKukH9IghR', 'mXIpxsXS9R6HbPjjOE2', 'SyE6lSafZU', 'pKP6nbg3yK', 'AwE6QLMURO', 'nIvQl3X9DeEKFWdu4Wm', 'rAk89UXyxYthlNoB5Js'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, AdP3dDX1HF845moAt1.csHigh entropy of concatenated method names: 'W7a6v02nar', 'G8K6TVA7xb', 'U5G6K3gaP5', 'mlK6iW1tnj', 'G6J6ddL1Jl', 'kRxKfqPDIJ', 'dWqK0eIWDG', 'MSkKNAy1CR', 'lFgKOd3SEB', 'VhjKWPmtrr'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, wJScZWV5dIbfbnZf6F.csHigh entropy of concatenated method names: 'ToString', 'uq4emPVxi8', 'MxXeq9Y68P', 'bqmec0Ur0b', 'QBjer45b81', 'WE3eEDh4bo', 'sIfe44KBek', 'jFMeFnHdlu', 'eBRekfqAT7', 'dywewk8OZi'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, lPmUAfzqLScwnGQDWH.csHigh entropy of concatenated method names: 'GDJQZKDFOD', 'BpTQIjSpSZ', 'Aq2Q71PAWs', 'bw9QXZgOHM', 'aVFQqx9XRN', 'K3cQrycfD3', 'cHqQE06Sxb', 'HOdQygyPFr', 'PitQ1i1R6s', 'FWEQYW4mAl'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, TlidgCUUD0JX3EXUMrO.csHigh entropy of concatenated method names: 'SGgQDmUhGQ', 'FpjQzE1YYS', 'cTgSR44xqp', 'yEgSUShtJ8', 'UG1SBU4pSa', 'wyGS91wdFd', 'Dy8SG7oYKb', 'IDTSvsoiJQ', 'loaSbT5Hv6', 'gHPST6rGmy'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, Gu3LccITshv3oFDMFh.csHigh entropy of concatenated method names: 'bjdT26vupF', 'onGTMZk25O', 'H8RTVS5c6B', 'Eq9TCry0Gw', 'UrRTfwZJyZ', 'BSjT0f7yiN', 'dbHTNkr1yj', 'sHkTOytoN2', 'aNOTWSPDge', 'bIPTDmQ56A'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, CR3bRGBCAmZgaoaiBv.csHigh entropy of concatenated method names: 'UoDuNy0lO', 'IAHJWf8HZ', 'GYvZmSLPC', 'dPRoEkR4n', 'cb37BrdWR', 'yeis8DD8i', 'EVjAhIU9IPwtyZCmbJ', 'lPwWLtPb22pUHUbsfm', 'Pp1lP0MNH', 'vPkQvP6KS'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, XSXCsxt8MVV4UfkZJI.csHigh entropy of concatenated method names: 'WvkgIaQaIV', 'cHWg7NGqHW', 'ELhgXTKWEU', 'BbHgqvMgWk', 'z3igreS2OU', 'R9agEnlPRS', 'RlogFDeOFP', 'op7gkrjXfO', 'o6sg8VwNyo', 'h2wgmsuoFK'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, dab2jcN1RSohFxhA1V.csHigh entropy of concatenated method names: 'ayhnp6aoDY', 'ru8naPVIiD', 'fg9nnapXAb', 'tOlnSxbmqb', 'hRvnxnlroo', 'zdFnychQ2n', 'Dispose', 'tShlbfrIu7', 'hZxlTgmP2c', 'fSgl5vdmAO'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, vAa5gWwrVs4mA315dh.csHigh entropy of concatenated method names: 'sIqi1QwF6b', 'DFjiYdJthP', 'p5RiucQWeE', 'GStiJyYlOy', 'G99iLmO2Yh', 'Tc8iZHyW04', 'l2hioj3Y0x', 'VUtiItlRbN', 'Iufi7E8evp', 'ivOisKPtxL'
          Source: 4.2.file.exe.38e3958.2.raw.unpack, pg1UhnUByfQeqNVmatA.csHigh entropy of concatenated method names: 'ToString', 'PpiSIu1QY4', 'EcGS79IBuB', 'heOSs3yqi8', 'uSJSXB585Z', 'lEQSq7LHKy', 'KS3Sc6qjDS', 'MRUSrwLUpF', 't1iCnHaexdXkUWqWis1', 'jYxv1faFJ1mrTEtXeiw'
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\rXcourOVPD.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp"

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
          Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 7544, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rXcourOVPD.exe PID: 6576, type: MEMORYSTR
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 2470000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 24F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 8A10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 73F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 9A10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: AA10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 2B90000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 2D40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: 4D40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: 28B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: 2AF0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: 2930000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: 8770000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: 9770000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: 9960000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: A960000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: E00000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: 2A90000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory allocated: 28A0000 memory reserve | memory write watch
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599765Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599546Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599328Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599217Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599099Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598968Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598847Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598718Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598609Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598500Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598390Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598281Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598171Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598062Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597953Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597843Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597734Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597625Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597515Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597405Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597296Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597187Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597078Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596968Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596859Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596749Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596640Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596531Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596421Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596312Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596203Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596093Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595984Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595875Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595765Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595656Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595546Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595437Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595326Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595218Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595109Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594988Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594859Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594749Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594640Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594531Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 600000
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599875
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599765
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599656
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599547
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599433
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599328
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599218
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599108
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599000
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598890
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598777
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598671
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598561
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598452
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598343
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598234
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598124
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598015
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597906
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597797
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597687
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597578
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597468
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597357
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597250
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597140
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597027
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596922
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596806
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596687
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596578
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596468
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596359
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596250
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596140
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596014
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595906
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595796
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595687
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595578
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595468
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595359
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595250
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595140
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595028
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 594922
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 594812
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 594703
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 594593
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6200Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3596Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8230Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1077Jump to behavior
          Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1868Jump to behavior
          Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 7988Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeWindow / User API: threadDelayed 8284
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeWindow / User API: threadDelayed 1583
          Source: C:\Users\user\Desktop\file.exe TID: 7592Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7920Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6572Thread sleep time: -4611686018427385s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8116Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep count: 31 > 30Jump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -28592453314249787s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -599875s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 7820Thread sleep count: 1868 > 30Jump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 7820Thread sleep count: 7988 > 30Jump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -599765s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -599656s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -599546s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -599437s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -599328s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -599217s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -599099s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598968s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598847s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598718s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598609s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598500s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598390s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598281s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598171s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -598062s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597953s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597843s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597734s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597625s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597515s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597405s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597296s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597187s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -597078s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596968s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596859s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596749s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596640s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596531s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596421s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596312s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596203s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -596093s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595984s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595875s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595765s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595656s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595546s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595437s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595326s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595218s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -595109s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -594988s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -594859s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -594749s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -594640s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\file.exe TID: 3308Thread sleep time: -594531s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7156Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -23980767295822402s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -600000s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599875s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7848Thread sleep count: 8284 > 30
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7848Thread sleep count: 1583 > 30
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599765s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599656s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599547s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599433s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599328s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599218s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599108s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -599000s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598890s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598777s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598671s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598561s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598452s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598343s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598234s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598124s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -598015s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597906s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597797s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597687s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597578s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597468s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597357s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597250s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597140s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -597027s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596922s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596806s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596687s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596578s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596468s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596359s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596250s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596140s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -596014s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595906s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595796s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595687s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595578s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595468s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595359s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595250s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595140s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -595028s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -594922s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -594812s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -594703s >= -30000s
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exe TID: 7844Thread sleep time: -594593s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599765Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599546Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599328Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599217Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 599099Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598968Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598847Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598718Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598609Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598500Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598390Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598281Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598171Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 598062Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597953Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597843Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597734Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597625Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597515Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597405Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597296Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597187Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 597078Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596968Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596859Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596749Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596640Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596531Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596421Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596312Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596203Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 596093Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595984Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595875Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595765Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595656Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595546Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595437Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595326Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595218Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 595109Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594988Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594859Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594749Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594640Jump to behavior
          Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 594531Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 600000
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599875
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599765
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599656
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599547
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599433
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599328
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599218
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599108
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 599000
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598890
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598777
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598671
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598561
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598452
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598343
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598234
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598124
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 598015
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597906
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597797
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597687
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597578
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597468
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597357
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597250
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597140
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 597027
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596922
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596806
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596687
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596578
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596468
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596359
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596250
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596140
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 596014
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595906
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595796
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595687
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595578
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595468
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595359
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595250
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595140
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 595028
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 594922
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 594812
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 594703
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeThread delayed: delay time: 594593
          Source: file.exe, 0000000E.00000002.3758725117.0000000000F76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllR
          Source: rXcourOVPD.exe, 00000014.00000002.3758152325.0000000000B36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeCode function: 14_2_05967588 LdrInitializeThunk,14_2_05967588
          Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeMemory written: C:\Users\user\AppData\Roaming\rXcourOVPD.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmpAA33.tmp"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeProcess created: C:\Users\user\AppData\Roaming\rXcourOVPD.exe "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"Jump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Users\user\AppData\Roaming\rXcourOVPD.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Users\user\AppData\Roaming\rXcourOVPD.exe VolumeInformation
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000014.00000002.3762642230.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3761812258.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.3762642230.0000000002A91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3761812258.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 7544, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 6176, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rXcourOVPD.exe PID: 6576, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rXcourOVPD.exe PID: 6976, type: MEMORYSTR
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
          Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
          Source: C:\Users\user\AppData\Roaming\rXcourOVPD.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c228c0.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.38117c0.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c028a0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.37f17a0.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.file.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c228c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.rXcourOVPD.exe.3c028a0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.37f17a0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.file.exe.38117c0.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000014.00000002.3762642230.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3761812258.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.3762642230.0000000002A91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.3761812258.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 7544, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 6176, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rXcourOVPD.exe PID: 6576, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rXcourOVPD.exe PID: 6976, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          111
          Process Injection
          1
          Masquerading
          1
          OS Credential Dumping
          1
          Query Registry
          Remote Services1
          Email Collection
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Scheduled Task/Job
          11
          Disable or Modify Tools
          LSASS Memory11
          Security Software Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          31
          Virtualization/Sandbox Evasion
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin Shares1
          Data from Local System
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Process Injection
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
          Obfuscated Files or Information
          Cached Domain Credentials1
          System Network Configuration Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
          Software Packing
          DCSync1
          File and Directory Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem13
          System Information Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574874 Sample: file.exe Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 48 reallyfreegeoip.org 2->48 50 checkip.dyndns.org 2->50 52 checkip.dyndns.com 2->52 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Sigma detected: Scheduled temp file as task from temp location 2->62 66 8 other signatures 2->66 8 file.exe 7 2->8         started        12 rXcourOVPD.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 48->64 process4 file5 40 C:\Users\user\AppData\...\rXcourOVPD.exe, PE32 8->40 dropped 42 C:\Users\...\rXcourOVPD.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmp9DEF.tmp, XML 8->44 dropped 46 C:\Users\user\AppData\Local\...\file.exe.log, ASCII 8->46 dropped 68 Uses schtasks.exe or at.exe to add and modify task schedules 8->68 70 Adds a directory exclusion to Windows Defender 8->70 72 Injects a PE file into a foreign processes 8->72 14 file.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 21 8->20         started        22 schtasks.exe 1 8->22         started        74 Multi AV Scanner detection for dropped file 12->74 76 Machine Learning detection for dropped file 12->76 24 rXcourOVPD.exe 12->24         started        26 schtasks.exe 12->26         started        28 rXcourOVPD.exe 12->28         started        30 rXcourOVPD.exe 12->30         started        signatures6 process7 dnsIp8 54 checkip.dyndns.com 132.226.8.169, 49711, 49718, 49732 UTMEMUS United States 14->54 56 reallyfreegeoip.org 172.67.177.134, 443, 49719, 49725 CLOUDFLARENETUS United States 14->56 78 Loading BitLocker PowerShell Module 18->78 32 conhost.exe 18->32         started        34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        80 Tries to steal Mail credentials (via file / registry access) 24->80 82 Tries to harvest and steal browser information (history, passwords, etc) 24->82 38 conhost.exe 26->38         started        signatures9 process10

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          file.exe79%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          file.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\rXcourOVPD.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\rXcourOVPD.exe79%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          reallyfreegeoip.org
          172.67.177.134
          truefalse
            high
            checkip.dyndns.com
            132.226.8.169
            truefalse
              high
              checkip.dyndns.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/false
                  high
                  https://reallyfreegeoip.org/xml/8.46.123.189false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgfile.exe, 0000000E.00000002.3761812258.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E0C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B5C000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B9E000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://checkip.dyndns.orgfile.exe, 0000000E.00000002.3761812258.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E0C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002ED5000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E00000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C25000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B5C000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B9E000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.comfile.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E0C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B5C000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000004.00000002.1357596328.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 0000000F.00000002.1391876242.0000000002B30000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002A91000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qfile.exe, 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, rXcourOVPD.exe, 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://reallyfreegeoip.org/xml/8.46.123.189$file.exe, 0000000E.00000002.3761812258.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B9E000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgfile.exe, 0000000E.00000002.3761812258.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E24000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002EF5000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C17000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002C44000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/file.exe, 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3761812258.0000000002E0C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, rXcourOVPD.exe, 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, rXcourOVPD.exe, 00000014.00000002.3762642230.0000000002B5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    132.226.8.169
                                    checkip.dyndns.comUnited States
                                    16989UTMEMUSfalse
                                    172.67.177.134
                                    reallyfreegeoip.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1574874
                                    Start date and time:2024-12-13 17:56:56 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 10m 38s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:27
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:file.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@22/15@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 98%
                                    • Number of executed functions: 396
                                    • Number of non-executed functions: 14
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 13.107.246.63, 23.218.208.109, 172.202.163.200, 4.245.163.56
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • VT rate limit hit for: file.exe
                                    TimeTypeDescription
                                    11:57:51API Interceptor8146242x Sleep call for process: file.exe modified
                                    11:57:53API Interceptor22x Sleep call for process: powershell.exe modified
                                    11:57:57API Interceptor5727796x Sleep call for process: rXcourOVPD.exe modified
                                    17:57:56Task SchedulerRun new task: rXcourOVPD path: C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    132.226.8.169TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    malware.ps1Get hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    QUOTES REQUEST FOR PRICES.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    file.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    ST07933.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    Price Quotation-01.dqy.dllGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    172.67.177.13477541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                      Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          QUOTES REQUEST FOR PRICES.exeGet hashmaliciousMassLogger RATBrowse
                                            T#U00fcbitak SAGE RfqF#U0334D#U0334P#U0334..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    New_Order_List.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      Hesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        checkip.dyndns.comTEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.8.169
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 132.226.8.169
                                                        77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 158.101.44.242
                                                        AsyncClient.exeGet hashmaliciousAsyncRAT, HVNC, PureLog StealerBrowse
                                                        • 193.122.130.0
                                                        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 193.122.6.168
                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 193.122.6.168
                                                        hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 132.226.8.169
                                                        reallyfreegeoip.orgTEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 104.21.67.152
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 104.21.67.152
                                                        77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 172.67.177.134
                                                        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 172.67.177.134
                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 104.21.67.152
                                                        hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 104.21.67.152
                                                        malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                        • 104.21.67.152
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        UTMEMUSTEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.8.169
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 132.226.8.169
                                                        41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 132.226.8.169
                                                        malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                        • 132.226.8.169
                                                        Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 132.226.8.169
                                                        QUOTES REQUEST FOR PRICES.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 132.226.8.169
                                                        Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        • 132.226.8.169
                                                        DEC 2024 RFQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.247.73
                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.8.169
                                                        Request for quote.docGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        CLOUDFLARENETUSfile.exeGet hashmaliciousXWormBrowse
                                                        • 172.67.19.24
                                                        IFTM0g0NWX.exeGet hashmaliciousLummaCBrowse
                                                        • 104.21.80.1
                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 104.21.67.152
                                                        Download-Roblox-Solara.exeGet hashmaliciousLummaCBrowse
                                                        • 104.21.50.161
                                                        https://www.bing.com/ck/a?!&&p=24da94b1cbc4e30be5abd9acb5737b3bdb775a56c39aac0141dd9c17c937dea1JmltdHM9MTczMzI3MDQwMA&ptn=3&ver=2&hsh=4&fclid=1bf8b81c-3b95-652f-24ec-ad573a81643b&u=a1aHR0cHM6Ly93d3cueXV4aW5na2V0YW5nLmNvbS9jb2xsZWN0aW9ucy90aHJvdy1ibGFua2V0cw#aHR0cHM6Ly95NE81LnN0YXJ5bm91c2UucnUvdDV2My8=Get hashmaliciousUnknownBrowse
                                                        • 172.67.213.90
                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                        • 172.67.207.38
                                                        FW_ TBI Construction Company.emlGet hashmaliciousUnknownBrowse
                                                        • 104.17.25.14
                                                        Set-Up.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 104.21.32.1
                                                        MessengerAdmin.exeGet hashmaliciousLummaCBrowse
                                                        • 104.21.16.1
                                                        https://google.co.ve/url?6q=tlqq0rdJLi6z73yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/s%2fwdsoft.com.br%2f7yoya/ngr2j14j20ovor/ZGF2aWQucm90aGJ1cm5AcXVpbHRlcmNoZXZpb3QuY29tGet hashmaliciousHTMLPhisherBrowse
                                                        • 1.1.1.1
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        54328bd36c14bd82ddaa0c04b25ed9adTEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 172.67.177.134
                                                        77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 172.67.177.134
                                                        Bloxflip Predictor.exeGet hashmaliciousNjratBrowse
                                                        • 172.67.177.134
                                                        CVmkXJ7e0a.exeGet hashmaliciousSheetRatBrowse
                                                        • 172.67.177.134
                                                        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 172.67.177.134
                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 172.67.177.134
                                                        hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        C:\Users\user\AppData\Roaming\rXcourOVPD.exeRequest for quote.docGet hashmaliciousSnake KeyloggerBrowse
                                                          Process:C:\Users\user\Desktop\file.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1216
                                                          Entropy (8bit):5.34331486778365
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                          Malicious:true
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                          Process:C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1216
                                                          Entropy (8bit):5.34331486778365
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                          Malicious:false
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:modified
                                                          Size (bytes):2232
                                                          Entropy (8bit):5.381427237108526
                                                          Encrypted:false
                                                          SSDEEP:48:JWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:JLHyIFKL3IZ2KRH9Oug8s
                                                          MD5:CCFE082F6EF2215B19C8797E151CF24B
                                                          SHA1:010684546DE1F7039CE0BF368086E29EE3651553
                                                          SHA-256:862C4A8AB3ABCA5BE214C1DDB06B041FC7896BC8DE6520570751D1C76F354BEF
                                                          SHA-512:97C236D9F35ADDEA5260CBB5C1E78DE9877879EF1CB0C2BA1CCFE9A11F70D13FE40F26A5F4017F5A2F12E349257F2B4C7648562DE7025BAEDA6980D50E6B742F
                                                          Malicious:false
                                                          Preview:@...e.................................:..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Users\user\Desktop\file.exe
                                                          File Type:XML 1.0 document, ASCII text
                                                          Category:dropped
                                                          Size (bytes):1576
                                                          Entropy (8bit):5.079827486718776
                                                          Encrypted:false
                                                          SSDEEP:24:2di4+S2qhLX1a4y1mEBUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtiQTxvn:cgeTgYrFdOFzOzN33ODOiDdKrsuT7v
                                                          MD5:F8425B1E48A9413A44ECD04029044CFE
                                                          SHA1:3330888FCF79E6C99C6E8ABA493898BAB6A1A690
                                                          SHA-256:3818DA595FDB514E2BF8C450BDF6C4A5C5E142A53D6E16D3EF4FD99363DCE6E9
                                                          SHA-512:9CA0C71B47E922D77B476CE8BB79ED6F938841596E43E7A03DC577D0521C653DEAB471A43290B06B2CED75C38CF7EC5FF6FC698B2A3C0159D803B999F401F52B
                                                          Malicious:true
                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                          Process:C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          File Type:XML 1.0 document, ASCII text
                                                          Category:dropped
                                                          Size (bytes):1576
                                                          Entropy (8bit):5.079827486718776
                                                          Encrypted:false
                                                          SSDEEP:24:2di4+S2qhLX1a4y1mEBUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtiQTxvn:cgeTgYrFdOFzOzN33ODOiDdKrsuT7v
                                                          MD5:F8425B1E48A9413A44ECD04029044CFE
                                                          SHA1:3330888FCF79E6C99C6E8ABA493898BAB6A1A690
                                                          SHA-256:3818DA595FDB514E2BF8C450BDF6C4A5C5E142A53D6E16D3EF4FD99363DCE6E9
                                                          SHA-512:9CA0C71B47E922D77B476CE8BB79ED6F938841596E43E7A03DC577D0521C653DEAB471A43290B06B2CED75C38CF7EC5FF6FC698B2A3C0159D803B999F401F52B
                                                          Malicious:false
                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                          Process:C:\Users\user\Desktop\file.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):640512
                                                          Entropy (8bit):7.59038422508059
                                                          Encrypted:false
                                                          SSDEEP:12288:2dMdY9shQglOUQwZvb6JecS0W/0Wjz3lXsBHxxe70ZjwqmKH2JS:BdhlrQwIJe/bYxiqmm28
                                                          MD5:30E5E5A39DF67A1138BF84DB89A5EB47
                                                          SHA1:D269595A30FD1E49086C51F629E39C15200E0149
                                                          SHA-256:1D409E94B935C68A4B4841A1B2E05C6ABF1EA827C419EAB8BF3EE23229574160
                                                          SHA-512:365324EC484C65E7FB010F1A1FA5B5F97AFEF3E99D7E16E5AE753FE26DA6A62C782196283EC71269A7198E6690DE40FCC877F5F7B558A588F4994EDFB95FE673
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 79%
                                                          Joe Sandbox View:
                                                          • Filename: Request for quote.doc, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iVg..............0......(.......... ........@.. ....................... ............@.................................x...O........$........................................................................... ............... ..H............text...0.... ...................... ..`.rsrc....$.......&..................@..@.reloc..............................@..B........................H.......$L...{..........(...P............................................0...........(.....(.....{...........%.r...p( ...s!....%.r...p( ...s!....%.r%..p( ...s!........T...%.b...("...s!...(#...rA..p ............%...%...o$...&*....0..^........{....o%....{.....A.Zo&....[...o'...&.{....o%...o(....>"....{....o%...o)....{....o%...r_..po'...&.{....o*...ru..pr_..p.(+....@.....{....o.....{....r...p.{....|....(,...(-...o.....{....r...p.{....|....(,...(-...o.....{....r...p.{....|....(,.
                                                          Process:C:\Users\user\Desktop\file.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.59038422508059
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:file.exe
                                                          File size:640'512 bytes
                                                          MD5:30e5e5a39df67a1138bf84db89a5eb47
                                                          SHA1:d269595a30fd1e49086c51f629e39c15200e0149
                                                          SHA256:1d409e94b935c68a4b4841a1b2e05c6abf1ea827c419eab8bf3ee23229574160
                                                          SHA512:365324ec484c65e7fb010f1a1fa5b5f97afef3e99d7e16e5ae753fe26da6a62c782196283ec71269a7198e6690de40fcc877f5f7b558a588f4994edfb95fe673
                                                          SSDEEP:12288:2dMdY9shQglOUQwZvb6JecS0W/0Wjz3lXsBHxxe70ZjwqmKH2JS:BdhlrQwIJe/bYxiqmm28
                                                          TLSH:8FD4F154AB5DC517C98017359EA2F6BC16699E9CF911D243AFECBFAF3CB2A141C04382
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iVg..............0......(........... ........@.. ....................... ............@................................
                                                          Icon Hash:17692632b3936907
                                                          Entrypoint:0x49b9ca
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x675669B1 [Mon Dec 9 03:53:21 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          push ebx
                                                          add byte ptr [ecx+00h], bh
                                                          jnc 00007F3BECED0392h
                                                          je 00007F3BECED0392h
                                                          add byte ptr [ebp+00h], ch
                                                          add byte ptr [ecx+00h], al
                                                          arpl word ptr [eax], ax
                                                          je 00007F3BECED0392h
                                                          imul eax, dword ptr [eax], 00610076h
                                                          je 00007F3BECED0392h
                                                          outsd
                                                          add byte ptr [edx+00h], dh
                                                          push ebx
                                                          add byte ptr [ecx+00h], bh
                                                          jnc 00007F3BECED0392h
                                                          je 00007F3BECED0392h
                                                          add byte ptr [ebp+00h], ch
                                                          add byte ptr [edx+00h], dl
                                                          add byte ptr [esi+00h], ah
                                                          insb
                                                          add byte ptr [ebp+00h], ah
                                                          arpl word ptr [eax], ax
                                                          je 00007F3BECED0392h
                                                          imul eax, dword ptr [eax], 006E006Fh
                                                          add byte ptr [ecx+00h], al
                                                          jnc 00007F3BECED0392h
                                                          jnc 00007F3BECED0392h
                                                          add byte ptr [ebp+00h], ch
                                                          bound eax, dword ptr [eax]
                                                          insb
                                                          add byte ptr [ecx+00h], bh
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          dec esp
                                                          add byte ptr [edi+00h], ch
                                                          popad
                                                          add byte ptr [eax+eax+00h], ah
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x9b9780x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x9c0000x2494.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x99a300x99c000221da5cbf79299c22fda04ddb9d585cFalse0.8813357469512195data7.595806466843068IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x9c0000x24940x26007a51be90de60239e24611f32c14c1179False0.8692434210526315data7.404002770905549IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0xa00000xc0x200c18cdddbda7196afd69aafbbd787bc7cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x9c1000x1e7ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9827056110684089
                                                          RT_GROUP_ICON0x9df900x14data1.05
                                                          RT_VERSION0x9dfb40x2e0data0.452445652173913
                                                          RT_MANIFEST0x9e2a40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-12-13T17:58:01.232447+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149711132.226.8.16980TCP
                                                          2024-12-13T17:58:03.638572+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149711132.226.8.16980TCP
                                                          2024-12-13T17:58:03.716713+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149718132.226.8.16980TCP
                                                          2024-12-13T17:58:05.204248+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1149725172.67.177.134443TCP
                                                          2024-12-13T17:58:05.966712+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149718132.226.8.16980TCP
                                                          2024-12-13T17:58:07.451077+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149732132.226.8.16980TCP
                                                          2024-12-13T17:58:07.597260+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1149733172.67.177.134443TCP
                                                          2024-12-13T17:58:09.216680+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149740132.226.8.16980TCP
                                                          2024-12-13T17:58:10.858250+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1149747172.67.177.134443TCP
                                                          2024-12-13T17:58:25.280469+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1149797172.67.177.134443TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 13, 2024 17:57:57.587492943 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:57:57.707611084 CET8049711132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:57:57.709860086 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:57:57.710114002 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:57:57.829859018 CET8049711132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:00.626785994 CET8049711132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:00.631180048 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:00.751194954 CET8049711132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:00.827866077 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:00.948000908 CET8049718132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:00.948126078 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:00.948458910 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:01.068253994 CET8049718132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:01.121453047 CET8049711132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:01.232446909 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:01.306577921 CET49719443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:01.306622982 CET44349719172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:01.309987068 CET49719443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:01.316838980 CET49719443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:01.316855907 CET44349719172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:02.532780886 CET44349719172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:02.532915115 CET49719443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:02.568478107 CET49719443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:02.568495035 CET44349719172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:02.568780899 CET44349719172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:02.621751070 CET49719443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:02.663326025 CET44349719172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:03.000602961 CET44349719172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:03.000665903 CET44349719172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:03.001068115 CET49719443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:03.013062000 CET49719443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:03.016973019 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:03.129709959 CET8049718132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:03.134583950 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:03.137821913 CET8049711132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:03.254883051 CET8049718132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:03.506664038 CET8049711132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:03.509042978 CET49725443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:03.509088993 CET44349725172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:03.509223938 CET49725443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:03.509635925 CET49725443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:03.509653091 CET44349725172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:03.638571978 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:03.673341990 CET8049718132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:03.716712952 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:03.720263004 CET49726443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:03.720309019 CET44349726172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:03.720416069 CET49726443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:03.724752903 CET49726443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:03.724771976 CET44349726172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:04.724564075 CET44349725172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:04.754312992 CET49725443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:04.754334927 CET44349725172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:04.940371990 CET44349726172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:04.940463066 CET49726443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:04.942403078 CET49726443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:04.942414045 CET44349726172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:04.942697048 CET44349726172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:04.994402885 CET49726443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:05.035340071 CET44349726172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:05.204334021 CET44349725172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:05.204499960 CET44349725172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:05.204552889 CET49725443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:05.204999924 CET49725443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:05.208494902 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:05.209656000 CET4973280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:05.328579903 CET8049711132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:05.328635931 CET4971180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:05.329363108 CET8049732132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:05.329442024 CET4973280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:05.329756975 CET4973280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:05.400755882 CET44349726172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:05.400826931 CET44349726172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:05.400868893 CET49726443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:05.405128002 CET49726443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:05.419488907 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:05.449498892 CET8049732132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:05.539381981 CET8049718132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:05.918910027 CET8049718132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:05.921034098 CET49733443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:05.921065092 CET44349733172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:05.921149969 CET49733443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:05.921540976 CET49733443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:05.921556950 CET44349733172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:05.966711998 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:07.140840054 CET44349733172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:07.147073030 CET49733443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:07.147106886 CET44349733172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:07.408196926 CET8049732132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:07.409672976 CET49739443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:07.409708977 CET44349739172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:07.409858942 CET49739443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:07.410110950 CET49739443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:07.410124063 CET44349739172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:07.451076984 CET4973280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:07.597352982 CET44349733172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:07.597510099 CET44349733172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:07.597574949 CET49733443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:07.598227978 CET49733443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:07.602394104 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:07.603943110 CET4974080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:07.724483013 CET8049718132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:07.724605083 CET4971880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:07.725363970 CET8049740132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:07.725625038 CET4974080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:07.725774050 CET4974080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:07.845556974 CET8049740132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:08.633563042 CET44349739172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:08.635337114 CET49739443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:08.635359049 CET44349739172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:09.092137098 CET44349739172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:09.092197895 CET44349739172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:09.092437029 CET49739443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:09.092892885 CET49739443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:09.099509954 CET4974680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:09.169523001 CET8049740132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:09.175081015 CET49747443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:09.175107956 CET44349747172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:09.175247908 CET49747443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:09.175831079 CET49747443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:09.175848007 CET44349747172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:09.216680050 CET4974080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:09.219342947 CET8049746132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:09.219419956 CET4974680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:09.219557047 CET4974680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:09.339323044 CET8049746132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:10.396743059 CET44349747172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:10.398674011 CET49747443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:10.398700953 CET44349747172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:10.699600935 CET8049746132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:10.701100111 CET49749443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:10.701198101 CET44349749172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:10.701282978 CET49749443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:10.701589108 CET49749443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:10.701625109 CET44349749172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:10.747950077 CET4974680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:10.858339071 CET44349747172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:10.858489037 CET44349747172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:10.858607054 CET49747443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:10.858990908 CET49747443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:10.863953114 CET4975080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:10.984379053 CET8049750132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:10.984638929 CET4975080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:10.984638929 CET4975080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:11.104463100 CET8049750132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:11.915261984 CET44349749172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:11.917072058 CET49749443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:11.917117119 CET44349749172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:12.367924929 CET44349749172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:12.368010998 CET44349749172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:12.368077993 CET49749443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:12.368464947 CET49749443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:12.371876955 CET4974680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:12.372960091 CET4975780192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:12.401978970 CET8049750132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:12.403266907 CET49758443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:12.403301001 CET44349758172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:12.403367043 CET49758443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:12.403601885 CET49758443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:12.403616905 CET44349758172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:12.451210976 CET4975080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:12.491887093 CET8049746132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:12.492031097 CET4974680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:12.492763042 CET8049757132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:12.496514082 CET4975780192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:12.497014046 CET4975780192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:12.616811991 CET8049757132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:13.617228031 CET44349758172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:13.628462076 CET49758443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:13.628493071 CET44349758172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:13.916088104 CET8049757132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:13.917474031 CET49765443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:13.917581081 CET44349765172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:13.917673111 CET49765443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:13.917970896 CET49765443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:13.918008089 CET44349765172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:13.966686010 CET4975780192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:14.099652052 CET44349758172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:14.099713087 CET44349758172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:14.099773884 CET49758443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:14.100342035 CET49758443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:14.116076946 CET4976680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:14.116616011 CET4975080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:14.237977028 CET8049766132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:14.238750935 CET8049750132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:14.239017963 CET4975080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:14.239017963 CET4976680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:14.239017963 CET4976680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:14.359163046 CET8049766132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:15.132908106 CET44349765172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:15.142400980 CET49765443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:15.142426968 CET44349765172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:15.582374096 CET44349765172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:15.582434893 CET44349765172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:15.582506895 CET49765443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:15.583250999 CET49765443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:15.587909937 CET4975780192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:15.589128017 CET4977280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:15.653450012 CET8049766132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:15.655114889 CET49773443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:15.655148983 CET44349773172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:15.655235052 CET49773443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:15.655507088 CET49773443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:15.655518055 CET44349773172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:15.701359987 CET4976680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:15.708575964 CET8049757132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:15.708700895 CET4975780192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:15.709498882 CET8049772132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:15.709584951 CET4977280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:15.709763050 CET4977280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:15.836152077 CET8049772132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:17.134248972 CET44349773172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:17.135123968 CET8049772132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:17.136390924 CET49774443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:17.136416912 CET44349774172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:17.136487961 CET49774443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:17.136709929 CET49774443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:17.136719942 CET44349774172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:17.144459009 CET49773443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:17.144475937 CET44349773172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:17.185477972 CET4977280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:17.588068962 CET44349773172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:17.588139057 CET44349773172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:17.588186026 CET49773443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:17.588861942 CET49773443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:17.592664957 CET4976680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:17.593827009 CET4977980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:17.713052034 CET8049766132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:17.713570118 CET8049779132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:17.713650942 CET4977980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:17.713737011 CET4976680192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:17.713839054 CET4977980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:17.833492994 CET8049779132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:18.350820065 CET44349774172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:18.352360010 CET49774443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:18.352382898 CET44349774172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:18.801000118 CET44349774172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:18.801093102 CET44349774172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:18.801151037 CET49774443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:18.801621914 CET49774443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:18.804830074 CET4977280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:18.806057930 CET4978180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:18.925282001 CET8049772132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:18.925393105 CET4977280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:18.925730944 CET8049781132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:18.925801039 CET4978180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:18.925951958 CET4978180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:19.049720049 CET8049781132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:19.145230055 CET8049779132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:19.146506071 CET49782443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:19.146553993 CET44349782172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:19.146656036 CET49782443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:19.146852970 CET49782443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:19.146863937 CET44349782172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:19.185539961 CET4977980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:20.350414991 CET8049781132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:20.351886988 CET49788443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:20.351969004 CET44349788172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:20.352056026 CET49788443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:20.352328062 CET49788443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:20.352355957 CET44349788172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:20.357909918 CET44349782172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:20.359374046 CET49782443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:20.359395981 CET44349782172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:20.404272079 CET4978180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:20.804749966 CET44349782172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:20.804821014 CET44349782172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:20.804913998 CET49782443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:20.805458069 CET49782443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:20.808790922 CET4977980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:20.809937954 CET4978980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:20.928765059 CET8049779132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:20.929033995 CET4977980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:20.929714918 CET8049789132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:20.929796934 CET4978980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:20.930030107 CET4978980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:21.050175905 CET8049789132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:21.567011118 CET44349788172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:21.571202040 CET49788443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:21.571284056 CET44349788172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:22.030745029 CET44349788172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:22.030900002 CET44349788172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:22.030999899 CET49788443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:22.031434059 CET49788443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:22.034573078 CET4978180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:22.035573959 CET4979580192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:22.154777050 CET8049781132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:22.155333996 CET8049795132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:22.155441999 CET4978180192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:22.155488014 CET4979580192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:22.155662060 CET4979580192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:22.275568962 CET8049795132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:22.355760098 CET8049789132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:22.358186007 CET49796443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:22.358227968 CET44349796172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:22.358338118 CET49796443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:22.358604908 CET49796443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:22.358613968 CET44349796172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:22.404300928 CET4978980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:23.575176001 CET44349796172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:23.577049017 CET49796443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:23.577146053 CET44349796172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:23.610057116 CET8049795132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:23.615010023 CET49797443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:23.615051031 CET44349797172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:23.615163088 CET49797443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:23.615372896 CET49797443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:23.615386963 CET44349797172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:23.654288054 CET4979580192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:24.028934002 CET44349796172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:24.029012918 CET44349796172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:24.029196024 CET49796443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:24.029958963 CET49796443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:24.033436060 CET4978980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:24.034384966 CET4979880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:24.154203892 CET8049798132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:24.154329062 CET8049789132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:24.154344082 CET4979880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:24.154437065 CET4978980192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:24.154633999 CET4979880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:24.274560928 CET8049798132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:24.828481913 CET44349797172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:24.830735922 CET49797443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:24.830777884 CET44349797172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:25.280556917 CET44349797172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:25.280734062 CET44349797172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:25.280823946 CET49797443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:25.281267881 CET49797443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:25.648726940 CET8049798132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:58:25.650258064 CET49804443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:25.650314093 CET44349804172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:25.650394917 CET49804443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:25.650732040 CET49804443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:25.650748014 CET44349804172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:25.701118946 CET4979880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:58:26.867553949 CET44349804172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:26.869360924 CET49804443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:26.869385958 CET44349804172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:27.316282988 CET44349804172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:27.316354990 CET44349804172.67.177.134192.168.2.11
                                                          Dec 13, 2024 17:58:27.316401958 CET49804443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:58:27.316852093 CET49804443192.168.2.11172.67.177.134
                                                          Dec 13, 2024 17:59:12.415951967 CET8049732132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:59:12.416084051 CET4973280192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:59:14.165628910 CET8049740132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:59:14.165715933 CET4974080192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:59:28.603302002 CET8049795132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:59:28.608284950 CET4979580192.168.2.11132.226.8.169
                                                          Dec 13, 2024 17:59:30.650078058 CET8049798132.226.8.169192.168.2.11
                                                          Dec 13, 2024 17:59:30.657891035 CET4979880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 18:00:03.623646975 CET4979580192.168.2.11132.226.8.169
                                                          Dec 13, 2024 18:00:03.743554115 CET8049795132.226.8.169192.168.2.11
                                                          Dec 13, 2024 18:00:05.654702902 CET4979880192.168.2.11132.226.8.169
                                                          Dec 13, 2024 18:00:05.774669886 CET8049798132.226.8.169192.168.2.11
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 13, 2024 17:57:57.441102982 CET4928753192.168.2.111.1.1.1
                                                          Dec 13, 2024 17:57:57.579071999 CET53492871.1.1.1192.168.2.11
                                                          Dec 13, 2024 17:58:01.161681890 CET5730253192.168.2.111.1.1.1
                                                          Dec 13, 2024 17:58:01.305634022 CET53573021.1.1.1192.168.2.11
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Dec 13, 2024 17:57:57.441102982 CET192.168.2.111.1.1.10x2188Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                          Dec 13, 2024 17:58:01.161681890 CET192.168.2.111.1.1.10x9e33Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Dec 13, 2024 17:57:57.579071999 CET1.1.1.1192.168.2.110x2188No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                          Dec 13, 2024 17:57:57.579071999 CET1.1.1.1192.168.2.110x2188No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                          Dec 13, 2024 17:57:57.579071999 CET1.1.1.1192.168.2.110x2188No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                          Dec 13, 2024 17:57:57.579071999 CET1.1.1.1192.168.2.110x2188No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                          Dec 13, 2024 17:57:57.579071999 CET1.1.1.1192.168.2.110x2188No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                          Dec 13, 2024 17:57:57.579071999 CET1.1.1.1192.168.2.110x2188No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                          Dec 13, 2024 17:58:01.305634022 CET1.1.1.1192.168.2.110x9e33No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                          Dec 13, 2024 17:58:01.305634022 CET1.1.1.1192.168.2.110x9e33No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                          • reallyfreegeoip.org
                                                          • checkip.dyndns.org
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.1149711132.226.8.169806176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:57:57.710114002 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:00.626785994 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:00 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                          Dec 13, 2024 17:58:00.631180048 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 13, 2024 17:58:01.121453047 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:00 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                          Dec 13, 2024 17:58:03.016973019 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 13, 2024 17:58:03.506664038 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:03 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.1149718132.226.8.169806976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:00.948458910 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:03.129709959 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:02 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                          Dec 13, 2024 17:58:03.134583950 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 13, 2024 17:58:03.673341990 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:03 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                          Dec 13, 2024 17:58:05.419488907 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 13, 2024 17:58:05.918910027 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:05 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.1149732132.226.8.169806176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:05.329756975 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 13, 2024 17:58:07.408196926 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:07 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.1149740132.226.8.169806976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:07.725774050 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 13, 2024 17:58:09.169523001 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:08 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.1149746132.226.8.169806176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:09.219557047 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:10.699600935 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:10 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.1149750132.226.8.169806976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:10.984638929 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:12.401978970 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:12 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.1149757132.226.8.169806176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:12.497014046 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:13.916088104 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:13 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.1149766132.226.8.169806976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:14.239017963 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:15.653450012 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:15 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.1149772132.226.8.169806176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:15.709763050 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:17.135123968 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:16 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.1149779132.226.8.169806976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:17.713839054 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:19.145230055 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:18 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.1149781132.226.8.169806176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:18.925951958 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:20.350414991 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:20 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.1149789132.226.8.169806976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:20.930030107 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:22.355760098 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:22 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.1149795132.226.8.169806176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:22.155662060 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:23.610057116 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:23 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.1149798132.226.8.169806976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 13, 2024 17:58:24.154633999 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 13, 2024 17:58:25.648726940 CET273INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:25 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.1149719172.67.177.1344436176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:02 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:02 UTC879INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:02 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97851
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w8fsiJG%2FAzn1ccbCqSMQTg%2BDxTRsLIBnZErkPk%2BwHLpDIDv91vZyQ1nOK5wcP%2BVHCpapsZzJ3NR9uB1eejWtvnAaqW5f83sBBCP4xfgfaS245AFMyOdKJzesPX27zC2fpkFkI%2BYb"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f2799c543c4-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1603&min_rtt=1602&rtt_var=602&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1813664&cwnd=222&unsent_bytes=0&cid=2435753bfbf7a0eb&ts=478&x=0"
                                                          2024-12-13 16:58:02 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.1149725172.67.177.1344436176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:04 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-12-13 16:58:05 UTC879INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:05 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97854
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Q6g7cdqBCPOf7h0oaT6h2GstFwguhi5n6pAc66yGuxJ0Nuj2fAzAWCbMWglLnoOQhdAK%2FSdIB4nn5Twx4yFE1lvi6R2lY%2BnV8A3CJw4tzg%2BT4w2DGq8Oi8%2F0KV7lz7z1F6cg%2BbvK"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f354bfb0f4b-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1559&min_rtt=1552&rtt_var=597&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1810291&cwnd=230&unsent_bytes=0&cid=e6d132fbce09a04f&ts=485&x=0"
                                                          2024-12-13 16:58:05 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.1149726172.67.177.1344436976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:04 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:05 UTC875INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:05 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97854
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j44ftbeDgbeJTCj0dE3bDvipTyNioDoOTKhwQCCddHxIMqsWbB1PATu7WJFvZ58LqofHaFOjS9hCUSW6QwSja%2Bzwhen30hmpn%2BXEPEo0saXiJRabQjTgPfy9CEym7Zb%2FUMNWgkRq"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f3698dd8c59-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1838&min_rtt=1838&rtt_var=689&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1586956&cwnd=196&unsent_bytes=0&cid=b7f730da37db3735&ts=466&x=0"
                                                          2024-12-13 16:58:05 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.1149733172.67.177.1344436976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:07 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-12-13 16:58:07 UTC883INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:07 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97856
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pEIDyWiht%2B8XpLsf8YzIq7IHUBSqrVlisW3C%2Fk%2F9330ojof78U575WMkVf1%2Bk0HwNwrH0kkSwO05GRHhnofXwO4bz9UJJvWbNRXuHTOND8QPKWCQbFoE6Dm%2BMZiBrh5Uqt%2B%2F8v16"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f446ce28cdd-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2045&min_rtt=2030&rtt_var=791&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1358139&cwnd=161&unsent_bytes=0&cid=2fa8dace4585164d&ts=461&x=0"
                                                          2024-12-13 16:58:07 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.1149739172.67.177.1344436176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:08 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:09 UTC883INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:08 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97857
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pms6qeRdg%2FsPk3BMYUU7%2Bvd9wpK1icb9r%2FD%2BX3N%2BBmgHsiZ87TlJ3h2wLtBvMel7cZBLcrIT0lvJtExNjwAscmqYPRJnK%2FxWvWgEZTW8pa1KsUDuhzo2DToGoijp7kr3VzO%2Fs5Dd"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f4dbbae5e80-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1625&min_rtt=1621&rtt_var=611&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1801357&cwnd=218&unsent_bytes=0&cid=c4fefb3ebaca0b64&ts=465&x=0"
                                                          2024-12-13 16:58:09 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.1149747172.67.177.1344436976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:10 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-12-13 16:58:10 UTC887INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:10 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97859
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WG%2F%2FrcjY%2BymH%2Bqy5xlqpS%2FAlS0O%2BGYsXN7%2Fa%2Fm7Bf3QPYTfff5pDy7hOrQyVQwnPemnnrWYjFMb4h5HbbTUR08WbtV6wWimEyKg3l0hcrOHtpJ6DnF6Mj%2BCi1J9FqkVMe1waCGA5"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f58bc478c78-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1840&min_rtt=1839&rtt_var=691&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1580942&cwnd=236&unsent_bytes=0&cid=8aae17498bfba875&ts=472&x=0"
                                                          2024-12-13 16:58:10 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.1149749172.67.177.1344436176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:11 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:12 UTC877INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:12 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97861
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lOIq008CVoVbTWH9b3XrffPFsummvSVeU0ERE6Nb%2BEVC83d42BIEpkyDfCkfgKma%2FHWsEpuhleMMK3PtajJc%2F3l6PWnvd9v4XDh53dAXwm3%2Fer8xH3eHpckUuY0qA0cdNmOc2Enh"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f623d834356-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1563&min_rtt=1558&rtt_var=595&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1822721&cwnd=235&unsent_bytes=0&cid=b7ea605ed6f05fd4&ts=458&x=0"
                                                          2024-12-13 16:58:12 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.1149758172.67.177.1344436976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:13 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:14 UTC877INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:13 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97862
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kRUsq5sk312jc%2BBY8hJUuBrlor1EQ5XGJX%2FtIFoOB13vyzQT5zruS87xIgSvswPMH%2BmCynFpTQtlUt7WAD705EntF7PJ9nLtJ6g9PuaK1Q4JKIkwrqXK7pkTlWNmiL3%2Bb7zPCYwK"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f6cfb1c8c90-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1896&min_rtt=1841&rtt_var=729&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1586094&cwnd=201&unsent_bytes=0&cid=452875ecc4b22037&ts=486&x=0"
                                                          2024-12-13 16:58:14 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.1149765172.67.177.1344436176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:15 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:15 UTC877INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:15 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97864
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GlZdslvHF2X%2FHO08o6LMHKd2wF3o%2Fb08xV0Iq4g5LwQwksVtmV9KJatUrJ4JGHeuHHRGDyB%2F9eTVuATzRZgKtaE6zxmbc0csVrRRY4ooHOFfOwekn6rq0izz%2FfRA2992c10WDxsk"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f765f308c4d-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1817&min_rtt=1814&rtt_var=687&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1584373&cwnd=158&unsent_bytes=0&cid=7c32c7f1d4121a4d&ts=456&x=0"
                                                          2024-12-13 16:58:15 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.1149773172.67.177.1344436976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:17 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:17 UTC879INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:17 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97866
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HezCu8HuYJFkYNeacXugZgQ7XNMali6Q2eyGttoDiVMrWBxZTfJIM9xaZAhLp%2BsN8klbRlIWam51R%2BV3hoPyXRCxcEuGclrQDCupWHcACP3U5lsQzFFH%2Fhd49q9fR73MOwPL%2F%2BPQ"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f82de1d7d0e-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2024&min_rtt=2015&rtt_var=775&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1395126&cwnd=242&unsent_bytes=0&cid=0385d96b7dbb0af2&ts=716&x=0"
                                                          2024-12-13 16:58:17 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.1149774172.67.177.1344436176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:18 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:18 UTC873INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:18 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97867
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FHYEGMGUl9bzuDe3zGg3sDDV89W2pJRoXoucV6Nd4z2oWboHSeXf3oDkklUw15%2BU7S9rDDfs7P5G23PG0c5ZepFRc0fjp4GFu0bkblrehpIlJg066OVEeIpwtWI1P9Lv2dUQ9ALN"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f8a7d557cae-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1804&min_rtt=1796&rtt_var=690&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1568206&cwnd=195&unsent_bytes=0&cid=a49838a645da2194&ts=458&x=0"
                                                          2024-12-13 16:58:18 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.1149782172.67.177.1344436976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:20 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:20 UTC873INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:20 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97869
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mMNRrE55fg3BPGIRzisR7w3TxrMQmLPsedtZ5xshqp5TTW5gHhoITtyAmtEjGl%2FLoXEiQOJM8n4jSQ0F7uw2YWpDV%2BzraXcjQWsN48sxnt2ueyVJY98ANX0i4YHcv9aGy0crE5Yv"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f96fefb1865-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1487&min_rtt=1480&rtt_var=569&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1901041&cwnd=195&unsent_bytes=0&cid=81c13b460c49496a&ts=451&x=0"
                                                          2024-12-13 16:58:20 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.1149788172.67.177.1344436176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:21 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:22 UTC875INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:21 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97870
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pr3uUzkSvs65YTpWlSKe21fnUdBFrKXhg23%2Bf7vHcyJ5f0VYMGpovsHIJOUSyR0F%2Fe5S0Mtfv4UOFGhzk3KqZ67JS952C35VSba9gG00cr8Ye4zxRipnm2DCVzVjQY7a%2B7fa6vU5"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177f9e8d878c1d-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1820&min_rtt=1818&rtt_var=686&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1588683&cwnd=174&unsent_bytes=0&cid=252dc9eec3acca16&ts=471&x=0"
                                                          2024-12-13 16:58:22 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.1149796172.67.177.1344436976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:23 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:24 UTC875INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:23 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97872
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ShR1em4PNmo1mWPlYgLxa1bFcwUTFB6SsEbW3p1PVDkQuITgQ1ihkQwhuHs7dZ2Z8LSG8bkJhukMowu6I4Va2AMv%2FNOaRjV3a63q76W0io0H5%2Fa6ydnAyi66uf%2BSnXPrB68VWr4j"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177fab1b0d7c93-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1803&min_rtt=1796&rtt_var=688&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1574973&cwnd=210&unsent_bytes=0&cid=844882ac016282e1&ts=461&x=0"
                                                          2024-12-13 16:58:24 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.1149797172.67.177.1344436176C:\Users\user\Desktop\file.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:24 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-12-13 16:58:25 UTC879INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:25 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97874
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MoEiNBmn5OhB1iybZzLdDUDZhWTtNN%2BtJJtXfl62AmGU94jDbtPI6HZOGkuJXi%2B6%2FtIuoX9pT2XU4B1AhNrE6dBp0NertZ%2FQTQiY4i5ork%2Bm0K1FzCFtFLD5pZwZRjLTR66599Be"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177fb2eec00c9c-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1812&min_rtt=1805&rtt_var=691&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1568206&cwnd=241&unsent_bytes=0&cid=c5d52d0292b52c5e&ts=456&x=0"
                                                          2024-12-13 16:58:25 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.1149804172.67.177.1344436976C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-13 16:58:26 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-13 16:58:27 UTC887INHTTP/1.1 200 OK
                                                          Date: Fri, 13 Dec 2024 16:58:27 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 97876
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Bufa8s8%2BXve4XXiHugw%2B%2BSFjYygrMjEQu9P8Zy5%2Fx5Z8pH6d8xOtVWX6U3K0JPXc4uSJm3ruSgghdh67ZEIaPFMjU2ubjdzilF%2FJvxdPX7C6ssQhhD9sRE%2Fl%2FntHFrJQd6%2BLdugV"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f177fbfabf47cff-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2040&min_rtt=2037&rtt_var=771&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1413359&cwnd=219&unsent_bytes=0&cid=b4d19cd9619312f4&ts=455&x=0"
                                                          2024-12-13 16:58:27 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:4
                                                          Start time:11:57:51
                                                          Start date:13/12/2024
                                                          Path:C:\Users\user\Desktop\file.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                                          Imagebase:0x190000
                                                          File size:640'512 bytes
                                                          MD5 hash:30E5E5A39DF67A1138BF84DB89A5EB47
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.1358186546.00000000037F1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:11:57:52
                                                          Start date:13/12/2024
                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"
                                                          Imagebase:0xea0000
                                                          File size:433'152 bytes
                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:11:57:52
                                                          Start date:13/12/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff68cce0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:11:57:55
                                                          Start date:13/12/2024
                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
                                                          Imagebase:0xea0000
                                                          File size:433'152 bytes
                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:11
                                                          Start time:11:57:55
                                                          Start date:13/12/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff68cce0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:11:57:55
                                                          Start date:13/12/2024
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmp9DEF.tmp"
                                                          Imagebase:0x860000
                                                          File size:187'904 bytes
                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:13
                                                          Start time:11:57:55
                                                          Start date:13/12/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff68cce0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:11:57:56
                                                          Start date:13/12/2024
                                                          Path:C:\Users\user\Desktop\file.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                                          Imagebase:0x9d0000
                                                          File size:640'512 bytes
                                                          MD5 hash:30E5E5A39DF67A1138BF84DB89A5EB47
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000E.00000002.3757030585.0000000000403000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.3761812258.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.3761812258.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:15
                                                          Start time:11:57:56
                                                          Start date:13/12/2024
                                                          Path:C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          Imagebase:0x6f0000
                                                          File size:640'512 bytes
                                                          MD5 hash:30E5E5A39DF67A1138BF84DB89A5EB47
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000F.00000002.1393376066.0000000003C02000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 79%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:16
                                                          Start time:11:57:59
                                                          Start date:13/12/2024
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rXcourOVPD" /XML "C:\Users\user\AppData\Local\Temp\tmpAA33.tmp"
                                                          Imagebase:0x860000
                                                          File size:187'904 bytes
                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:17
                                                          Start time:11:57:59
                                                          Start date:13/12/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff68cce0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:18
                                                          Start time:11:57:59
                                                          Start date:13/12/2024
                                                          Path:C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
                                                          Imagebase:0x2d0000
                                                          File size:640'512 bytes
                                                          MD5 hash:30E5E5A39DF67A1138BF84DB89A5EB47
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:19
                                                          Start time:11:57:59
                                                          Start date:13/12/2024
                                                          Path:C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
                                                          Imagebase:0x340000
                                                          File size:640'512 bytes
                                                          MD5 hash:30E5E5A39DF67A1138BF84DB89A5EB47
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:20
                                                          Start time:11:57:59
                                                          Start date:13/12/2024
                                                          Path:C:\Users\user\AppData\Roaming\rXcourOVPD.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\rXcourOVPD.exe"
                                                          Imagebase:0x5d0000
                                                          File size:640'512 bytes
                                                          MD5 hash:30E5E5A39DF67A1138BF84DB89A5EB47
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000014.00000002.3762642230.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000014.00000002.3762642230.0000000002A91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:13.3%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:3.1%
                                                            Total number of Nodes:1354
                                                            Total number of Limit Nodes:89
                                                            execution_graph 90766 4ac4428 90767 4ac4438 90766->90767 90774 4ac5a68 90767->90774 90786 77ad670 90767->90786 90790 4ac5a53 90767->90790 90802 77ad65f 90767->90802 90806 4ac5d14 90767->90806 90768 4ac4461 90775 4ac5a94 90774->90775 90776 4ac5ccc 90775->90776 90812 4ac56e0 90775->90812 90778 4ac45a0 8 API calls 90776->90778 90779 4ac5e74 90776->90779 90778->90779 90779->90768 90780 4ac5b4d 90785 4ac5bf5 90780->90785 90818 4ac45a0 90780->90818 90782 4ac5bbf 90783 4ac45a0 8 API calls 90782->90783 90783->90785 90784 4ac45a0 8 API calls 90784->90776 90785->90784 90787 77ad6a5 90786->90787 90789 4ac5d14 8 API calls 90787->90789 90788 77ad6fa 90788->90768 90789->90788 90795 4ac5a94 90790->90795 90791 4ac56e0 8 API calls 90796 4ac5b4d 90791->90796 90792 4ac5ccc 90793 4ac45a0 8 API calls 90792->90793 90794 4ac5e74 90792->90794 90793->90794 90794->90768 90795->90791 90795->90792 90797 4ac45a0 8 API calls 90796->90797 90799 4ac5bf5 90796->90799 90798 4ac5bbf 90797->90798 90800 4ac45a0 8 API calls 90798->90800 90801 4ac45a0 8 API calls 90799->90801 90800->90799 90801->90792 90803 77ad664 90802->90803 90805 4ac5d14 8 API calls 90803->90805 90804 77ad6fa 90804->90768 90805->90804 90807 4ac5d1d 90806->90807 90809 4ac5d3b 90806->90809 90808 4ac45a0 8 API calls 90807->90808 90807->90809 90808->90809 90810 4ac45a0 8 API calls 90809->90810 90811 4ac5e74 90809->90811 90810->90811 90811->90768 90815 4ac56eb 90812->90815 90813 4ac45a0 8 API calls 90814 4ac5fc9 90813->90814 90814->90813 90817 4ac6007 90814->90817 90815->90814 90816 4ac45a0 8 API calls 90815->90816 90815->90817 90816->90814 90817->90780 90819 4ac45b0 90818->90819 90820 4ac45ed 90819->90820 90825 24bf768 90819->90825 90833 24bf780 90819->90833 90838 77ac7f0 90819->90838 90858 77ac7e1 90819->90858 90820->90782 90826 24bf745 90825->90826 90827 24bf772 90825->90827 90888 b340480 90826->90888 90894 b340470 90826->90894 90828 24bf7bd 90827->90828 90878 77a2bf8 90827->90878 90883 77a2c08 90827->90883 90828->90820 90834 24bf7b1 90833->90834 90835 24bf7bd 90833->90835 90834->90835 90836 77a2c08 8 API calls 90834->90836 90837 77a2bf8 8 API calls 90834->90837 90835->90820 90836->90835 90837->90835 90839 77ac829 90838->90839 90841 77ac8c7 90839->90841 90848 24bf768 8 API calls 90839->90848 90849 24bf780 8 API calls 90839->90849 90840 77ac93d 90954 68423ef 90840->90954 90958 6840358 90840->90958 90841->90840 90938 6840348 90841->90938 90946 68424a8 90841->90946 90842 77aca7f 90843 77acab0 90842->90843 90970 24bdcf4 90842->90970 90974 24bf03b 90842->90974 90978 68423c8 90843->90978 90982 68423d8 90843->90982 90844 77ac945 90844->90842 90962 77a50a0 90844->90962 90966 77a50b0 90844->90966 90845 77acac4 90848->90841 90849->90841 90859 77ac7e9 90858->90859 90861 77ac8c7 90859->90861 90869 24bf768 8 API calls 90859->90869 90870 24bf780 8 API calls 90859->90870 90860 77ac93d 90871 68423ef KiUserCallbackDispatcher 90860->90871 90872 6840358 KiUserCallbackDispatcher 90860->90872 90861->90860 90865 6840348 2 API calls 90861->90865 90866 68424a8 2 API calls 90861->90866 90862 77aca7f 90873 24bf03b 8 API calls 90862->90873 90874 77acab0 90862->90874 90875 24bdcf4 8 API calls 90862->90875 90863 77ac945 90863->90862 90867 77a50b0 KiUserCallbackDispatcher 90863->90867 90868 77a50a0 KiUserCallbackDispatcher 90863->90868 90864 77acac4 90865->90860 90866->90860 90867->90862 90868->90862 90869->90861 90870->90861 90871->90863 90872->90863 90873->90874 90876 68423c8 KiUserCallbackDispatcher 90874->90876 90877 68423d8 KiUserCallbackDispatcher 90874->90877 90875->90874 90876->90864 90877->90864 90879 77a2c16 90878->90879 90880 77a2c2d 90879->90880 90881 4ac45a0 8 API calls 90879->90881 90900 4ac4590 90879->90900 90880->90828 90881->90880 90884 77a2c16 90883->90884 90885 77a2c2d 90884->90885 90886 4ac45a0 8 API calls 90884->90886 90887 4ac4590 8 API calls 90884->90887 90885->90828 90886->90885 90887->90885 90889 b340492 90888->90889 90890 b3404cf 90889->90890 90907 b340861 90889->90907 90911 b340638 90889->90911 90915 b340628 90889->90915 90890->90825 90895 b34047d 90894->90895 90896 b3404cf 90895->90896 90897 b340861 2 API calls 90895->90897 90898 b340638 2 API calls 90895->90898 90899 b340628 2 API calls 90895->90899 90896->90825 90897->90896 90898->90896 90899->90896 90901 4ac45b0 90900->90901 90902 4ac45ed 90901->90902 90903 24bf768 8 API calls 90901->90903 90904 77ac7f0 8 API calls 90901->90904 90905 77ac7e1 8 API calls 90901->90905 90906 24bf780 8 API calls 90901->90906 90902->90880 90903->90902 90904->90902 90905->90902 90906->90902 90909 b34081c 90907->90909 90908 b34085a 90908->90890 90909->90908 90919 b340c13 90909->90919 90913 b34063b 90911->90913 90912 b34085a 90912->90890 90913->90912 90914 b340c13 2 API calls 90913->90914 90914->90912 90917 b34062c 90915->90917 90916 b34085a 90916->90890 90917->90916 90918 b340c13 2 API calls 90917->90918 90918->90916 90920 b340c1c 90919->90920 90924 b340fbf 90920->90924 90929 b340fe3 90920->90929 90921 b340c6b 90925 b340fe4 90924->90925 90926 b340fc5 90924->90926 90934 b3411f1 PostMessageW 90925->90934 90936 b341220 PostMessageW 90925->90936 90926->90921 90930 b340ff6 90929->90930 90932 b341220 PostMessageW 90930->90932 90933 b3411f1 PostMessageW 90930->90933 90931 b341019 90931->90921 90932->90931 90933->90931 90935 b34128c 90934->90935 90935->90926 90937 b34128c 90936->90937 90937->90926 90939 6840353 90938->90939 90941 6842546 90939->90941 90986 77adab0 90939->90986 90991 77adac0 90939->90991 90940 68425e7 90942 77adac0 2 API calls 90940->90942 90943 77adab0 2 API calls 90940->90943 90941->90840 90942->90941 90943->90941 90947 68424e1 90946->90947 90949 6842546 90947->90949 90950 77adac0 2 API calls 90947->90950 90951 77adab0 2 API calls 90947->90951 90948 68425e7 90952 77adac0 2 API calls 90948->90952 90953 77adab0 2 API calls 90948->90953 90949->90840 90950->90948 90951->90948 90952->90949 90953->90949 90955 6842411 90954->90955 90956 684241c KiUserCallbackDispatcher 90955->90956 90957 6842430 90955->90957 90956->90957 90957->90844 90959 6840363 90958->90959 90960 6842430 90959->90960 90961 684241c KiUserCallbackDispatcher 90959->90961 90960->90844 90961->90960 90964 77a50b0 90962->90964 90963 77a50c7 90963->90842 90964->90963 90965 77a511a KiUserCallbackDispatcher 90964->90965 90965->90963 90967 77a50c3 90966->90967 90968 77a50c7 90967->90968 90969 77a511a KiUserCallbackDispatcher 90967->90969 90968->90842 90969->90968 90971 24bdcff 90970->90971 90973 24bf0d5 90971->90973 91000 24bcac4 90971->91000 90973->90843 90975 24bf0d5 90974->90975 90976 24bf05f 90974->90976 90975->90843 90976->90975 90977 24bcac4 8 API calls 90976->90977 90977->90975 90979 68423e5 90978->90979 90980 6840358 KiUserCallbackDispatcher 90979->90980 90981 68423ec 90980->90981 90981->90845 90983 68423e5 90982->90983 90984 6840358 KiUserCallbackDispatcher 90983->90984 90985 68423ec 90984->90985 90985->90845 90987 77adabc 90986->90987 90996 77adaf8 PostMessageW 90987->90996 90998 77adaf0 PostMessageW 90987->90998 90988 77adae1 90988->90940 90992 77adac3 90991->90992 90994 77adaf8 PostMessageW 90992->90994 90995 77adaf0 PostMessageW 90992->90995 90993 77adae1 90993->90940 90994->90993 90995->90993 90997 77adb64 90996->90997 90997->90988 90999 77adb64 90998->90999 90999->90988 91001 24bcacf 91000->91001 91004 24bdde8 91001->91004 91003 24bf5af 91003->90973 91005 24bddf3 91004->91005 91006 24bf758 91005->91006 91008 24bf682 91005->91008 91010 24bf768 8 API calls 91005->91010 91011 24bf780 8 API calls 91005->91011 91006->91003 91007 24bf721 91012 b340470 2 API calls 91007->91012 91013 b340480 2 API calls 91007->91013 91008->91007 91009 24bdde8 8 API calls 91008->91009 91009->91008 91010->91008 91011->91008 91012->91006 91013->91006 91014 4aca1a8 91015 4aca1d1 91014->91015 91016 4aca2d6 91015->91016 91019 4aca660 91015->91019 91024 4aca653 91015->91024 91020 4aca684 91019->91020 91021 4aca75a 91020->91021 91029 4acac78 91020->91029 91034 4acac88 91020->91034 91021->91016 91025 4aca684 91024->91025 91026 4aca75a 91025->91026 91027 4acac88 9 API calls 91025->91027 91028 4acac78 9 API calls 91025->91028 91026->91016 91027->91026 91028->91026 91030 4acaca3 91029->91030 91039 4acacb8 91029->91039 91043 4acacab 91029->91043 91047 4acae53 91029->91047 91030->91021 91035 4acaca3 91034->91035 91036 4acacb8 9 API calls 91034->91036 91037 4acacab 9 API calls 91034->91037 91038 4acae53 9 API calls 91034->91038 91035->91021 91036->91035 91037->91035 91038->91035 91041 4acacf2 91039->91041 91051 4acbdd9 91041->91051 91045 4acacf2 91043->91045 91044 4acae40 91044->91030 91046 4acbdd9 9 API calls 91045->91046 91046->91044 91048 4acae19 91047->91048 91050 4acbdd9 9 API calls 91048->91050 91049 4acae40 91049->91030 91050->91049 91052 4acbde0 91051->91052 91053 4acbe9e 91052->91053 91054 4ac45a0 8 API calls 91052->91054 91055 4acbf29 KiUserCallbackDispatcher 91054->91055 91055->91053 91919 6842640 91920 684267a 91919->91920 91921 68426f6 91920->91921 91922 684270b 91920->91922 91927 68403c8 91921->91927 91923 68403c8 3 API calls 91922->91923 91925 684271a 91923->91925 91929 68403d3 91927->91929 91928 6842701 91929->91928 91932 6843100 91929->91932 91938 68430f0 91929->91938 91933 684311a 91932->91933 91946 684041c 91932->91946 91935 6843127 91933->91935 91936 684313f CreateIconFromResourceEx 91933->91936 91935->91928 91937 68431ce 91936->91937 91937->91928 91939 68430b6 91938->91939 91940 68430ff 91938->91940 91939->91928 91941 684041c CreateIconFromResourceEx 91940->91941 91942 684311a 91941->91942 91943 6843127 91942->91943 91944 684313f CreateIconFromResourceEx 91942->91944 91943->91928 91945 68431ce 91944->91945 91945->91928 91947 6843150 CreateIconFromResourceEx 91946->91947 91948 68431ce 91947->91948 91948->91933 91056 24bf74d 91057 24bf758 91056->91057 91058 b340470 2 API calls 91056->91058 91059 b340480 2 API calls 91056->91059 91058->91057 91059->91057 91060 b3f2ab8 91061 b3f2acc 91060->91061 91062 b3f2add 91061->91062 91066 77ad479 91061->91066 91072 77ad488 91061->91072 91063 b3f2b00 91067 77ad47c 91066->91067 91068 77ad4f1 91067->91068 91078 4ac0bfc 91067->91078 91085 4ac0bcf 91067->91085 91093 4ac42b0 91067->91093 91068->91063 91073 77ad4ce 91072->91073 91074 77ad4f1 91073->91074 91075 4ac0bfc 12 API calls 91073->91075 91076 4ac0bcf 12 API calls 91073->91076 91077 4ac42b0 12 API calls 91073->91077 91074->91063 91075->91074 91076->91074 91077->91074 91079 4ac0c07 91078->91079 91080 4ac43ac 91079->91080 91081 4ac4302 91079->91081 91099 4ac0ad4 91080->91099 91083 4ac435a CallWindowProcW 91081->91083 91084 4ac4309 91081->91084 91083->91084 91084->91068 91087 4ac0bfd 91085->91087 91086 4ac0b9c 91087->91086 91088 4ac43ac 91087->91088 91089 4ac4302 91087->91089 91090 4ac0ad4 11 API calls 91088->91090 91091 4ac435a CallWindowProcW 91089->91091 91092 4ac4309 91089->91092 91090->91092 91091->91092 91092->91068 91094 4ac43ac 91093->91094 91095 4ac4302 91093->91095 91096 4ac0ad4 11 API calls 91094->91096 91097 4ac435a CallWindowProcW 91095->91097 91098 4ac4309 91095->91098 91096->91098 91097->91098 91098->91068 91100 4ac0adf 91099->91100 91101 4ac2c79 91100->91101 91103 4ac2c69 91100->91103 91102 4ac0bfc 12 API calls 91101->91102 91104 4ac2c77 91101->91104 91102->91104 91108 4ac2e6c 91103->91108 91114 4ac2d91 91103->91114 91119 4ac2da0 91103->91119 91104->91104 91109 4ac2e7a 91108->91109 91110 4ac2e2a 91108->91110 91124 4ac2e58 91110->91124 91137 4ac2e48 91110->91137 91111 4ac2e40 91111->91104 91116 4ac2db4 91114->91116 91115 4ac2e40 91115->91104 91117 4ac2e48 12 API calls 91116->91117 91118 4ac2e58 12 API calls 91116->91118 91117->91115 91118->91115 91120 4ac2db4 91119->91120 91122 4ac2e48 12 API calls 91120->91122 91123 4ac2e58 12 API calls 91120->91123 91121 4ac2e40 91121->91104 91122->91121 91123->91121 91125 4ac2e69 91124->91125 91150 4ac4293 91124->91150 91153 77a3277 91124->91153 91159 4acfef1 91124->91159 91168 77acee0 91124->91168 91199 4acff37 91124->91199 91204 4ac367b 91124->91204 91209 77acef0 91124->91209 91240 4ac3688 91124->91240 91245 4acff48 91124->91245 91251 77a3288 91124->91251 91258 77a2fb9 91124->91258 91125->91111 91138 4ac2e69 91137->91138 91139 77a3288 12 API calls 91137->91139 91140 77a2fb9 12 API calls 91137->91140 91141 4ac3688 12 API calls 91137->91141 91142 4acff48 12 API calls 91137->91142 91143 4ac367b 12 API calls 91137->91143 91144 77acef0 12 API calls 91137->91144 91145 77acee0 12 API calls 91137->91145 91146 4acff37 12 API calls 91137->91146 91147 77a3277 12 API calls 91137->91147 91148 4acfef1 12 API calls 91137->91148 91149 4ac4293 12 API calls 91137->91149 91138->91111 91139->91138 91140->91138 91141->91138 91142->91138 91143->91138 91144->91138 91145->91138 91146->91138 91147->91138 91148->91138 91149->91138 91151 4ac0bfc 12 API calls 91150->91151 91152 4ac42aa 91151->91152 91152->91125 91154 77a3288 91153->91154 91155 77a32aa 91154->91155 91156 4ac3688 12 API calls 91154->91156 91157 4ac367b 12 API calls 91154->91157 91158 4ac4293 12 API calls 91154->91158 91155->91125 91156->91155 91157->91155 91158->91155 91160 4acfef4 91159->91160 91161 4acfefe 91160->91161 91164 4acff38 91160->91164 91162 4acff16 91161->91162 91163 4ac45a0 8 API calls 91161->91163 91162->91125 91163->91162 91165 4acff5d 91164->91165 91263 b340006 91164->91263 91269 b340040 91164->91269 91165->91125 91169 77acee4 91168->91169 91170 77acf0e 91169->91170 91171 77acf50 91169->91171 91179 77acfa0 91169->91179 91172 77acf2a 91170->91172 91173 77acf13 91170->91173 91177 77ad1da 91171->91177 91178 77acf61 91171->91178 91182 77acf1c 91171->91182 91175 77acf33 91172->91175 91176 77ad0b0 91172->91176 91174 77ad139 91173->91174 91173->91182 91289 77ab3d8 91174->91289 91175->91182 91184 77ad227 91175->91184 91185 77acf42 91175->91185 91190 77ad1e8 91175->91190 91191 77ad209 91175->91191 91192 77ad09d 91175->91192 91193 77ad147 91175->91193 91198 77ad056 91175->91198 91285 77ab388 91176->91285 91293 77acadc 91177->91293 91178->91182 91178->91184 91178->91190 91178->91191 91178->91192 91178->91198 91179->91182 91179->91184 91179->91190 91179->91191 91186 77a3020 12 API calls 91182->91186 91182->91192 91187 77a3020 12 API calls 91184->91187 91185->91182 91188 77ad1cc 91185->91188 91186->91192 91187->91192 91297 77ab478 12 API calls 91188->91297 91194 77a3020 12 API calls 91190->91194 91195 77a3020 12 API calls 91191->91195 91192->91125 91196 77a3020 12 API calls 91193->91196 91194->91192 91195->91192 91196->91192 91275 77a3020 91198->91275 91200 4acff3c 91199->91200 91201 4acff5d 91200->91201 91202 b340006 12 API calls 91200->91202 91203 b340040 12 API calls 91200->91203 91201->91125 91202->91201 91203->91201 91206 4ac36d4 91204->91206 91205 4ac3974 91205->91125 91206->91205 91207 77ad488 12 API calls 91206->91207 91208 77ad479 12 API calls 91206->91208 91207->91205 91208->91205 91210 77acef3 91209->91210 91211 77acf0e 91210->91211 91212 77acf50 91210->91212 91220 77acfa0 91210->91220 91213 77acf2a 91211->91213 91214 77acf13 91211->91214 91218 77ad1da 91212->91218 91219 77acf61 91212->91219 91231 77acf1c 91212->91231 91216 77acf33 91213->91216 91217 77ad0b0 91213->91217 91215 77ad139 91214->91215 91214->91231 91221 77ab3d8 12 API calls 91215->91221 91224 77ad1e8 91216->91224 91225 77ad209 91216->91225 91226 77ad227 91216->91226 91227 77acf42 91216->91227 91230 77ad147 91216->91230 91216->91231 91234 77ad09d 91216->91234 91239 77ad056 91216->91239 91223 77ab388 KiUserCallbackDispatcher 91217->91223 91222 77acadc 12 API calls 91218->91222 91219->91224 91219->91225 91219->91226 91219->91231 91219->91234 91219->91239 91220->91224 91220->91225 91220->91226 91220->91231 91221->91234 91222->91234 91223->91234 91235 77a3020 12 API calls 91224->91235 91236 77a3020 12 API calls 91225->91236 91229 77a3020 12 API calls 91226->91229 91227->91231 91232 77ad1cc 91227->91232 91228 77a3020 12 API calls 91228->91234 91229->91234 91237 77a3020 12 API calls 91230->91237 91231->91228 91231->91234 91350 77ab478 12 API calls 91232->91350 91234->91125 91235->91234 91236->91234 91237->91234 91238 77a3020 12 API calls 91238->91234 91239->91238 91242 4ac36d4 91240->91242 91241 4ac3974 91241->91125 91242->91241 91243 77ad488 12 API calls 91242->91243 91244 77ad479 12 API calls 91242->91244 91243->91241 91244->91241 91246 4acff88 91245->91246 91247 4acff56 91245->91247 91246->91125 91248 4acff5d 91247->91248 91249 b340006 12 API calls 91247->91249 91250 b340040 12 API calls 91247->91250 91248->91125 91249->91248 91250->91248 91252 77a3309 91251->91252 91253 77a32aa 91251->91253 91254 4ac3688 12 API calls 91252->91254 91255 4ac367b 12 API calls 91252->91255 91256 77a3310 91252->91256 91257 4ac4293 12 API calls 91252->91257 91253->91125 91254->91256 91255->91256 91256->91125 91257->91256 91259 77a2fbf 91258->91259 91260 77a2fc9 91258->91260 91261 77a3020 12 API calls 91259->91261 91351 77a3010 91259->91351 91260->91125 91261->91260 91264 b340014 91263->91264 91264->91165 91265 b340038 91264->91265 91266 4ac3688 12 API calls 91264->91266 91267 4ac367b 12 API calls 91264->91267 91268 4ac4293 12 API calls 91264->91268 91265->91165 91266->91265 91267->91265 91268->91265 91270 b34009b 91269->91270 91271 b340066 91269->91271 91270->91271 91272 4ac3688 12 API calls 91270->91272 91273 4ac367b 12 API calls 91270->91273 91274 4ac4293 12 API calls 91270->91274 91271->91165 91272->91271 91273->91271 91274->91271 91276 77a302b 91275->91276 91277 77a3032 91275->91277 91298 77af4f1 91276->91298 91311 77af560 91276->91311 91324 77a2b40 91277->91324 91330 77a3050 91277->91330 91336 77a3040 91277->91336 91278 77a3030 91278->91192 91279 77a3038 91279->91192 91287 77ab393 91285->91287 91346 77acc38 91287->91346 91288 77ae4f2 91288->91192 91290 77ab3e3 91289->91290 91291 77a3020 12 API calls 91290->91291 91292 77ad5fe 91291->91292 91292->91192 91294 77acae7 91293->91294 91295 77a3020 12 API calls 91294->91295 91296 77afd39 91295->91296 91296->91192 91297->91192 91299 77af4f4 91298->91299 91300 77af59b 91299->91300 91301 77af695 91299->91301 91306 77af5a7 91300->91306 91309 77af5e3 91300->91309 91302 77a3050 12 API calls 91301->91302 91303 77af6a0 91302->91303 91303->91278 91304 77a3050 12 API calls 91305 77af68e 91304->91305 91305->91278 91342 77acc88 91306->91342 91308 77af5dc 91308->91278 91309->91304 91310 77af673 91309->91310 91310->91278 91312 77af563 91311->91312 91313 77af59b 91312->91313 91314 77af695 91312->91314 91319 77af5a7 91313->91319 91323 77af5e3 91313->91323 91315 77a3050 12 API calls 91314->91315 91316 77af6a0 91315->91316 91316->91278 91317 77a3050 12 API calls 91318 77af68e 91317->91318 91318->91278 91320 77acc88 KiUserCallbackDispatcher 91319->91320 91321 77af5dc 91320->91321 91321->91278 91322 77af673 91322->91278 91323->91317 91323->91322 91325 77a3059 91324->91325 91326 77a306c 91325->91326 91327 4ac367b 12 API calls 91325->91327 91328 4ac3688 12 API calls 91325->91328 91329 4ac4293 12 API calls 91325->91329 91326->91279 91327->91326 91328->91326 91329->91326 91331 77a3059 91330->91331 91332 77a306c 91331->91332 91333 4ac367b 12 API calls 91331->91333 91334 4ac3688 12 API calls 91331->91334 91335 4ac4293 12 API calls 91331->91335 91332->91279 91333->91332 91334->91332 91335->91332 91337 77a3050 91336->91337 91338 77a306c 91337->91338 91339 4ac367b 12 API calls 91337->91339 91340 4ac3688 12 API calls 91337->91340 91341 4ac4293 12 API calls 91337->91341 91338->91279 91339->91338 91340->91338 91341->91338 91344 77acc93 91342->91344 91343 77aefde 91343->91308 91344->91343 91345 77aefdc KiUserCallbackDispatcher 91344->91345 91345->91343 91348 77acc43 91346->91348 91347 77ae57e 91347->91288 91348->91347 91349 77acc88 KiUserCallbackDispatcher 91348->91349 91349->91347 91350->91234 91352 77a3011 91351->91352 91352->91352 91353 77a302b 91352->91353 91354 77a3032 91352->91354 91357 77af560 12 API calls 91353->91357 91358 77af4f1 12 API calls 91353->91358 91359 77a2b40 12 API calls 91354->91359 91360 77a3050 12 API calls 91354->91360 91361 77a3040 12 API calls 91354->91361 91355 77a3030 91355->91260 91356 77a3038 91356->91260 91357->91355 91358->91355 91359->91356 91360->91356 91361->91356 91949 77a1f30 91951 24b83ff 11 API calls 91949->91951 91952 24b5c7c 11 API calls 91949->91952 91953 24b8430 11 API calls 91949->91953 91950 77a1f52 91951->91950 91952->91950 91953->91950 91954 b3f6770 91955 b3f6784 91954->91955 91956 b3f6856 91955->91956 91959 b3f6d09 91955->91959 91963 b3f6d18 91955->91963 91960 b3f6d25 91959->91960 91961 b3f6d12 91959->91961 91960->91956 91961->91960 91966 b3f6920 91961->91966 91964 b3f6920 12 API calls 91963->91964 91965 b3f6d25 91964->91965 91965->91956 91967 b3f6942 91966->91967 91971 4ac6268 91967->91971 91978 4ac6278 91967->91978 91968 b3f69a0 91968->91960 91972 4ac62ab 91971->91972 91973 4ac6295 91971->91973 91975 4ac62b8 91972->91975 91985 b3f6d48 91972->91985 91990 b3f6d58 91972->91990 91973->91972 91974 4ac45a0 8 API calls 91973->91974 91974->91972 91975->91968 91979 4ac62ab 91978->91979 91980 4ac6295 91978->91980 91981 4ac62b8 91979->91981 91983 b3f6d58 12 API calls 91979->91983 91984 b3f6d48 12 API calls 91979->91984 91980->91979 91982 4ac45a0 8 API calls 91980->91982 91981->91968 91982->91979 91983->91981 91984->91981 91986 b3f6d74 91985->91986 91987 b3f6dc1 91986->91987 91989 4acfef1 12 API calls 91986->91989 91995 4acff00 91986->91995 91987->91975 91989->91987 91991 b3f6d74 91990->91991 91992 b3f6dc1 91991->91992 91993 4acff00 8 API calls 91991->91993 91994 4acfef1 12 API calls 91991->91994 91992->91975 91993->91992 91994->91992 91996 4acff03 91995->91996 91997 4acff16 91996->91997 91998 4ac45a0 8 API calls 91996->91998 91997->91987 91998->91997 91362 77aa6e8 91363 77aa753 91362->91363 91364 77aaae8 91362->91364 91363->91364 91366 692f820 91363->91366 91367 692f846 91366->91367 91368 692f85a 91367->91368 91372 24bde88 91367->91372 91379 24bde7c 91367->91379 91386 24bde43 91367->91386 91368->91364 91373 24bdeb6 91372->91373 91374 24bdf87 91373->91374 91375 24bdff3 91373->91375 91377 24bdef7 91373->91377 91374->91375 91376 24bcac4 8 API calls 91374->91376 91376->91375 91377->91375 91378 24bdf82 KiUserCallbackDispatcher 91377->91378 91378->91375 91380 24bdeb6 91379->91380 91381 24bdf87 91380->91381 91383 24bdef7 91380->91383 91385 24bdff3 91380->91385 91382 24bcac4 8 API calls 91381->91382 91381->91385 91382->91385 91384 24bdf82 KiUserCallbackDispatcher 91383->91384 91383->91385 91384->91385 91387 24bde46 91386->91387 91388 24bdf87 91387->91388 91390 24bdef7 91387->91390 91392 24bdff3 91387->91392 91389 24bcac4 8 API calls 91388->91389 91388->91392 91389->91392 91391 24bdf82 KiUserCallbackDispatcher 91390->91391 91390->91392 91391->91392 91393 24bd158 91394 24bd19e 91393->91394 91398 24bd338 91394->91398 91401 24bd328 91394->91401 91395 24bd28b 91399 24bd366 91398->91399 91404 24bca40 91398->91404 91399->91395 91402 24bca40 DuplicateHandle 91401->91402 91403 24bd366 91402->91403 91403->91395 91405 24bd3a0 DuplicateHandle 91404->91405 91406 24bd436 91405->91406 91406->91399 91407 24badd8 91408 24bade7 91407->91408 91411 24baebf 91407->91411 91418 24baed0 91407->91418 91412 24baee1 91411->91412 91413 24baf04 91411->91413 91412->91413 91414 24baefc 91412->91414 91425 24bb159 91412->91425 91413->91408 91414->91413 91415 24bb108 GetModuleHandleW 91414->91415 91416 24bb135 91415->91416 91416->91408 91419 24baee1 91418->91419 91420 24baf04 91418->91420 91419->91420 91421 24baefc 91419->91421 91424 24bb159 GetModuleHandleW 91419->91424 91420->91408 91421->91420 91422 24bb108 GetModuleHandleW 91421->91422 91423 24bb135 91422->91423 91423->91408 91424->91421 91426 24bb102 GetModuleHandleW 91425->91426 91429 24bb162 91425->91429 91428 24bb135 91426->91428 91428->91414 91429->91414 91430 77a3be0 91432 77a3c07 91430->91432 91431 77a3d0c 91432->91431 91433 77a3c68 91432->91433 91437 24bcac4 8 API calls 91432->91437 91438 24bf578 91432->91438 91433->91431 91441 b3412c8 91433->91441 91445 b3412b7 91433->91445 91437->91433 91439 24bdde8 8 API calls 91438->91439 91440 24bf5af 91438->91440 91439->91440 91440->91433 91442 b3412cb 91441->91442 91449 68417ec 91442->91449 91446 b3412c4 91445->91446 91448 68417ec 8 API calls 91446->91448 91447 b341314 91447->91431 91448->91447 91451 6841804 91449->91451 91450 6841834 91450->91431 91454 24beb10 91451->91454 91458 24beaff 91451->91458 91455 24beb2d 91454->91455 91456 24bcac4 8 API calls 91455->91456 91457 24beb71 91455->91457 91456->91457 91457->91450 91459 24beb2d 91458->91459 91460 24bcac4 8 API calls 91459->91460 91461 24beb71 91459->91461 91460->91461 91461->91450 91462 77a30e0 91463 77a3128 SetWindowTextW 91462->91463 91464 77a3122 91462->91464 91465 77a3159 91463->91465 91464->91463 91999 77ab020 92000 77ab023 91999->92000 92003 77a9914 92000->92003 92004 77a991f 92003->92004 92005 77ab60c 92004->92005 92006 77ab709 92004->92006 92007 4ac45a0 8 API calls 92004->92007 92008 4ac4590 8 API calls 92004->92008 92005->92006 92011 b345e33 92005->92011 92017 b345e40 92005->92017 92007->92005 92008->92005 92013 b345ea5 92011->92013 92012 b345ef2 92012->92006 92013->92012 92014 b344db8 PeekMessageW 92013->92014 92023 b344dd0 92013->92023 92027 b344e04 92013->92027 92014->92013 92021 b345ea5 92017->92021 92018 b344db8 PeekMessageW 92018->92021 92019 b344dd0 KiUserCallbackDispatcher 92019->92021 92020 b344e04 DispatchMessageW 92020->92021 92021->92018 92021->92019 92021->92020 92022 b345ef2 92021->92022 92022->92006 92024 b3467a8 KiUserCallbackDispatcher 92023->92024 92026 b34681c 92024->92026 92026->92013 92028 b346c80 DispatchMessageW 92027->92028 92029 b346cec 92028->92029 92029->92013 92030 6846b58 92031 6846b6c 92030->92031 92032 6846baa 92030->92032 92036 6846bd1 92032->92036 92041 6846be0 92032->92041 92033 6846bc1 92037 6846c14 92036->92037 92046 6846cc7 92037->92046 92050 6846cd8 92037->92050 92038 6846c89 92038->92033 92042 6846c14 92041->92042 92044 6846cc7 DrawTextExW 92042->92044 92045 6846cd8 DrawTextExW 92042->92045 92043 6846c89 92043->92033 92044->92043 92045->92043 92054 6846d48 92046->92054 92060 6846d38 92046->92060 92047 6846ce9 92047->92038 92051 6846ce9 92050->92051 92052 6846d38 DrawTextExW 92050->92052 92053 6846d48 DrawTextExW 92050->92053 92051->92038 92052->92051 92053->92051 92055 6846d55 92054->92055 92057 6846d86 92055->92057 92066 4b982e8 92055->92066 92070 4b982f8 92055->92070 92056 6846d7d 92056->92047 92057->92047 92062 6846d55 92060->92062 92061 6846d7d 92061->92047 92063 6846d86 92062->92063 92064 4b982f8 DrawTextExW 92062->92064 92065 4b982e8 DrawTextExW 92062->92065 92063->92047 92064->92061 92065->92061 92067 4b98308 92066->92067 92074 4b98768 92066->92074 92079 4b98759 92066->92079 92067->92056 92072 4b98759 DrawTextExW 92070->92072 92073 4b98768 DrawTextExW 92070->92073 92071 4b98308 92071->92056 92072->92071 92073->92071 92076 4b98778 92074->92076 92075 4b987ab 92075->92067 92084 4b99620 92076->92084 92089 4b99610 92076->92089 92080 4b98778 92079->92080 92082 4b99620 DrawTextExW 92080->92082 92083 4b99610 DrawTextExW 92080->92083 92081 4b987ab 92081->92067 92082->92081 92083->92081 92085 4b99644 92084->92085 92094 4b99c81 92085->92094 92104 4b99c90 92085->92104 92086 4b996fa 92086->92075 92090 4b99644 92089->92090 92092 4b99c81 DrawTextExW 92090->92092 92093 4b99c90 DrawTextExW 92090->92093 92091 4b996fa 92091->92075 92092->92091 92093->92091 92098 4b99ca2 92094->92098 92100 4b99d82 92094->92100 92095 4b99c90 DrawTextExW 92096 4b99df7 92095->92096 92097 4b99c90 DrawTextExW 92096->92097 92099 4b99e0a 92097->92099 92098->92095 92098->92100 92101 4b99f62 92099->92101 92114 4b9a7d0 92099->92114 92119 4b9a7c0 92099->92119 92100->92086 92101->92086 92108 4b99ca2 92104->92108 92111 4b99d82 92104->92111 92105 4b99c90 DrawTextExW 92106 4b99df7 92105->92106 92107 4b99c90 DrawTextExW 92106->92107 92109 4b99e0a 92107->92109 92108->92105 92108->92111 92110 4b99f62 92109->92110 92112 4b9a7d0 DrawTextExW 92109->92112 92113 4b9a7c0 DrawTextExW 92109->92113 92110->92086 92111->92086 92112->92110 92113->92110 92115 4b9a80b 92114->92115 92116 4b9a840 92115->92116 92124 4b9aca8 92115->92124 92129 4b9ac98 92115->92129 92116->92101 92120 4b9a80b 92119->92120 92121 4b9a840 92120->92121 92122 4b9aca8 DrawTextExW 92120->92122 92123 4b9ac98 DrawTextExW 92120->92123 92121->92101 92122->92121 92123->92121 92126 4b9acd8 92124->92126 92125 4b9ae29 92125->92116 92126->92125 92127 6846da0 DrawTextExW 92126->92127 92128 6846d9f DrawTextExW 92126->92128 92127->92125 92128->92125 92131 4b9acd8 92129->92131 92130 4b9ae29 92130->92116 92131->92130 92132 6846da0 DrawTextExW 92131->92132 92133 6846d9f DrawTextExW 92131->92133 92132->92130 92133->92130 91466 77a09da 91467 77a09df 91466->91467 91471 77a2bc8 91467->91471 91475 77a2bb8 91467->91475 91468 77a0ac8 91473 4ac45a0 8 API calls 91471->91473 91474 4ac4590 8 API calls 91471->91474 91472 77a2bd0 91472->91468 91473->91472 91474->91472 91476 77a2bd0 91475->91476 91477 4ac45a0 8 API calls 91475->91477 91478 4ac4590 8 API calls 91475->91478 91476->91468 91477->91476 91478->91476 91479 24b4668 91480 24b4672 91479->91480 91484 24b4758 91479->91484 91489 24b3e1c 91480->91489 91482 24b468d 91485 24b475d 91484->91485 91493 24b4868 91485->91493 91497 24b4858 91485->91497 91490 24b3e27 91489->91490 91505 24b5bfc 91490->91505 91492 24b6f90 91492->91482 91495 24b488f 91493->91495 91494 24b496c 91495->91494 91501 24b449c 91495->91501 91499 24b488f 91497->91499 91498 24b496c 91498->91498 91499->91498 91500 24b449c CreateActCtxA 91499->91500 91500->91498 91502 24b58f8 CreateActCtxA 91501->91502 91504 24b59bb 91502->91504 91506 24b5c07 91505->91506 91509 24b5c1c 91506->91509 91508 24b712d 91508->91492 91510 24b5c27 91509->91510 91513 24b5c4c 91510->91513 91512 24b7202 91512->91508 91514 24b5c57 91513->91514 91517 24b5c7c 91514->91517 91516 24b7305 91516->91512 91518 24b5c87 91517->91518 91519 24b8731 91518->91519 91522 24bce90 91518->91522 91527 24bce81 91518->91527 91519->91516 91523 24bceb1 91522->91523 91524 24bced5 91523->91524 91532 24bd03f 91523->91532 91536 24bd040 91523->91536 91524->91519 91528 24bceb1 91527->91528 91529 24bced5 91528->91529 91530 24bd03f 11 API calls 91528->91530 91531 24bd040 11 API calls 91528->91531 91529->91519 91530->91529 91531->91529 91534 24bd04d 91532->91534 91533 24bd087 91533->91524 91534->91533 91540 24bc978 91534->91540 91538 24bd04d 91536->91538 91537 24bd087 91537->91524 91538->91537 91539 24bc978 11 API calls 91538->91539 91539->91537 91541 24bc983 91540->91541 91543 24bd998 91541->91543 91544 24bcaa4 91541->91544 91543->91543 91545 24bcaaf 91544->91545 91546 24b5c7c 11 API calls 91545->91546 91547 24bda07 91546->91547 91548 24bda16 91547->91548 91556 24bde88 9 API calls 91547->91556 91557 24bde7c 9 API calls 91547->91557 91558 24bde43 9 API calls 91547->91558 91559 24bcab4 91548->91559 91550 24bda30 91551 24bcac4 8 API calls 91550->91551 91552 24bda37 91551->91552 91554 24bf768 8 API calls 91552->91554 91555 24bf780 8 API calls 91552->91555 91553 24bda41 91553->91543 91554->91553 91555->91553 91556->91548 91557->91548 91558->91548 91562 24bcabf 91559->91562 91560 24bdcf4 8 API calls 91561 24befa4 91560->91561 91561->91550 91562->91560 91563 24befa9 91562->91563 91563->91550 92134 4ac76c8 92135 4ac76e0 92134->92135 92160 4ac740c 92135->92160 92137 4ac7739 92168 4ac741c 92137->92168 92139 4ac775d 92177 4ac742c 92139->92177 92141 4ac777b 92142 4ac814b 92141->92142 92146 4ac7b18 92141->92146 92153 24b83ff 11 API calls 92142->92153 92154 24b5c7c 11 API calls 92142->92154 92155 24b8430 11 API calls 92142->92155 92143 4ac81e6 92144 4ac75fc 9 API calls 92143->92144 92145 4ac8211 92144->92145 92185 4acc207 92146->92185 92189 4acc218 92146->92189 92147 4ac8126 92193 4ac75ec 92147->92193 92149 4ac8133 92158 4acc218 DrawTextExW 92149->92158 92159 4acc207 DrawTextExW 92149->92159 92150 4ac813c 92151 4ac75ec DrawTextExW 92150->92151 92152 4ac8143 92151->92152 92153->92143 92154->92143 92155->92143 92158->92150 92159->92150 92161 4ac7417 92160->92161 92165 24b83ff 11 API calls 92161->92165 92166 24b5c7c 11 API calls 92161->92166 92167 24b8430 11 API calls 92161->92167 92162 4ac81e6 92163 4ac75fc 9 API calls 92162->92163 92164 4ac8211 92163->92164 92164->92137 92165->92162 92166->92162 92167->92162 92170 4ac7427 92168->92170 92169 4ac862e 92169->92139 92170->92169 92172 4ac868e 92170->92172 92199 4ac763c 92170->92199 92175 4acc218 DrawTextExW 92172->92175 92176 4acc207 DrawTextExW 92172->92176 92208 4acc29e 92172->92208 92173 4ac8749 92173->92139 92175->92173 92176->92173 92178 4ac7437 92177->92178 92179 4ac763c 12 API calls 92178->92179 92180 4ac868e 92179->92180 92182 4acc29e DrawTextExW 92180->92182 92183 4acc218 DrawTextExW 92180->92183 92184 4acc207 DrawTextExW 92180->92184 92181 4ac8749 92181->92141 92182->92181 92183->92181 92184->92181 92186 4acc247 92185->92186 92188 4acc24c 92185->92188 92187 4ac75ec DrawTextExW 92186->92187 92186->92188 92187->92188 92188->92147 92190 4acc247 92189->92190 92192 4acc24c 92189->92192 92191 4ac75ec DrawTextExW 92190->92191 92190->92192 92191->92192 92192->92147 92195 4ac75f7 92193->92195 92194 4acd25f 92194->92149 92195->92194 92216 4aca428 92195->92216 92225 4aca438 92195->92225 92196 4acd24c 92196->92149 92200 4ac7647 92199->92200 92206 24b5c4c 11 API calls 92200->92206 92212 24b7250 92200->92212 92201 4ac8c84 92203 4acc29e DrawTextExW 92201->92203 92204 4acc218 DrawTextExW 92201->92204 92205 4acc207 DrawTextExW 92201->92205 92202 4ac8fd7 92202->92172 92203->92202 92204->92202 92205->92202 92206->92201 92209 4acc27e 92208->92209 92210 4ac75ec DrawTextExW 92209->92210 92211 4acc2b9 92209->92211 92210->92211 92211->92173 92213 24b7293 92212->92213 92214 24b5c7c 11 API calls 92213->92214 92215 24b7305 92214->92215 92215->92201 92217 4aca45b 92216->92217 92219 4aca45f 92217->92219 92234 4acd361 92217->92234 92239 684b76f 92217->92239 92245 4acd370 92217->92245 92250 684b680 92217->92250 92255 684b670 92217->92255 92218 4aca4fd 92219->92196 92226 4aca45b 92225->92226 92227 4aca45f 92226->92227 92229 684b680 DrawTextExW 92226->92229 92230 684b670 DrawTextExW 92226->92230 92231 684b76f DrawTextExW 92226->92231 92232 4acd370 DrawTextExW 92226->92232 92233 4acd361 DrawTextExW 92226->92233 92227->92196 92228 4aca4fd 92229->92228 92230->92228 92231->92228 92232->92228 92233->92228 92235 4acd392 92234->92235 92260 4acd5a8 92235->92260 92265 4acd5a7 92235->92265 92236 4acd40c 92236->92218 92240 684b707 92239->92240 92242 684b784 92239->92242 92243 4acd819 DrawTextExW 92240->92243 92244 4acd890 DrawTextExW 92240->92244 92241 684b733 92241->92218 92242->92218 92243->92241 92244->92241 92246 4acd392 92245->92246 92248 4acd5a8 DrawTextExW 92246->92248 92249 4acd5a7 DrawTextExW 92246->92249 92247 4acd40c 92247->92218 92248->92247 92249->92247 92251 684b6a6 92250->92251 92253 4acd819 DrawTextExW 92251->92253 92254 4acd890 DrawTextExW 92251->92254 92252 684b733 92252->92218 92253->92252 92254->92252 92256 684b6a6 92255->92256 92258 4acd819 DrawTextExW 92256->92258 92259 4acd890 DrawTextExW 92256->92259 92257 684b733 92257->92218 92258->92257 92259->92257 92261 4acd5d3 92260->92261 92270 4acd819 92261->92270 92277 4acd890 92261->92277 92262 4acd710 92262->92236 92266 4acd5d3 92265->92266 92268 4acd819 DrawTextExW 92266->92268 92269 4acd890 DrawTextExW 92266->92269 92267 4acd710 92267->92236 92268->92267 92269->92267 92271 4acd827 92270->92271 92272 4acd877 92271->92272 92274 4acd890 DrawTextExW 92271->92274 92285 4acdb89 92272->92285 92291 4acdb98 92272->92291 92273 4acd881 92273->92262 92274->92272 92278 4acd827 92277->92278 92281 4acd8a4 92277->92281 92279 4acd877 92278->92279 92284 4acd890 DrawTextExW 92278->92284 92282 4acdb98 DrawTextExW 92279->92282 92283 4acdb89 DrawTextExW 92279->92283 92280 4acd881 92280->92262 92281->92262 92282->92280 92283->92280 92284->92279 92286 4acdb4b 92285->92286 92287 4acdb92 92285->92287 92286->92273 92296 4acdc70 92287->92296 92301 4acdc61 92287->92301 92288 4acdc2a 92288->92273 92292 4acdbaa 92291->92292 92294 4acdc70 DrawTextExW 92292->92294 92295 4acdc61 DrawTextExW 92292->92295 92293 4acdc2a 92293->92273 92294->92293 92295->92293 92297 4acdc7e 92296->92297 92298 4acdc8d 92297->92298 92306 4acdca8 92297->92306 92312 4acdc98 92297->92312 92298->92288 92302 4acdc7e 92301->92302 92303 4acdc8d 92302->92303 92304 4acdca8 DrawTextExW 92302->92304 92305 4acdc98 DrawTextExW 92302->92305 92303->92288 92304->92303 92305->92303 92307 4acdcbb 92306->92307 92308 4acdcbf 92307->92308 92318 4b96c10 92307->92318 92323 4b96c00 92307->92323 92328 4b96be0 92307->92328 92308->92298 92313 4acdcbb 92312->92313 92314 4acdcbf 92313->92314 92315 4b96c10 DrawTextExW 92313->92315 92316 4b96c00 DrawTextExW 92313->92316 92317 4b96be0 DrawTextExW 92313->92317 92314->92298 92315->92314 92316->92314 92317->92314 92319 4b96c54 92318->92319 92320 4b96d00 92319->92320 92334 4b977a0 92319->92334 92340 4b97790 92319->92340 92320->92308 92324 4b96c54 92323->92324 92325 4b96d00 92324->92325 92326 4b977a0 DrawTextExW 92324->92326 92327 4b97790 DrawTextExW 92324->92327 92325->92308 92326->92325 92327->92325 92329 4b96bf4 92328->92329 92330 4b96c3c 92328->92330 92329->92308 92331 4b96d00 92330->92331 92332 4b977a0 DrawTextExW 92330->92332 92333 4b97790 DrawTextExW 92330->92333 92331->92308 92332->92331 92333->92331 92335 4b977c9 92334->92335 92336 4b977cd 92335->92336 92338 4b97899 DrawTextExW 92335->92338 92339 4b978a8 DrawTextExW 92335->92339 92336->92320 92337 4b977ef 92337->92320 92338->92337 92339->92337 92341 4b977c9 92340->92341 92342 4b977cd 92341->92342 92344 4b97899 DrawTextExW 92341->92344 92345 4b978a8 DrawTextExW 92341->92345 92342->92320 92343 4b977ef 92343->92320 92344->92343 92345->92343 92346 68404e0 92347 6840507 92346->92347 92349 6840725 92347->92349 92350 4acbdd9 9 API calls 92347->92350 92348 6840759 92350->92348 91564 692d137 91565 692d13d 91564->91565 91570 b3fa150 91565->91570 91584 b3fa1c6 91565->91584 91599 b3fa160 91565->91599 91566 692d148 91571 b3fa154 91570->91571 91613 b3fa96c 91571->91613 91619 b3fa6d1 91571->91619 91626 b3fa891 91571->91626 91631 b3fab65 91571->91631 91638 b3fa844 91571->91638 91642 b3fa577 91571->91642 91647 b3fa9a6 91571->91647 91651 b3fa799 91571->91651 91656 b3fa808 91571->91656 91661 b3fa76b 91571->91661 91666 b3fac9a 91571->91666 91572 b3fa182 91572->91566 91585 b3fa154 91584->91585 91586 b3fa1c9 91584->91586 91588 b3fa96c 2 API calls 91585->91588 91589 b3fa76b 2 API calls 91585->91589 91590 b3fac9a 5 API calls 91585->91590 91591 b3fa799 2 API calls 91585->91591 91592 b3fa808 2 API calls 91585->91592 91593 b3fa577 2 API calls 91585->91593 91594 b3fa9a6 2 API calls 91585->91594 91595 b3fab65 5 API calls 91585->91595 91596 b3fa844 2 API calls 91585->91596 91597 b3fa6d1 5 API calls 91585->91597 91598 b3fa891 2 API calls 91585->91598 91586->91566 91587 b3fa182 91587->91566 91588->91587 91589->91587 91590->91587 91591->91587 91592->91587 91593->91587 91594->91587 91595->91587 91596->91587 91597->91587 91598->91587 91600 b3fa17a 91599->91600 91602 b3fa96c 2 API calls 91600->91602 91603 b3fa76b 2 API calls 91600->91603 91604 b3fac9a 5 API calls 91600->91604 91605 b3fa799 2 API calls 91600->91605 91606 b3fa808 2 API calls 91600->91606 91607 b3fa577 2 API calls 91600->91607 91608 b3fa9a6 2 API calls 91600->91608 91609 b3fab65 5 API calls 91600->91609 91610 b3fa844 2 API calls 91600->91610 91611 b3fa6d1 5 API calls 91600->91611 91612 b3fa891 2 API calls 91600->91612 91601 b3fa182 91601->91566 91602->91601 91603->91601 91604->91601 91605->91601 91606->91601 91607->91601 91608->91601 91609->91601 91610->91601 91611->91601 91612->91601 91614 b3fa972 91613->91614 91616 b3fa611 91614->91616 91673 692c890 91614->91673 91677 692c888 91614->91677 91615 b3fa991 91615->91572 91616->91572 91621 b3fa6d7 91619->91621 91620 b3fa611 91620->91572 91621->91620 91681 b3fb288 91621->91681 91687 b3fb298 91621->91687 91693 692c7b8 91621->91693 91697 692c7b1 91621->91697 91627 b3fa899 91626->91627 91713 692ca40 91627->91713 91717 692ca38 91627->91717 91628 b3fa8bb 91632 b3fa6ef 91631->91632 91632->91631 91633 b3fa611 91632->91633 91634 692c7b1 Wow64SetThreadContext 91632->91634 91635 692c7b8 Wow64SetThreadContext 91632->91635 91636 b3fb298 3 API calls 91632->91636 91637 b3fb288 3 API calls 91632->91637 91633->91572 91634->91632 91635->91632 91636->91632 91637->91632 91721 692c948 91638->91721 91725 692c950 91638->91725 91639 b3fa872 91639->91572 91643 b3fa582 91642->91643 91729 692cbd8 91643->91729 91733 692cbcc 91643->91733 91648 b3fa9b3 91647->91648 91650 b3faf98 91647->91650 91648->91650 91737 b3fb311 91648->91737 91650->91572 91652 b3fa7a2 91651->91652 91654 692c950 WriteProcessMemory 91652->91654 91655 692c948 WriteProcessMemory 91652->91655 91653 b3fa9dd 91654->91653 91655->91653 91657 b3fa640 91656->91657 91657->91656 91658 b3fa611 91657->91658 91659 692c950 WriteProcessMemory 91657->91659 91660 692c948 WriteProcessMemory 91657->91660 91658->91572 91659->91657 91660->91657 91662 b3fab05 91661->91662 91663 b3fa611 91662->91663 91664 692c7b1 Wow64SetThreadContext 91662->91664 91665 692c7b8 Wow64SetThreadContext 91662->91665 91663->91572 91664->91663 91665->91663 91668 b3fa6ef 91666->91668 91667 b3fa611 91667->91572 91668->91667 91669 b3fb298 3 API calls 91668->91669 91670 b3fb288 3 API calls 91668->91670 91671 692c7b1 Wow64SetThreadContext 91668->91671 91672 692c7b8 Wow64SetThreadContext 91668->91672 91669->91668 91670->91668 91671->91668 91672->91668 91674 692c8d0 VirtualAllocEx 91673->91674 91676 692c90d 91674->91676 91676->91615 91678 692c890 VirtualAllocEx 91677->91678 91680 692c90d 91678->91680 91680->91615 91682 b3fb298 91681->91682 91701 692c370 91682->91701 91705 692c2c8 91682->91705 91709 692c2d0 91682->91709 91683 b3fb2c0 91683->91621 91688 b3fb2ad 91687->91688 91690 692c2d0 ResumeThread 91688->91690 91691 692c370 ResumeThread 91688->91691 91692 692c2c8 ResumeThread 91688->91692 91689 b3fb2c0 91689->91621 91690->91689 91691->91689 91692->91689 91694 692c7fd Wow64SetThreadContext 91693->91694 91696 692c845 91694->91696 91696->91621 91698 692c7b8 Wow64SetThreadContext 91697->91698 91700 692c845 91698->91700 91700->91621 91702 692c320 ResumeThread 91701->91702 91704 692c37a 91701->91704 91703 692c341 91702->91703 91703->91683 91704->91683 91706 692c2d0 ResumeThread 91705->91706 91708 692c341 91706->91708 91708->91683 91710 692c310 ResumeThread 91709->91710 91712 692c341 91710->91712 91712->91683 91714 692ca8b ReadProcessMemory 91713->91714 91716 692cacf 91714->91716 91716->91628 91718 692ca40 ReadProcessMemory 91717->91718 91720 692cacf 91718->91720 91720->91628 91722 692c950 WriteProcessMemory 91721->91722 91724 692c9ef 91722->91724 91724->91639 91726 692c998 WriteProcessMemory 91725->91726 91728 692c9ef 91726->91728 91728->91639 91730 692cc61 91729->91730 91730->91730 91731 692cdc6 CreateProcessA 91730->91731 91732 692ce23 91731->91732 91734 692cbd8 CreateProcessA 91733->91734 91736 692ce23 91734->91736 91738 b3fb31a 91737->91738 91740 b3fb379 91737->91740 91738->91650 91739 b3fb503 91739->91650 91740->91739 91741 77adaf8 PostMessageW 91740->91741 91742 77adaf0 PostMessageW 91740->91742 91741->91740 91742->91740 92351 77a3d12 92352 77a3ce7 92351->92352 92353 77a3d0c 92352->92353 92354 b3412b7 8 API calls 92352->92354 92355 b3412c8 8 API calls 92352->92355 92354->92353 92355->92353 91743 b2d01c 91744 b2d034 91743->91744 91745 b2d08e 91744->91745 91748 4ac0ad4 12 API calls 91744->91748 91749 4ac2c08 91744->91749 91758 4ac0ab8 91744->91758 91748->91745 91751 4ac2c45 91749->91751 91750 4ac2c79 91752 4ac0bfc 12 API calls 91750->91752 91754 4ac2c77 91750->91754 91751->91750 91753 4ac2c69 91751->91753 91752->91754 91755 4ac2e6c 12 API calls 91753->91755 91756 4ac2da0 12 API calls 91753->91756 91757 4ac2d91 12 API calls 91753->91757 91754->91754 91755->91754 91756->91754 91757->91754 91761 4ac0abd 91758->91761 91759 4ac2c79 91760 4ac0bfc 12 API calls 91759->91760 91763 4ac2c77 91759->91763 91760->91763 91761->91759 91762 4ac2c69 91761->91762 91764 4ac2e6c 12 API calls 91762->91764 91765 4ac2da0 12 API calls 91762->91765 91766 4ac2d91 12 API calls 91762->91766 91764->91763 91765->91763 91766->91763 91767 b34ca1b 91768 b34ca0a 91767->91768 91770 b34ca26 91767->91770 91768->91770 91773 b34cba0 91768->91773 91777 b34cb90 91768->91777 91769 b34ca0f 91774 b34cbb6 91773->91774 91781 b34cef0 91774->91781 91778 b34cb94 91777->91778 91780 b34cef0 DrawTextExW 91778->91780 91779 b34cc2c 91779->91769 91780->91779 91785 b34cf30 91781->91785 91790 b34cf40 91781->91790 91782 b34cc2c 91782->91769 91787 b34cf34 91785->91787 91786 b34cf14 91786->91782 91787->91786 91795 6846d9f 91787->91795 91800 6846da0 91787->91800 91791 b34cf43 91790->91791 91792 b34cf9d 91791->91792 91793 6846da0 DrawTextExW 91791->91793 91794 6846d9f DrawTextExW 91791->91794 91792->91782 91793->91792 91794->91792 91797 6846dc1 91795->91797 91796 6846dd6 91796->91786 91797->91796 91805 6844b5c 91797->91805 91799 6846e41 91802 6846dc1 91800->91802 91801 6846dd6 91801->91786 91802->91801 91803 6844b5c DrawTextExW 91802->91803 91804 6846e41 91803->91804 91807 6844b67 91805->91807 91806 6848349 91806->91799 91807->91806 91811 6848e08 91807->91811 91814 6848e18 91807->91814 91808 684845c 91808->91799 91817 684790c 91811->91817 91815 6848e35 91814->91815 91816 684790c DrawTextExW 91814->91816 91815->91808 91816->91815 91818 6848e50 DrawTextExW 91817->91818 91820 6848e35 91818->91820 91820->91808 92356 77ac208 92357 77ac24c 92356->92357 92358 77ac256 EnumThreadWindows 92356->92358 92357->92358 92359 77ac288 92358->92359 91821 b345100 91822 b345103 91821->91822 91823 b34522d 91822->91823 91824 77acc88 KiUserCallbackDispatcher 91822->91824 91826 77aef10 91822->91826 91824->91823 91827 77aef14 91826->91827 91828 77aefde 91827->91828 91829 77aefdc KiUserCallbackDispatcher 91827->91829 91828->91823 91829->91828 92360 b3f39cb 92361 b3f39da 92360->92361 92362 b3f39e4 92360->92362 92361->92362 92365 b3f3a69 92361->92365 92369 b3f3a78 92361->92369 92366 b3f3a86 92365->92366 92367 b3f3a9a 92366->92367 92368 b3f3a91 KiUserCallbackDispatcher 92366->92368 92367->92362 92368->92367 92370 b3f3a86 92369->92370 92371 b3f3a91 KiUserCallbackDispatcher 92370->92371 92372 b3f3a9a 92370->92372 92371->92372 92372->92362 92373 b34c9c0 92374 b34c9c3 92373->92374 92375 b34ca0f 92374->92375 92376 b34cba0 DrawTextExW 92374->92376 92377 b34cb90 DrawTextExW 92374->92377 92376->92375 92377->92375 91830 77a31c0 91832 77a3205 GetClassInfoW 91830->91832 91833 77a324b 91832->91833 91834 77a0040 91835 77a0078 91834->91835 91843 77a16c0 91835->91843 91848 77a16b0 91835->91848 91836 77a0173 91854 77a1bef 91836->91854 91860 77a1bff 91836->91860 91865 77a1c00 91836->91865 91837 77a0197 91846 24b5c7c 11 API calls 91843->91846 91870 24b83ff 91843->91870 91875 24b8430 91843->91875 91844 77a16d3 91844->91836 91846->91844 91849 77a16c0 91848->91849 91851 24b83ff 11 API calls 91849->91851 91852 24b5c7c 11 API calls 91849->91852 91853 24b8430 11 API calls 91849->91853 91850 77a16d3 91850->91836 91851->91850 91852->91850 91853->91850 91855 77a1bf3 91854->91855 91857 77a1bb6 91855->91857 91880 77a1c40 91855->91880 91886 77a1c32 91855->91886 91856 77a1c1f 91856->91837 91857->91837 91861 77a1c00 91860->91861 91863 77a1c32 11 API calls 91861->91863 91864 77a1c40 11 API calls 91861->91864 91862 77a1c1f 91862->91837 91863->91862 91864->91862 91866 77a1c06 91865->91866 91868 77a1c32 11 API calls 91866->91868 91869 77a1c40 11 API calls 91866->91869 91867 77a1c1f 91867->91837 91868->91867 91869->91867 91872 24b8401 91870->91872 91871 24b83a9 91871->91844 91872->91871 91873 24bce81 11 API calls 91872->91873 91874 24bce90 11 API calls 91872->91874 91873->91871 91874->91871 91877 24b8440 91875->91877 91876 24b8731 91876->91844 91877->91876 91878 24bce81 11 API calls 91877->91878 91879 24bce90 11 API calls 91877->91879 91878->91876 91879->91876 91881 77a1c6e 91880->91881 91883 24b83ff 11 API calls 91881->91883 91884 24b5c7c 11 API calls 91881->91884 91885 24b8430 11 API calls 91881->91885 91882 77a1ca4 91882->91856 91883->91882 91884->91882 91885->91882 91887 77a1c1b 91886->91887 91888 77a1c3a 91886->91888 91887->91856 91890 24b83ff 11 API calls 91888->91890 91891 24b5c7c 11 API calls 91888->91891 91892 24b8430 11 API calls 91888->91892 91889 77a1ca4 91889->91856 91890->91889 91891->91889 91892->91889 92378 77a1f00 92379 77a1f03 92378->92379 92381 24b83ff 11 API calls 92379->92381 92382 24b5c7c 11 API calls 92379->92382 92383 24b8430 11 API calls 92379->92383 92380 77a1f52 92381->92380 92382->92380 92383->92380 92384 692fbe8 92385 692fc0b 92384->92385 92387 77a3020 12 API calls 92385->92387 92388 77a3010 12 API calls 92385->92388 92386 692fc14 92387->92386 92388->92386 91893 77a0d46 91894 77a0d59 91893->91894 91898 4ac84c8 91894->91898 91905 4ac75fc 91894->91905 91895 77a103e 91899 4ac84cb 91898->91899 91902 4ac8476 91898->91902 91900 4ac8545 91899->91900 91911 77a6b50 91899->91911 91915 77a6b3f 91899->91915 91900->91895 91901 4ac850f 91901->91895 91902->91895 91906 4ac7607 91905->91906 91907 4ac8545 91906->91907 91909 77a6b3f 9 API calls 91906->91909 91910 77a6b50 9 API calls 91906->91910 91907->91895 91908 4ac850f 91908->91895 91909->91908 91910->91908 91913 77a6b53 91911->91913 91912 77a6bca 91912->91901 91914 4acbdd9 9 API calls 91913->91914 91914->91912 91916 77a6b4c 91915->91916 91918 4acbdd9 9 API calls 91916->91918 91917 77a6bca 91917->91901 91918->91917

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359782961.0000000004AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4ac0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ($($($)$)$)$)$)$.$4'_q
                                                            • API String ID: 0-3363111672
                                                            • Opcode ID: b3411917d1fca7913325a11f8e3dff21e7777b9e575dba134311c30437c99dd7
                                                            • Instruction ID: 6b4ad74ed39bef7a83af57196915f090dd9952eb47c4db0649ab8ab5d7e69aea
                                                            • Opcode Fuzzy Hash: b3411917d1fca7913325a11f8e3dff21e7777b9e575dba134311c30437c99dd7
                                                            • Instruction Fuzzy Hash: 02628A34A00705CFDB05EF38C994B9977B2BF89304F1086A9D8096F369DB75A989CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 505 4ac76b8-4ac7726 513 4ac7730-4ac7734 call 4ac740c 505->513 515 4ac7739-4ac7768 call 4ac741c 513->515 521 4ac7772-4ac7776 call 4ac742c 515->521 523 4ac777b-4ac781c call 4ac743c * 5 521->523 545 4ac7826-4ac782a call 4ac744c 523->545 547 4ac782f-4ac7847 545->547 550 4ac784e-4ac785b 547->550 551 4ac7861 550->551 552 4ac786b-4ac78a7 call 4ac745c call 4ac746c 551->552 557 4ac78ac-4ac79a6 call 4ac747c call 4ac748c call 4ac749c call 4ac74ac call 4ac74bc 552->557 570 4ac79ab-4ac79ca call 4ac74cc 557->570 573 4ac79cf-4ac7a2c call 4ac74dc 570->573 581 4ac7a37-4ac7a3e 573->581 582 4ac7a4a-4ac7ad1 581->582 590 4ac7ad8-4ac7af2 582->590 591 4ac7af8-4ac7afa 590->591 592 4ac7b04-4ac7b08 591->592 593 4ac7b0e-4ac7b12 592->593 594 4ac7b18-4ac7bdd call 4ac74ec 593->594 595 4ac814b-4ac81d2 593->595 616 4ac7be7-4ac7c20 call 4ac747c 594->616 598 4ac81da-4ac81dc 595->598 709 4ac81e1 call 24b83ff 598->709 710 4ac81e1 call 24b5c7c 598->710 711 4ac81e1 call 24b8430 598->711 601 4ac81e6-4ac8223 call 4ac75fc call 4ac760c 619 4ac7c25-4ac7cd9 call 4ac749c call 4ac74fc call 4ac74ac call 4ac750c call 4ac74bc 616->619 630 4ac7cde-4ac7cec 619->630 631 4ac7cf1-4ac7f0a call 4ac751c * 5 call 4ac752c call 4ac753c call 4ac751c 630->631 658 4ac7f0f-4ac7f4a 631->658 659 4ac7f50-4ac7f87 call 4ac754c 658->659 662 4ac7f8c-4ac7fe1 call 4ac755c call 4ac756c 659->662 666 4ac7fe6-4ac7fe8 call 4ac757c 662->666 668 4ac7fed-4ac7ff7 666->668 705 4ac7ffa call 6840d30 668->705 706 4ac7ffa call 6840d21 668->706 669 4ac7ffd-4ac7fff call 4ac757c 671 4ac8004-4ac800e 669->671 707 4ac8011 call 6840d30 671->707 708 4ac8011 call 6840d21 671->708 672 4ac8014-4ac801b call 4ac758c 674 4ac8020-4ac8036 672->674 676 4ac804e-4ac8110 call 4ac759c call 4ac75ac call 4ac75bc call 4ac75cc call 4ac75dc call 4ac749c call 4ac577c 674->676 677 4ac8038-4ac803e 674->677 698 4ac8117-4ac811f 676->698 678 4ac8040 677->678 679 4ac8042-4ac8044 677->679 678->676 679->676 712 4ac8121 call 4acc218 698->712 713 4ac8121 call 4acc207 698->713 699 4ac8126-4ac8135 call 4ac75ec 714 4ac8137 call 4acc218 699->714 715 4ac8137 call 4acc207 699->715 702 4ac813c-4ac813e call 4ac75ec 704 4ac8143-4ac814a 702->704 705->669 706->669 707->672 708->672 709->601 710->601 711->601 712->699 713->699 714->702 715->702
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359782961.0000000004AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4ac0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ($($($)$)$)$)$)$.$4'_q
                                                            • API String ID: 0-3363111672
                                                            • Opcode ID: 1a6e885c4bc0beb3088ef7c128f33364d8dbc5abb00c7d0c72a76a9557aa943a
                                                            • Instruction ID: 6d81dff52dee49d19cf15f347dafd2f6d24e9ec2e3c315496e42f153a4aa867b
                                                            • Opcode Fuzzy Hash: 1a6e885c4bc0beb3088ef7c128f33364d8dbc5abb00c7d0c72a76a9557aa943a
                                                            • Instruction Fuzzy Hash: 63528A34A00705CFDB04EF38C994A9977B2FF89304F1586A9D8096F369DB75A989CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 767 68403c8-6842760 770 6842766-684276b 767->770 771 6842c43-6842cac 767->771 770->771 772 6842771-684278e 770->772 779 6842cb3-6842d3b 771->779 778 6842794-6842798 772->778 772->779 780 68427a7-68427ab 778->780 781 684279a-68427a4 call 68403d8 778->781 822 6842d46-6842dc6 779->822 785 68427ad-68427b7 call 68403d8 780->785 786 68427ba-68427c1 780->786 781->780 785->786 787 68427c7-68427f7 786->787 788 68428dc-68428e1 786->788 799 6842fc6-6843046 787->799 802 68427fd-6842830 call 68403e4 787->802 793 68428e3-68428e7 788->793 794 68428e9-68428ee 788->794 793->794 798 68428f0-68428f4 793->798 796 6842900-6842930 call 68403f0 * 3 794->796 796->822 823 6842936-6842939 796->823 798->799 800 68428fa-68428fd 798->800 818 684304f-684306c 799->818 819 6843048-684304e 799->819 800->796 815 6842835-68428d0 call 68403e4 802->815 815->788 833 68428d2 815->833 819->818 841 6842dcd-6842e4f 822->841 823->822 827 684293f-6842941 823->827 827->822 830 6842947-684297c 827->830 840 6842982-684298b 830->840 830->841 833->788 842 6842991-68429eb call 68403f0 * 2 call 6840400 * 2 840->842 843 6842aee-6842af2 840->843 847 6842e57-6842ed9 841->847 889 68429fd 842->889 890 68429ed-68429f6 842->890 843->847 848 6842af8-6842afc 843->848 849 6842ee1-6842f0e 847->849 848->849 850 6842b02-6842b08 848->850 865 6842f15-6842f95 849->865 853 6842b0c-6842b41 850->853 854 6842b0a 850->854 859 6842b48-6842b4e 853->859 854->859 864 6842b54-6842b5c 859->864 859->865 871 6842b63-6842b65 864->871 872 6842b5e-6842b62 864->872 924 6842f9c-6842fbe 865->924 873 6842bc7-6842bcd 871->873 874 6842b67-6842b8b 871->874 872->871 883 6842bec-6842c1a 873->883 884 6842bcf-6842bea 873->884 908 6842b94-6842b98 874->908 909 6842b8d-6842b92 874->909 904 6842c22-6842c2e 883->904 884->904 894 6842a01-6842a03 889->894 890->894 895 68429f8-68429fb 890->895 902 6842a05 894->902 903 6842a0a-6842a0e 894->903 895->894 902->903 905 6842a10-6842a17 903->905 906 6842a1c-6842a22 903->906 923 6842c34-6842c40 904->923 904->924 910 6842ab9-6842abd 905->910 911 6842a24-6842a2a 906->911 912 6842a2c-6842a31 906->912 908->799 915 6842b9e-6842ba1 908->915 914 6842ba4-6842bb5 909->914 921 6842adc-6842ae8 910->921 922 6842abf-6842ad9 910->922 919 6842a37-6842a3d 911->919 912->919 958 6842bb7 call 68430f0 914->958 959 6842bb7 call 6843100 914->959 915->914 927 6842a43-6842a48 919->927 928 6842a3f-6842a41 919->928 921->842 921->843 922->921 924->799 933 6842a4a-6842a5c 927->933 928->933 931 6842bbd-6842bc5 931->904 939 6842a66-6842a6b 933->939 940 6842a5e-6842a64 933->940 941 6842a71-6842a78 939->941 940->941 943 6842a7e 941->943 944 6842a7a-6842a7c 941->944 949 6842a83-6842a8e 943->949 944->949 950 6842a90-6842a93 949->950 951 6842ab2 949->951 950->910 953 6842a95-6842a9b 950->953 951->910 954 6842aa2-6842aab 953->954 955 6842a9d-6842aa0 953->955 954->910 957 6842aad-6842ab0 954->957 955->951 955->954 957->910 957->951 958->931 959->931
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1360993619.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6840000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hcq$Hcq$Hcq$Hcq$Hcq
                                                            • API String ID: 0-1692708840
                                                            • Opcode ID: fb08878f06552ad1bc1181a9ca4f3313ebf1f63597bf7084c50ca31d2743bb90
                                                            • Instruction ID: 0a9ddf883e710ff903f47f54f7bf1f37b325af9fdc3973d390691c09dafc5dd3
                                                            • Opcode Fuzzy Hash: fb08878f06552ad1bc1181a9ca4f3313ebf1f63597bf7084c50ca31d2743bb90
                                                            • Instruction Fuzzy Hash: E9424530E042188FDB54EFA9C89479EBBF2AF88304F14859AE509EB355DB349D45CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1136 b348cb8-b348cd7 1138 b348e02-b348e27 1136->1138 1139 b348cdd-b348cfd call b3475cc 1136->1139 1147 b348e2e-b348e5a 1138->1147 1143 b348d0d-b348d16 1139->1143 1144 b348cff-b348d02 1139->1144 1206 b348d18 call b348cb8 1143->1206 1207 b348d18 call b348ca8 1143->1207 1144->1143 1145 b348d04-b348d07 1144->1145 1145->1143 1145->1147 1173 b348e61 1147->1173 1148 b348d1e-b348d20 1149 b348df5-b348dff 1148->1149 1150 b348d26-b348d36 1148->1150 1152 b348d3f-b348d44 1150->1152 1153 b348d38-b348d3d 1150->1153 1156 b348d54-b348d59 1152->1156 1157 b348d46-b348d52 1152->1157 1155 b348d6f-b348d87 call b3475d8 1153->1155 1162 b348d8c-b348d97 1155->1162 1158 b348d6a-b348d6c 1156->1158 1159 b348d5b-b348d68 1156->1159 1157->1155 1158->1155 1159->1155 1164 b348e66-b348e76 1162->1164 1165 b348d9d-b348db0 1162->1165 1171 b348e7f-b348eb2 call b3475f4 1164->1171 1172 b348e78-b348e7e 1164->1172 1169 b348df1-b348df3 1165->1169 1170 b348db2-b348def 1165->1170 1169->1149 1169->1173 1170->1169 1176 b348eb7-b348ec2 1171->1176 1172->1171 1173->1164 1177 b348fbc 1176->1177 1178 b348ec8-b348ed9 1176->1178 1180 b348fc1-b348fc5 1177->1180 1184 b348edf-b348f27 call b347600 1178->1184 1185 b348f89-b348fb5 1178->1185 1182 b348fc7-b348fd6 1180->1182 1183 b348fd9 1180->1183 1182->1183 1200 b348f50-b348f54 1184->1200 1201 b348f29-b348f4e 1184->1201 1185->1177 1202 b348f56-b348f68 call b347600 1200->1202 1203 b348f6d-b348f87 1200->1203 1201->1180 1202->1203 1203->1180 1206->1148 1207->1148
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $(&_q$(cq$Hcq
                                                            • API String ID: 0-3333576452
                                                            • Opcode ID: 39bcfa2af73a806a1a873dc7fb38444ae9e260ff263b533bf4d94e50d718514b
                                                            • Instruction ID: 0ea4692306c118a7d55b83697ffcca7b0f39b06de1e05c42a3f11bd9ad516a14
                                                            • Opcode Fuzzy Hash: 39bcfa2af73a806a1a873dc7fb38444ae9e260ff263b533bf4d94e50d718514b
                                                            • Instruction Fuzzy Hash: FA918F70F002199FDB18DF69C8545AFBBF6EF88710F20852AE415EB254EB35AD45CBA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1329 77aa6e8-77aa74d 1330 77aa753-77aa760 1329->1330 1331 77aac35-77aac9e call 77a2990 1329->1331 1334 77aa766-77aa770 1330->1334 1335 77aaca5-77aacfc call 77a2990 1330->1335 1331->1335 1340 77aad03-77aad5a call 77a2990 1334->1340 1341 77aa776-77aa780 1334->1341 1335->1340 1342 77aad61-77aadb8 call 77a2990 1340->1342 1341->1342 1343 77aa786-77aa790 1341->1343 1345 77aadbf-77aae1c call 77a2990 1342->1345 1343->1345 1346 77aa796-77aa79d 1343->1346 1356 77aae23-77aae91 call 77a2b18 1345->1356 1346->1356 1357 77aa7a3-77aa7a7 1346->1357 1418 77aae99-77aae9b 1356->1418 1419 77aae93-77aae97 1356->1419 1361 77aa7a9-77aa7de 1357->1361 1362 77aa7fe-77aa852 call 77a9804 call 77a9814 1357->1362 1361->1362 1388 77aa7e0-77aa7ef 1361->1388 1396 77aa85b-77aa869 1362->1396 1397 77aa854-77aa85a 1362->1397 1388->1362 1404 77aa7f1-77aa7fb call 77a97f4 1388->1404 1402 77aa86b-77aa890 call 77a3554 call 77a9824 1396->1402 1403 77aa895-77aa8ca 1396->1403 1397->1396 1402->1403 1414 77aa8cc-77aa8d2 1403->1414 1415 77aa8d3-77aa8e4 1403->1415 1404->1362 1414->1415 1420 77aa8f3 1415->1420 1421 77aa8e6-77aa8f1 1415->1421 1422 77aaea0-77aaeae 1418->1422 1419->1422 1424 77aa8f6-77aa928 1420->1424 1421->1424 1430 77aa92a-77aa930 1424->1430 1431 77aa93d-77aa960 1424->1431 1430->1431 1432 77aa932-77aa938 call 77a9830 1430->1432 1436 77aaa28-77aaa32 1431->1436 1437 77aa966-77aa970 1431->1437 1432->1431 1438 77aaa3d-77aaa60 1436->1438 1439 77aaa34-77aaa37 call 77aaf01 1436->1439 1437->1436 1442 77aa976-77aa9a9 1437->1442 1444 77aaa68-77aaa76 1438->1444 1445 77aaa62-77aaa65 1438->1445 1439->1438 1449 77aab7b-77aac0a call 77a2990 call 77a9830 1442->1449 1450 77aa9af-77aaa1e 1442->1450 1451 77aaa78-77aaa86 1444->1451 1452 77aaaac-77aaaba 1444->1452 1445->1444 1449->1331 1450->1436 1451->1452 1457 77aaa88-77aaaaa call 77a9840 1451->1457 1458 77aaad8-77aaaf8 call 692f820 1452->1458 1459 77aaabc-77aaaca 1452->1459 1457->1458 1472 77aaafa-77aab04 1458->1472 1473 77aab4d-77aab5c 1458->1473 1459->1458 1466 77aaacc-77aaad3 call 77a9840 1459->1466 1466->1458 1478 77aab42-77aab47 1472->1478 1479 77aab06-77aab19 call 77a984c 1472->1479 1473->1449 1494 77aab4a call b3f619c 1478->1494 1495 77aab4a call b3f5f11 1478->1495 1496 77aab4a call b3f5f20 1478->1496 1479->1478 1486 77aab1b-77aab3b 1479->1486 1486->1478 1494->1473 1495->1473 1496->1473
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hcq$Hcq
                                                            • API String ID: 0-4088181183
                                                            • Opcode ID: af5a38187783de3dd90651c7885054ee20f99aa29e5ead53d512e2467062a4b7
                                                            • Instruction ID: bf36d0ddb3cd36d19a7eb411c93953040904957cc06e70dac4ebd9c1f70580d6
                                                            • Opcode Fuzzy Hash: af5a38187783de3dd90651c7885054ee20f99aa29e5ead53d512e2467062a4b7
                                                            • Instruction Fuzzy Hash: 8C229170A002199FEB14DBB9C5547AEBBF2AFC8340F2486ADD409AB395DF349D41CB51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR_q
                                                            • API String ID: 0-2241839734
                                                            • Opcode ID: 7c2ebff51df6c9976dc8fd61f69647de91a578e1291431fe82bee40470e29804
                                                            • Instruction ID: 003727945abe53b67686069db38da87d08a50fa8f18fd1d48637540e481798e8
                                                            • Opcode Fuzzy Hash: 7c2ebff51df6c9976dc8fd61f69647de91a578e1291431fe82bee40470e29804
                                                            • Instruction Fuzzy Hash: C8323974B402298FDB58DB28C9547EE76F2AFC8700F1485A8D2099B369DF349D86CF91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'_q
                                                            • API String ID: 0-2033115326
                                                            • Opcode ID: 45929670f80ae7e4736bad02b8a22b93c9539dcb17962b176aa1178d29ca8719
                                                            • Instruction ID: 7d04c51d680f1386dd24fe22b48cda52ad3bd3b8d6035fc294c3d91cef04dc51
                                                            • Opcode Fuzzy Hash: 45929670f80ae7e4736bad02b8a22b93c9539dcb17962b176aa1178d29ca8719
                                                            • Instruction Fuzzy Hash: DF42F574A00229CFDB58DB28C985BE9B3F2FF89700F1541E9D509AB365DA31AD81CF61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1363009853.000000000B3F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B3F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b3f0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hcq
                                                            • API String ID: 0-419967981
                                                            • Opcode ID: 70b1012c739ab3547e3a25d8f9fe09c1ff2743c05b228721846910bbc5dcb6d5
                                                            • Instruction ID: 2d48635be4c719ca6bc579367dfca1fb05c897d2b2ea7acfe33bfdc708ef8fb0
                                                            • Opcode Fuzzy Hash: 70b1012c739ab3547e3a25d8f9fe09c1ff2743c05b228721846910bbc5dcb6d5
                                                            • Instruction Fuzzy Hash: 0CE18C717006519FDB1AEB79C4607AEB7E7AF89700F24446ED2498B390DF35E902CB61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: 4342f50cbeaba36cb54a477e3f90a0f7143bf31aa5ed11c2d30fa00e629c660d
                                                            • Instruction ID: e9087ef6aeb1b60108b924f38dd44762bd17d835dc8aea65369a5c1b5c7b477a
                                                            • Opcode Fuzzy Hash: 4342f50cbeaba36cb54a477e3f90a0f7143bf31aa5ed11c2d30fa00e629c660d
                                                            • Instruction Fuzzy Hash: 6D022D75E00219DFEB14DF64C894B9DB7B6AF99340F10869AD00AB7290EF70AA85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e0bc9cf57e578900cc9c808698a650e6c53990c8c6ce48fbfde07d31dead75e2
                                                            • Instruction ID: 70935e48fcf9145535c54ab9b5048cd3573fb09dcee8de789702eec7f3b085e8
                                                            • Opcode Fuzzy Hash: e0bc9cf57e578900cc9c808698a650e6c53990c8c6ce48fbfde07d31dead75e2
                                                            • Instruction Fuzzy Hash: 6042A178701600DFDB29EB78C55866D7BE2EF89306B2048BDE5079B3A4DA35EC42CB51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9e3f39d26ba939cacf4607119a3e32387db3a87a5a6cf8cee5c7b986183f4bc
                                                            • Instruction ID: b214d2dbc09d3cdd7328a32994e2a9316f0a0fe295c81727c490c64935a24c67
                                                            • Opcode Fuzzy Hash: b9e3f39d26ba939cacf4607119a3e32387db3a87a5a6cf8cee5c7b986183f4bc
                                                            • Instruction Fuzzy Hash: D9521835900629DFDB25DF65C844AA9B7F1FF49304F2485E9E409AB261EB31EE81CF40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1363009853.000000000B3F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B3F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b3f0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f06e8a62b421a3964e9083dadb9d65db7724540a5cebc02892022efd141502c
                                                            • Instruction ID: a0fcfafe3c88eedadb8aece14e089eb01e830e32cccb46a07bfcb5191532def6
                                                            • Opcode Fuzzy Hash: 0f06e8a62b421a3964e9083dadb9d65db7724540a5cebc02892022efd141502c
                                                            • Instruction Fuzzy Hash: 15324B3590061ACFDB25DF68C944BD9B7B2FF89304F1485EAE509AB221DB71AA84CF40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: DispatchMessage
                                                            • String ID:
                                                            • API String ID: 2061451462-0
                                                            • Opcode ID: 0dfe537be70a3a3136c78eb9c404081f6a1846644cacdb27758cdbc1474b9c70
                                                            • Instruction ID: 5836f24ce7005e26a7416271d8a3371856fd577f4bad2c2f0e37c3572eaa93c3
                                                            • Opcode Fuzzy Hash: 0dfe537be70a3a3136c78eb9c404081f6a1846644cacdb27758cdbc1474b9c70
                                                            • Instruction Fuzzy Hash: 97F15A30A00209DFDB14DFA9C949BADBBF1FF89704F2581A9E405AB365DB70E945CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3c061bfa5dd520546687f61cbec4c789c5dcdcb0c98d28823f2701ed24257ca4
                                                            • Instruction ID: 9ff0d3a8f404a0aed531ab4bf790961c19b8145e2aa179870a4ffcedb716973a
                                                            • Opcode Fuzzy Hash: 3c061bfa5dd520546687f61cbec4c789c5dcdcb0c98d28823f2701ed24257ca4
                                                            • Instruction Fuzzy Hash: 3BE13CB0E00219DFEB25DFB5C544A9DBBF2AF89304F25866DE405AB261DB30A981CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1360993619.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6840000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0e5dc4e2f6b9b019e4a2615e1feef23a877f300eb5e7c130533e10f006e422be
                                                            • Instruction ID: ba489247da74118acb67fd256e385a528977f6e5ad826fb3e89a38aea14f5490
                                                            • Opcode Fuzzy Hash: 0e5dc4e2f6b9b019e4a2615e1feef23a877f300eb5e7c130533e10f006e422be
                                                            • Instruction Fuzzy Hash: 54C16F30D042188FDB55EF68C89079EBBB2BF88314F14C5A9E909EB255DB30DA85CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1363009853.000000000B3F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B3F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b3f0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9436ef80e5577ca4057e623523ad72ecf7f346219d3c7f502b8d5de3e88014ec
                                                            • Instruction ID: 45b0d6d9dde141b22eddb228791342ff46c637c32d5a0e5a206fea281ec828a7
                                                            • Opcode Fuzzy Hash: 9436ef80e5577ca4057e623523ad72ecf7f346219d3c7f502b8d5de3e88014ec
                                                            • Instruction Fuzzy Hash: 39E0C9B494D205DFC7508F44E8546F8B7BCAB4E712F206096D61EA7651D3304984CF41

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1499 4b92ef0-4b93d52 1502 4b93d5b-4b93d6b 1499->1502 1503 4b93d54-4b93e2f 1499->1503 1505 4b93d71-4b93d81 1502->1505 1506 4b93e36-4b93ec8 1502->1506 1503->1506 1505->1506 1507 4b93d87-4b93d8b 1505->1507 1535 4b93ece-4b93ed4 1506->1535 1509 4b93d8d 1507->1509 1510 4b93d93-4b93db2 1507->1510 1509->1506 1509->1510 1512 4b93dd9-4b93dde 1510->1512 1513 4b93db4-4b93dd4 call 4b93054 call 4b92ed0 call 4b92ee0 1510->1513 1514 4b93de0-4b93de2 call 4b93064 1512->1514 1515 4b93de7-4b93dfa call 4b92eac 1512->1515 1513->1512 1514->1515 1525 4b93f0f-4b93f21 1515->1525 1526 4b93e00-4b93e07 1515->1526 1525->1535 1536 4b93f22-4b93f25 1525->1536 1538 4b93ed6-4b93f08 1535->1538 1539 4b93f26-4b93f29 1536->1539 1538->1525 1539->1538 1540 4b93f2a-4b93f33 1539->1540 1543 4b93f36-4b93f3c 1540->1543 1544 4b93f3d-4b93f44 1543->1544 1545 4b93f65-4b93f75 1543->1545 1549 4b93f4c-4b93f62 call 4b93074 1544->1549 1545->1536 1553 4b93f77-4b93f79 1545->1553 1553->1539 1554 4b93f7b-4b93f7d 1553->1554 1554->1543 1556 4b93f7f-4b93fa3 1554->1556 1558 4b93fac-4b93fbe 1556->1558 1559 4b93fa5-4b93fab 1556->1559 1560 4b93fc0 1558->1560 1561 4b93fc5-4b93fda 1558->1561 1560->1561 1563 4b93fdc-4b93fe1 1561->1563 1564 4b93fe4-4b94008 1561->1564 1563->1564 1566 4b9400a 1564->1566 1567 4b94012 1564->1567 1566->1567
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (cq$Hcq
                                                            • API String ID: 0-4250889185
                                                            • Opcode ID: 222aee7849d3429a886754c428a9efd9c2f340e81ededeb66836ae1b5b35f186
                                                            • Instruction ID: ed44f589976909e4c6e0b1850f238fbaec4b97eab722c22b336344202f4b1661
                                                            • Opcode Fuzzy Hash: 222aee7849d3429a886754c428a9efd9c2f340e81ededeb66836ae1b5b35f186
                                                            • Instruction Fuzzy Hash: 6981B571B002059FCF14DF68C8956AEBFF2EF88300F1488AAE90597355DB34AD45C7A1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1568 4b93320-4b93382 call 4b9269c 1574 4b933e8-4b93414 1568->1574 1575 4b93384-4b93386 1568->1575 1576 4b9341b-4b93423 1574->1576 1575->1576 1577 4b9338c-4b93398 1575->1577 1582 4b9342a-4b93579 1576->1582 1577->1582 1583 4b9339e-4b933d9 call 4b926a8 1577->1583 1601 4b9357b-4b93581 1582->1601 1602 4b93582-4b935c8 1582->1602 1593 4b933de-4b933e7 1583->1593 1601->1602 1607 4b935ca-4b935cd 1602->1607 1608 4b935d5-4b93827 1602->1608 1607->1608 1611 4b9382d-4b9383b 1608->1611 1612 4b9383d-4b93843 1611->1612 1613 4b93844-4b938a1 1611->1613 1612->1613 1618 4b938b0-4b938b4 1613->1618 1619 4b938a3-4b938a6 1613->1619 1620 4b938c5 1618->1620 1621 4b938b6-4b938c2 1618->1621 1619->1618 1623 4b938c6 1620->1623 1621->1620 1623->1623
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hcq$Hcq
                                                            • API String ID: 0-4088181183
                                                            • Opcode ID: 63235739c35f366aed101adc70a2b77f438cc73f966c73e90dd16a40a5d8ff65
                                                            • Instruction ID: ed284b0a815ece45deb6e6002aebb79e8b7d9a67e0a631ad710267ae07f22634
                                                            • Opcode Fuzzy Hash: 63235739c35f366aed101adc70a2b77f438cc73f966c73e90dd16a40a5d8ff65
                                                            • Instruction Fuzzy Hash: CD815B71E002189FDF14DFA9C8946EEBBF2FF88310F14856AE409AB355DB349945CBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hcq$Hcq
                                                            • API String ID: 0-4088181183
                                                            • Opcode ID: a4886f10c0e0bef3e01f1d85faded23680941fa16bb24a671d14d3c8db4095a8
                                                            • Instruction ID: 7fa71032f07f9cc4d8a4ed77e47f934fabe3228d1fee32b61a7d928ac3a16820
                                                            • Opcode Fuzzy Hash: a4886f10c0e0bef3e01f1d85faded23680941fa16bb24a671d14d3c8db4095a8
                                                            • Instruction Fuzzy Hash: 30519A31F005199FCF109BA9D8446BEBBF2FBC8324F2444A9E416E7344EB35AD528B91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (cq$Hcq
                                                            • API String ID: 0-4250889185
                                                            • Opcode ID: 7737d491fd6d50a8211e051971c9264fe241954406a1fba042bb795b74be7dd3
                                                            • Instruction ID: aea30b937079073b9291a12de232f9945acb24c7dbdb28d3e2d9b839ae06d25a
                                                            • Opcode Fuzzy Hash: 7737d491fd6d50a8211e051971c9264fe241954406a1fba042bb795b74be7dd3
                                                            • Instruction Fuzzy Hash: D741EC31B00105DFCB445FA8C4585BE7FE7EFC8710B1589AAE50A97394DE309D468791
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0692CE0E
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 16421a327ad5720c6cc80bdd1e02986a7ab9aac0042294c8c89772e0450a3cb8
                                                            • Instruction ID: a0ca7e731d8b2ec4cf1b0bd2c0fc56d1eae4cfd1e7de1ba0f576b6b7e6353384
                                                            • Opcode Fuzzy Hash: 16421a327ad5720c6cc80bdd1e02986a7ab9aac0042294c8c89772e0450a3cb8
                                                            • Instruction Fuzzy Hash: C4A16C71D0022ACFDFA0DF68C841BEDBBB6BF48310F14856AE849A7644DB749985CF91
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0692CE0E
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 0b962b402a7e5213edef15343602d7d7892716b201bb1f26e7b9d79a904a9e54
                                                            • Instruction ID: a212aa20c2ce68c5cff887d2393ab78284f811378ba15a2e8df52bdd0d8a4614
                                                            • Opcode Fuzzy Hash: 0b962b402a7e5213edef15343602d7d7892716b201bb1f26e7b9d79a904a9e54
                                                            • Instruction Fuzzy Hash: 08916C71D0022ACFDFA0DF68C8417EDBBB6BF48314F14856AD809A7644DB749985CF91
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 024BB126
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 426962b34b43e9ce067124f554b036f2ddbb68358958cb7e498f09a07dc4fb8b
                                                            • Instruction ID: 317ed1b8eeaefb2ecb3d0749cc78bde569f0d256ab0456782b5546f9ee38afb9
                                                            • Opcode Fuzzy Hash: 426962b34b43e9ce067124f554b036f2ddbb68358958cb7e498f09a07dc4fb8b
                                                            • Instruction Fuzzy Hash: 157124B0A00B158FDB25DF29D05479ABBF1FF88304F10892EE48A97B50D775E949CBA1
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(00000014,?,?,036E412C,0272B630,?,00000000), ref: 04ACBF46
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359782961.0000000004AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4ac0000_file.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: b959b07fb35fac893dbc0d1602293b97d5c4b80f8aa555bc67324732ce317efd
                                                            • Instruction ID: 0ffdbd03c85e38549dbb3aadffb1ee46c831e40a6e482dfdccf79ce34b56b602
                                                            • Opcode Fuzzy Hash: b959b07fb35fac893dbc0d1602293b97d5c4b80f8aa555bc67324732ce317efd
                                                            • Instruction Fuzzy Hash: 1F718D74A01208EFCB55DF69E485DAEBBB6AF48714B154099F901AB361DB32E881CF60
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: a8e2addeb0263261b40f664e54fad9d19a7ee5671c58e4c67ca808179ab79bbb
                                                            • Instruction ID: fe9e25d076532c6666aa85babcb554f54abadd4ed9f04da2ebe1276fe9a8735b
                                                            • Opcode Fuzzy Hash: a8e2addeb0263261b40f664e54fad9d19a7ee5671c58e4c67ca808179ab79bbb
                                                            • Instruction Fuzzy Hash: 46613E75E0021ACFDB54DFA9C9806AEFBF2BF89314F248569D418A7319D7309942CFA1
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 04AC4381
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359782961.0000000004AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4ac0000_file.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: b50a870a029fc71bf48d885bde1c8da3f62a59671466964fb17d0def199b6256
                                                            • Instruction ID: 0862dd58532f6acd966d1ed621737bd79936d19def8f4041f956338b23df3036
                                                            • Opcode Fuzzy Hash: b50a870a029fc71bf48d885bde1c8da3f62a59671466964fb17d0def199b6256
                                                            • Instruction Fuzzy Hash: 9C4126B4A003099FDB54CF99C858AAEBBF5FB88314F258459E519AB321D374A841CBA4
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 024B59A9
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 5f04315a8fce96a0842b24f1cd23d19fcc464f6d8e93f3d02b9c4a39a0bbb54a
                                                            • Instruction ID: e9bbe103c2b479b42586a7e76aa56238b860f9e781ae9ca310b175d3fe5cfe69
                                                            • Opcode Fuzzy Hash: 5f04315a8fce96a0842b24f1cd23d19fcc464f6d8e93f3d02b9c4a39a0bbb54a
                                                            • Instruction Fuzzy Hash: 0541C1B0C00719CBDB24DFA9C844BDEBBB5BF89304F60806AD408BB255DB756945CFA0
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 024B59A9
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 184b5170d4542768bde9bc72cad43a151208fd193d0dd47c00479509f6023e82
                                                            • Instruction ID: a3e3be2ffa5ea2d49764412cadd5a69ac0208f0903aa195880b6e86b49d74028
                                                            • Opcode Fuzzy Hash: 184b5170d4542768bde9bc72cad43a151208fd193d0dd47c00479509f6023e82
                                                            • Instruction Fuzzy Hash: C241E2B0C00619CBDB24DFA9C9847CDFBB1BF89304F20806AD408BB255DB75694ACF60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 926bb276aafb0f9417c47536b69da7547beaf8815fd416a544c023dec3b7b3f7
                                                            • Instruction ID: d39182d9093151c0ee214ba5ffd52b6485b2862e8ad43c90d75cc4ce905cf23c
                                                            • Opcode Fuzzy Hash: 926bb276aafb0f9417c47536b69da7547beaf8815fd416a544c023dec3b7b3f7
                                                            • Instruction Fuzzy Hash: 8231BEB1804649CFDF12DFA8C8547DEFBF1AF8A308F54419AC045BB255C779A94ACB20
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1360993619.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6840000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateFromIconResource
                                                            • String ID:
                                                            • API String ID: 3668623891-0
                                                            • Opcode ID: b4896c83af7c5cba74007dc17cf73c9568676546fa5263b73204bb066e82409f
                                                            • Instruction ID: e309767269ee44cf0f8d7f21886b0ff4fc9229cf6fe8793e4ed41f3a6c936be4
                                                            • Opcode Fuzzy Hash: b4896c83af7c5cba74007dc17cf73c9568676546fa5263b73204bb066e82409f
                                                            • Instruction Fuzzy Hash: AE318B729003889FCB11DFA9C844AEEBFF4EF09310F14805AFA54AB261C3359955DFA0
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(00000003,00000000,00000000,?,?,?,00000000), ref: 077A512E
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: a32d249a4164dabdf16db9796bcf3e5f99e8048c44f364eef04cb5a2a49500c7
                                                            • Instruction ID: bacfe5ddc1e08ee5ef30fadb70185fbf904b226515be2bad97f1fd09951bb947
                                                            • Opcode Fuzzy Hash: a32d249a4164dabdf16db9796bcf3e5f99e8048c44f364eef04cb5a2a49500c7
                                                            • Instruction Fuzzy Hash: 5F21C175B002019BEB14DB69DC10BBA7766EFC4354F048579E5099B354CB70A825CB90
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,06848E35,?,?), ref: 06848EE7
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1360993619.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6840000_file.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: e29fddc8034ef7a8758d16dfd71e7f1f30e3188786b71545d90e3fb02945611d
                                                            • Instruction ID: a991113b51880b81e1caa25af33eb964da2e76ec114c56384242b0f0652bec52
                                                            • Opcode Fuzzy Hash: e29fddc8034ef7a8758d16dfd71e7f1f30e3188786b71545d90e3fb02945611d
                                                            • Instruction Fuzzy Hash: D831EEB5D0034D9FDB50DF9AD884AAEFBF5FB48320F54842AE919A7210D774A944CFA0
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0692C9E0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 801f7341504fc4397d6313421b2ee6eb0244bcdb3601dc4b67b37090d78a0b26
                                                            • Instruction ID: a889dbd27214fd0602264939633143f33b4dd38cd05feab8168b9054b19592cd
                                                            • Opcode Fuzzy Hash: 801f7341504fc4397d6313421b2ee6eb0244bcdb3601dc4b67b37090d78a0b26
                                                            • Instruction Fuzzy Hash: DE2135B6D003599FCB50DFA9C881BDEBBF5FF48314F10842AE959A7240D7789954CBA0
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,06848E35,?,?), ref: 06848EE7
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1360993619.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6840000_file.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: 14409e78b90177251df05bdeed1b34c13ecf0b7e66fe0c3e830e2bd82f51f780
                                                            • Instruction ID: 96ea1e72b1543b4412dded7d630532ae1e323637e49d0670a73a61427f58dfff
                                                            • Opcode Fuzzy Hash: 14409e78b90177251df05bdeed1b34c13ecf0b7e66fe0c3e830e2bd82f51f780
                                                            • Instruction Fuzzy Hash: EB31E0B5D003499FCB10DF9AD980AEEBBF4BB48310F14842AE919A7210D774A544CFA0
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0692C9E0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: b61197331e67615d962351256a6d5b4cf7326038c32edd66033418165749a0ef
                                                            • Instruction ID: c0fe6ab2690c3e4d74b8be59436ed4ffd6bc6079e0cab93e7310b634ca36620d
                                                            • Opcode Fuzzy Hash: b61197331e67615d962351256a6d5b4cf7326038c32edd66033418165749a0ef
                                                            • Instruction Fuzzy Hash: E12144B5D003599FCB50CFA9C881BEEBBF4FF48310F10842AE959A7240C7789954CBA0
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,024BD366,?,?,?,?,?), ref: 024BD427
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 542118a141fb2892058f491565c496a2a3097fa8a82b6caa299d5b835243c41b
                                                            • Instruction ID: 5ae702b68285a1e14d32407a1ffecaed3dbc85da59ca82f694d6a08fc20603f5
                                                            • Opcode Fuzzy Hash: 542118a141fb2892058f491565c496a2a3097fa8a82b6caa299d5b835243c41b
                                                            • Instruction Fuzzy Hash: 7321E5B5D00248DFDB10CF9AD984ADEBBF4EB48310F14805AE918A3350D374A944CFA4
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,024BD366,?,?,?,?,?), ref: 024BD427
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: a0d3fe44ce90802a30fe7e842230c9de0b0f585892987275816d5023d2daed05
                                                            • Instruction ID: c1b538d7cb69a016b9955f0323712eb80f5394fda220a4bf3bac98d043d2bd50
                                                            • Opcode Fuzzy Hash: a0d3fe44ce90802a30fe7e842230c9de0b0f585892987275816d5023d2daed05
                                                            • Instruction Fuzzy Hash: 5A21E3B5D00259DFDB10CFAAD985ADEBFF4EB48320F14805AE918A7350D378A945CFA1
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0692C836
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: f5c0d4118dbb1ee206bb016a27e07ea5fb8e0a3264427b7ec0d9ab6ea6b51ee6
                                                            • Instruction ID: 1b351b8863f4a4158102dbfaaaa43a5342daa8230dd85225e275423ea0ef1841
                                                            • Opcode Fuzzy Hash: f5c0d4118dbb1ee206bb016a27e07ea5fb8e0a3264427b7ec0d9ab6ea6b51ee6
                                                            • Instruction Fuzzy Hash: 022157B1D002098FCB50DFAAC8857EEBBF4EF48310F10C42AD519A7240D778A949CBA0
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0692CAC0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: e6e30d36f536b85e94e0bc057ff6eae266e9c9bb95ff85e1d1b397b7f8bd6295
                                                            • Instruction ID: ae3bbd0df1828383f9c737edf2b98cac42434f5e8ba57126d97ee7c73e408365
                                                            • Opcode Fuzzy Hash: e6e30d36f536b85e94e0bc057ff6eae266e9c9bb95ff85e1d1b397b7f8bd6295
                                                            • Instruction Fuzzy Hash: 032139B1D003599FCB10DFA9C8416DEFBF4FF48310F10842AE519A3240D7389544CBA0
                                                            APIs
                                                            • GetClassInfoW.USER32(?,00000000), ref: 077A323C
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassInfo
                                                            • String ID:
                                                            • API String ID: 3534257612-0
                                                            • Opcode ID: 2ea719e20686e9d1ba12ecbe59b6965e125789cd76afe9443594ab183e3647ef
                                                            • Instruction ID: dbafd6e6303fefd91cffeaf4a02d175256770a39e9df785661966fd0b5f7d8a2
                                                            • Opcode Fuzzy Hash: 2ea719e20686e9d1ba12ecbe59b6965e125789cd76afe9443594ab183e3647ef
                                                            • Instruction Fuzzy Hash: DE2137B19003099FDB10CF9AD884ADEFBF5FB88350F14842AE918A3340D338A944CB64
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 0B34127D
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 9a9fb73d44f8b71b2056ab35dfc151766a5ced90af32a9ea0bd5c5c5d2faef9e
                                                            • Instruction ID: 094bf76f215ba65eb25c1c88277f16bd94b2d0c26c412d484de29ba88ce52769
                                                            • Opcode Fuzzy Hash: 9a9fb73d44f8b71b2056ab35dfc151766a5ced90af32a9ea0bd5c5c5d2faef9e
                                                            • Instruction Fuzzy Hash: D2219D758043889FDB00CF99C849BDEBFF4EB09310F14805AD858A7251C378A544DFA1
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0692C836
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: d101492f0f485979fe4b8e174c08f8606429282b5214c3e0011ba58bf3b070f6
                                                            • Instruction ID: b1343723890ccbec8b261f9cc01ab94dfefc0f25009bb135144e6994143f42dd
                                                            • Opcode Fuzzy Hash: d101492f0f485979fe4b8e174c08f8606429282b5214c3e0011ba58bf3b070f6
                                                            • Instruction Fuzzy Hash: DF213471D002198FDB50DFAAC8857EEBBF4EF48320F10842AD419A7240DB78A945CBA0
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0692CAC0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 934f47c0ba91b602127103329f38438980f88a1ef4d0c61bf34aa00bca06b099
                                                            • Instruction ID: ecf1ae8006a6b38951a9bec1bbf8067039479c981ba9983668a648bc1930cb27
                                                            • Opcode Fuzzy Hash: 934f47c0ba91b602127103329f38438980f88a1ef4d0c61bf34aa00bca06b099
                                                            • Instruction Fuzzy Hash: E42139B1D003599FCB10DFAAC881AEEFBF5FF48320F10842AE519A7240D7799944CBA0
                                                            APIs
                                                            • GetClassInfoW.USER32(?,00000000), ref: 077A323C
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassInfo
                                                            • String ID:
                                                            • API String ID: 3534257612-0
                                                            • Opcode ID: 4dba695cc2d7596b567aea3b781f116dc3325cd92905d59a8de79c59ff7a8136
                                                            • Instruction ID: e33e8b9db183b1b4bc80114b5b29d1ee960888ae1a40750ecdd3c746e8863c7c
                                                            • Opcode Fuzzy Hash: 4dba695cc2d7596b567aea3b781f116dc3325cd92905d59a8de79c59ff7a8136
                                                            • Instruction Fuzzy Hash: AC2115B1D017599FDB10CF9AD884ADEFBF4FB88310F14852AE818A3240D378A944CBA4
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0B3F3A95
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1363009853.000000000B3F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B3F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b3f0000_file.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: b11dd3c196ad9457340ccc840cbf0056e654eacb03f5708c704798a69d2832c7
                                                            • Instruction ID: 37ce2aa48c997c0535acf7b04d7af054eba61a09448eac46c43a2772a2cf11b5
                                                            • Opcode Fuzzy Hash: b11dd3c196ad9457340ccc840cbf0056e654eacb03f5708c704798a69d2832c7
                                                            • Instruction Fuzzy Hash: 6E1133343145518FCB15AB3EC46496A77EAEFC560032540AAD602CB372DE71DC02CB54
                                                            APIs
                                                            • EnumThreadWindows.USER32(?,00000000,?), ref: 077AC279
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: EnumThreadWindows
                                                            • String ID:
                                                            • API String ID: 2941952884-0
                                                            • Opcode ID: de06323cbe5225e370ce2e65dedf05d025b9718ab6dfc3278c285b4f85f66377
                                                            • Instruction ID: 681b67c1821f88dd05ad5c91e531cbb24a9393d4aa29e65db072520766663d1e
                                                            • Opcode Fuzzy Hash: de06323cbe5225e370ce2e65dedf05d025b9718ab6dfc3278c285b4f85f66377
                                                            • Instruction Fuzzy Hash: EE2129B5D002199FDB14DF9AC844BEEFBF5EB88310F14842AD418A3290D7789945CFA5
                                                            APIs
                                                            • EnumThreadWindows.USER32(?,00000000,?), ref: 077AC279
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: EnumThreadWindows
                                                            • String ID:
                                                            • API String ID: 2941952884-0
                                                            • Opcode ID: 7eb3b322ebc49d713aaf1110984851a5a60ac746269f9e5d9f0d50b356265fdc
                                                            • Instruction ID: dc675da68dfaa8cd6b0f57a44810498577dd9ffbc3298f168a48911ec14e04f2
                                                            • Opcode Fuzzy Hash: 7eb3b322ebc49d713aaf1110984851a5a60ac746269f9e5d9f0d50b356265fdc
                                                            • Instruction Fuzzy Hash: 4C2108B1D002199FDB14DFAAC844BEEFBF5FB88310F14842AD418A3290D778A945CFA5
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 024BB126
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 888dcadd65bc4fdddd3ef930996d131a22a6322438bbd16f30673c8a2558c5a6
                                                            • Instruction ID: c7c7d0e141d08003e6983e53c1fc805d7e7f22dd8fb29f6461e8130f8c575b03
                                                            • Opcode Fuzzy Hash: 888dcadd65bc4fdddd3ef930996d131a22a6322438bbd16f30673c8a2558c5a6
                                                            • Instruction Fuzzy Hash: 2011C171A002049FEB12DF6AD8047EABBF6EFC5358F14846BD558A7251C7749806CFB0
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0B3F3A95
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1363009853.000000000B3F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B3F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b3f0000_file.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 769981cd5be15b06a2c1f9fd00198950bc8628490ecf82136e93b95041c65d74
                                                            • Instruction ID: 824cd44e3215035cb6dcc4f8068074c8da1966026c2643110cc4d44c026c48df
                                                            • Opcode Fuzzy Hash: 769981cd5be15b06a2c1f9fd00198950bc8628490ecf82136e93b95041c65d74
                                                            • Instruction Fuzzy Hash: 68111E343105118FCB19AA3EC55486E77EEAFC9A5032540AAEA02CB3B1EE71DC02CB54
                                                            APIs
                                                            • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,0684311A,?,?,?,?,?), ref: 068431BF
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1360993619.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6840000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateFromIconResource
                                                            • String ID:
                                                            • API String ID: 3668623891-0
                                                            • Opcode ID: 52891935939815d6e2336458228a48c7264691540bb95fea43aadb6f49efc8bb
                                                            • Instruction ID: 23a20ec9cc9f82b61973b79240d08e3fac5b7349b8a233d6e8b27ffbc9fe2a13
                                                            • Opcode Fuzzy Hash: 52891935939815d6e2336458228a48c7264691540bb95fea43aadb6f49efc8bb
                                                            • Instruction Fuzzy Hash: 1A113AB190024D9FDB10DF9AC844BDEBFF8EB48310F14845AEA15A7250D375A954DFA4
                                                            APIs
                                                            • SetWindowTextW.USER32(?,00000000), ref: 077A314A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: TextWindow
                                                            • String ID:
                                                            • API String ID: 530164218-0
                                                            • Opcode ID: 2c8c1ba64c61d26934f46eea842b9f293009d9cbcce0f81f25c2e97f6c277bc2
                                                            • Instruction ID: 59780d1692d9bf1c39d1c96a9dcedbac94935cd3c0e899d67067a9e3dc0813e1
                                                            • Opcode Fuzzy Hash: 2c8c1ba64c61d26934f46eea842b9f293009d9cbcce0f81f25c2e97f6c277bc2
                                                            • Instruction Fuzzy Hash: 471114B6D006499FDB14CF9AC844BDEFBF4EB88310F15842AE859B3640D339A545CFA5
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0692C8FE
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: ab33c6340cd01374ab7b5edcf4b2b292e0ef9836f2f6a429789fecb22e28e49b
                                                            • Instruction ID: 90c69a2f68557a887595760cab4c59e7c27ac238e7db2e7e5f3d6863f110df13
                                                            • Opcode Fuzzy Hash: ab33c6340cd01374ab7b5edcf4b2b292e0ef9836f2f6a429789fecb22e28e49b
                                                            • Instruction Fuzzy Hash: 9A115672D002499FCB20DFAAC845BEEBBF5EF48324F10841AE559A7250C775A944CBA0
                                                            APIs
                                                            • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,0B346022,00000000,00000000,036E412C,0272B630), ref: 0B346470
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePeek
                                                            • String ID:
                                                            • API String ID: 2222842502-0
                                                            • Opcode ID: 86b3e442cdb8d74d1f6803674164a3def268bc4e19938d1791e46015f2f686cc
                                                            • Instruction ID: 2ef232a99829421b116369c8de4fc8d3a2049039926f639168fcb607a9959e01
                                                            • Opcode Fuzzy Hash: 86b3e442cdb8d74d1f6803674164a3def268bc4e19938d1791e46015f2f686cc
                                                            • Instruction Fuzzy Hash: 9B1117B5C00249DFDB10DF9AD944BDEBBF8EB48310F108469E958A3750D378A544CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,00000000,00000000,?,?,?,0B3460AF,00000000,036E412C,0272B630,00000000,?), ref: 0B34680D
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 34c7696826c368df8ce36723a6edb4c6f6d45c0f9ea91b0d331ae06ceff1b385
                                                            • Instruction ID: b4c780ede453351ad93c27e687908884e88eb517f50f9cf6183753ff7cae7b7b
                                                            • Opcode Fuzzy Hash: 34c7696826c368df8ce36723a6edb4c6f6d45c0f9ea91b0d331ae06ceff1b385
                                                            • Instruction Fuzzy Hash: 441114B5C002499FDB10DF9AD884BEEBBF4EB49320F10846AE858A3241D378A544CFA1
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,00000000,00000000,?,?,?,0B3460AF,00000000,036E412C,0272B630,00000000,?), ref: 0B34680D
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: c20d2048ce610127652ad515b460ed2afac07a77097b2316fb3a7ad1859c2d74
                                                            • Instruction ID: 94a2ea89697bffe79704d5a8eb3263c510c9e35d89aca6360137a92c3b5c4ca0
                                                            • Opcode Fuzzy Hash: c20d2048ce610127652ad515b460ed2afac07a77097b2316fb3a7ad1859c2d74
                                                            • Instruction Fuzzy Hash: 1611F6B5C043499FDB10DF9AD845BEEFBF8EB48310F11846AE918A3241D378A544CFA5
                                                            APIs
                                                            • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,0B346022,00000000,00000000,036E412C,0272B630), ref: 0B346470
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePeek
                                                            • String ID:
                                                            • API String ID: 2222842502-0
                                                            • Opcode ID: 8d38aa28cd18b480bfe115c533c0034bbde865cfe30d742153a329de40c50375
                                                            • Instruction ID: 05ab84ae04ac426f9aac74f5f32b03435754b9418c2e55fca6ad1908035569c3
                                                            • Opcode Fuzzy Hash: 8d38aa28cd18b480bfe115c533c0034bbde865cfe30d742153a329de40c50375
                                                            • Instruction Fuzzy Hash: E01126B5D00249DFDB10CF9AD944BEEBBF4FB49320F14846AE958A3250C378A644CFA5
                                                            APIs
                                                            • SetWindowTextW.USER32(?,00000000), ref: 077A314A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: TextWindow
                                                            • String ID:
                                                            • API String ID: 530164218-0
                                                            • Opcode ID: 9d8117f23320db4bf9b21f2e2794ff7d8600d13aaa5ca63b12c4fd5d1d6d1ee1
                                                            • Instruction ID: c6a2f880ff1b1f13fda5e5cd7d9ef42174bd0e5549069f00a1bc7ef3620c16b2
                                                            • Opcode Fuzzy Hash: 9d8117f23320db4bf9b21f2e2794ff7d8600d13aaa5ca63b12c4fd5d1d6d1ee1
                                                            • Instruction Fuzzy Hash: 741126B6D006499FDB10CF9AC844BDEFBF4EB88310F10842AD858B3240D338A545CFA5
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0692C8FE
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 8fde07e02a82d736ed43913a2f83051ef7a87527006362f6f10db3a3aecb6ae9
                                                            • Instruction ID: 1647fbad9762b05cd803dac17c4d371051828a16b36419d307e59147cf734c6b
                                                            • Opcode Fuzzy Hash: 8fde07e02a82d736ed43913a2f83051ef7a87527006362f6f10db3a3aecb6ae9
                                                            • Instruction Fuzzy Hash: 84113775D002499FCB10DFAAC845AEEBFF5EF48324F108419E519A7250C775A954CFA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: c6d8c09dcc9ba20c06589cc78fd117dec0880f31042adc6ac994a82b261fcecc
                                                            • Instruction ID: 5555a790803b674754cf488e88fefd6b38fc07dc104cc9cac35222f4cf2c43e3
                                                            • Opcode Fuzzy Hash: c6d8c09dcc9ba20c06589cc78fd117dec0880f31042adc6ac994a82b261fcecc
                                                            • Instruction Fuzzy Hash: 131146B1D002498FCB20DFAAC8457EEFBF5AB88320F20841AD519A7644C779A945CFA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 69fd9a0a038459cbaad439901ece749a941dff6facf3d82522f0d4017f890bc7
                                                            • Instruction ID: 6a400f28210b3e55e51861198e670be3f070da82e9a6e437d84ee1041004bdb0
                                                            • Opcode Fuzzy Hash: 69fd9a0a038459cbaad439901ece749a941dff6facf3d82522f0d4017f890bc7
                                                            • Instruction Fuzzy Hash: B31128B1D003598BCB20DFAAC8457DEFBF4AB88324F208419D419A7240C6796945CBA1
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 0B34127D
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 326d304f0937148937d35d988b0caff91039fb989013f3924212fb071860b211
                                                            • Instruction ID: 61b7b5c94ade6f867905f5715704afc0e201e44830c0875d036c9a286e0bf7cc
                                                            • Opcode Fuzzy Hash: 326d304f0937148937d35d988b0caff91039fb989013f3924212fb071860b211
                                                            • Instruction Fuzzy Hash: 4B1125B5800749DFDB10CF9AC845BEEBBF8EB48320F108419E918B3250D378A584CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 024BB126
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: f08e3bc62b3be0e739d4f111cdb0eb3f5f1084ededfeaa17d8cd3225ae00d339
                                                            • Instruction ID: a58fff6e3f00262fdf9e7449995c2d29ba41cc6c8302c05a44d8939fe29bad31
                                                            • Opcode Fuzzy Hash: f08e3bc62b3be0e739d4f111cdb0eb3f5f1084ededfeaa17d8cd3225ae00d339
                                                            • Instruction Fuzzy Hash: D411FDB5C002498ACB10DF9AD844ADEFBF4EF88314F11841AD818B7200D379A545CFA1
                                                            APIs
                                                            • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0B346167), ref: 0B346CDD
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: DispatchMessage
                                                            • String ID:
                                                            • API String ID: 2061451462-0
                                                            • Opcode ID: b69d468a7e6ba7d3c7761f14bf6463cd6c6f4ffd56eb146d31d0cd2e45e36e46
                                                            • Instruction ID: f2f0a9b4f927878e4e40ac978d2195b2f8acf1a3732cb0c0e74b606edaae132c
                                                            • Opcode Fuzzy Hash: b69d468a7e6ba7d3c7761f14bf6463cd6c6f4ffd56eb146d31d0cd2e45e36e46
                                                            • Instruction Fuzzy Hash: 7B11F2B5D046499FCB10DF9AD544BDEFBF4EB88314F10846AE818B3240D378A944CFA5
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 077ADB55
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 2fe14e5ccdc3718cddb8333dec10c94fad877691130d40cec3cfac84c6aaa325
                                                            • Instruction ID: 2a7551eaf2e75031cd14f955f40c8cd2099c100d68adf8264de34dac3173c7b1
                                                            • Opcode Fuzzy Hash: 2fe14e5ccdc3718cddb8333dec10c94fad877691130d40cec3cfac84c6aaa325
                                                            • Instruction Fuzzy Hash: C11115B5900349EFDB10DF9AC888BDEFBF8EB48310F108419E518A3600C375A944CFA5
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 077ADB55
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361733323.00000000077A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_77a0000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 9cb2d634bb4206e49a3293ede8e3f68a98f5c156dc357346c777b96dd27ca850
                                                            • Instruction ID: bc0b3425f548fa08c6216e05fce21ea95cbf8e0385be05308d9362367491524e
                                                            • Opcode Fuzzy Hash: 9cb2d634bb4206e49a3293ede8e3f68a98f5c156dc357346c777b96dd27ca850
                                                            • Instruction Fuzzy Hash: A71133B5900349DFDB10CF99D585BDEBBF4EB48320F10841AD958A3600C374A984CFA5
                                                            APIs
                                                            • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0B346167), ref: 0B346CDD
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID: DispatchMessage
                                                            • String ID:
                                                            • API String ID: 2061451462-0
                                                            • Opcode ID: 5297a3a4da1d8603e9b9fb09b726637cb5830c005ffd9162c152a01b47f3ec26
                                                            • Instruction ID: 04950621b3a202f8cd2ada80692e96889427a34faa6afe92199085dff3927c28
                                                            • Opcode Fuzzy Hash: 5297a3a4da1d8603e9b9fb09b726637cb5830c005ffd9162c152a01b47f3ec26
                                                            • Instruction Fuzzy Hash: 9011FEB5C006498ECB14DF9AE5447DEBBF5AB48310F10846AD818A3250D338A944CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 06842422
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1360993619.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6840000_file.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 8676ec58fe0b33a75abe2091b066779138a21a951766c995f1f1c202472016ad
                                                            • Instruction ID: 6b5d5ad231a4b7c4dd482930f119ad129bdfba017acd4d717dc26318cfce5f4a
                                                            • Opcode Fuzzy Hash: 8676ec58fe0b33a75abe2091b066779138a21a951766c995f1f1c202472016ad
                                                            • Instruction Fuzzy Hash: 5BE06D707546145FD766AB34A81486A3BB9EF89D6435140AAE806CF2A1DE60DC03C794
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 06842422
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1360993619.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6840000_file.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 5f3e58d3570834859876e3e865a3c5ef1948dd2113cf80d2270a837aeb637281
                                                            • Instruction ID: 7b59510ee3af9a7e5a4fbdff25646b2ab83fd27e982607fc1ac6c19cec118f66
                                                            • Opcode Fuzzy Hash: 5f3e58d3570834859876e3e865a3c5ef1948dd2113cf80d2270a837aeb637281
                                                            • Instruction Fuzzy Hash: 71E026317243280B96A4BB398824C3F76ADEFC8E68340482EF906CB354CD20EC02C2D8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: cTM
                                                            • API String ID: 0-1667893526
                                                            • Opcode ID: 964b583824ec63c4b1394fc25d50a6c4a6662018ff46745c629633ab7204ff5f
                                                            • Instruction ID: a085ab21932664258acdb19c521c088a955adabb360e8be8a9d7dfcddec34ba9
                                                            • Opcode Fuzzy Hash: 964b583824ec63c4b1394fc25d50a6c4a6662018ff46745c629633ab7204ff5f
                                                            • Instruction Fuzzy Hash: 2F91FEB1D003589FDB14CFA9C884ADEBBF1FF49304F24816AE808AB255E7746949CF91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (cq
                                                            • API String ID: 0-301743287
                                                            • Opcode ID: 40747267a25564fc9feaa44a9999c5b80d5f7a6371de65b1594b73bad297f9e1
                                                            • Instruction ID: 509e0ce24456dcb200bccd91e3e08c4815779798bb18c44d1b0c1ed73abba3bc
                                                            • Opcode Fuzzy Hash: 40747267a25564fc9feaa44a9999c5b80d5f7a6371de65b1594b73bad297f9e1
                                                            • Instruction Fuzzy Hash: 3241D0357046604FEF29ABB8952416E3BE3EFC971471544FAD80ACB395EF24ED028395
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: cTM
                                                            • API String ID: 0-1667893526
                                                            • Opcode ID: c1b3916d46f9c8662c07cda624620b591fba988a9afd4247f710b35c300f2aca
                                                            • Instruction ID: cf69abfc25009b5e250c4b435abb5ff59493bd9d42b1f8e9bd4b67c4a17bef54
                                                            • Opcode Fuzzy Hash: c1b3916d46f9c8662c07cda624620b591fba988a9afd4247f710b35c300f2aca
                                                            • Instruction Fuzzy Hash: 3941D1B1D00209DBDF20CFA9C984A9DBBF5FF48304F248169D808BB214D7756A49CF90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: cTM
                                                            • API String ID: 0-1667893526
                                                            • Opcode ID: 8edb67097de6f9a3624bb3fef280272cc81345851b85a7e5de1e1a66f6a01040
                                                            • Instruction ID: 05889d0627e19c7a016a2a312a3a297bf3896c2ad0e0fd295d5a07fb4527e852
                                                            • Opcode Fuzzy Hash: 8edb67097de6f9a3624bb3fef280272cc81345851b85a7e5de1e1a66f6a01040
                                                            • Instruction Fuzzy Hash: EE41BFB1D00209DBDF20DFA9C984A9EBBF5FF48304F24816AD408BB255D7756A4ACF94
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: cTM
                                                            • API String ID: 0-1667893526
                                                            • Opcode ID: 1b701cbb754ce3393580815d893caeac6d1d36595d25ee0e73ef0ac246b93c44
                                                            • Instruction ID: 7e5d561f190153b4966e290c0d9e6192f6ecd60cd00a56f28d00aedbb191a9c6
                                                            • Opcode Fuzzy Hash: 1b701cbb754ce3393580815d893caeac6d1d36595d25ee0e73ef0ac246b93c44
                                                            • Instruction Fuzzy Hash: 1B210771A002048FDB05DF78C4485AFBBE6EF85314715C9EAE506DB351EB71ED0A8BA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hcq
                                                            • API String ID: 0-419967981
                                                            • Opcode ID: fcc9f889852de8f179195ddf7d1c66ea10c0a4649df4696115d90a46881c3b47
                                                            • Instruction ID: 6e6b5160050a5dcc3bad4762bdf6c8cf9880f184d196b1c7bf7d1a5d1b8614c3
                                                            • Opcode Fuzzy Hash: fcc9f889852de8f179195ddf7d1c66ea10c0a4649df4696115d90a46881c3b47
                                                            • Instruction Fuzzy Hash: 2B218030740204AFDB28EB78C49496F7BE6EF89710B5448AEE40ADB755DE35EC46C7A0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: cTM
                                                            • API String ID: 0-1667893526
                                                            • Opcode ID: cee616999b57550930f0eed06bfb52a3fb6b22cc8f4540d99a50842227f8ee96
                                                            • Instruction ID: 3be514f0855b829dadb4bee73ffb13fb86641e11d3f130399b420bb9a734e927
                                                            • Opcode Fuzzy Hash: cee616999b57550930f0eed06bfb52a3fb6b22cc8f4540d99a50842227f8ee96
                                                            • Instruction Fuzzy Hash: 1321E771A001049FCB04EF68D4455AEBBF6EF84714B1089EAE9069B315EF71EE098B91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73bd401a5dfcebaaeefd1e806015bd16eef01935fb257888c9842b1129f90c52
                                                            • Instruction ID: 3565b0b7a795f1fc1f4634488257e95ebbaf209a429474a8da0b59367a94d4a2
                                                            • Opcode Fuzzy Hash: 73bd401a5dfcebaaeefd1e806015bd16eef01935fb257888c9842b1129f90c52
                                                            • Instruction Fuzzy Hash: DC722C31E10609CFDB14EF68C89469DBBB1FF45304F0586A9D549AB265EB30AEC5CF81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fe64d81e10a82556aa22a57f2f4d14f01595605c997cbfee23bd5f5f734e1095
                                                            • Instruction ID: fd06babd30faaa538768c8772c4b19071394e25dc2103c3a84357229f4eb2ca3
                                                            • Opcode Fuzzy Hash: fe64d81e10a82556aa22a57f2f4d14f01595605c997cbfee23bd5f5f734e1095
                                                            • Instruction Fuzzy Hash: 1F42B331E1061ACBDF14DFA8C89469DB7F1FF89304F1586A9D459BB261EB30AE85CB40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8469164397b21efa29d61f2fbdcf2538a4b193b9a383a6b62eb9fb5f63d96082
                                                            • Instruction ID: 1c29f6ade773e583a62d7f14586028272eabbdb0de174d1951e5e4d5e7075806
                                                            • Opcode Fuzzy Hash: 8469164397b21efa29d61f2fbdcf2538a4b193b9a383a6b62eb9fb5f63d96082
                                                            • Instruction Fuzzy Hash: C422F234A00615CFDB14DF69D894A9DBBF2FF89304F1486B9E40AAB365EB30AD45CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9e884ef07cd4e473f2a79b46c44c03e8fcad5e0b151124ee50c35dd386452d2e
                                                            • Instruction ID: 10e953bd30929a7879d77c2f70f98e470a5b88d9f4b9cab2f58c21579e4caeca
                                                            • Opcode Fuzzy Hash: 9e884ef07cd4e473f2a79b46c44c03e8fcad5e0b151124ee50c35dd386452d2e
                                                            • Instruction Fuzzy Hash: FFE1CD78705200DFDB29DF78C45866D7BF2EF89706B2448BAE50A9B3A0DA35EC41CB51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 324749e146326d58f641a4d3ea0478bb677f0de59fa2feb25666929e5149f084
                                                            • Instruction ID: fd4a6069fab9ababf25268d3ab771567398c0dab224ee57ce26f8e37a4a8892d
                                                            • Opcode Fuzzy Hash: 324749e146326d58f641a4d3ea0478bb677f0de59fa2feb25666929e5149f084
                                                            • Instruction Fuzzy Hash: 44E1E431E10619CBDF24DFA8C8946EDB7F1FF89304F1586A9D419AB251EB30AE85CB40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 099564d7cdba19da29b08d3fceb60b732cfbf26649ab9e2e94cdca976834e9f1
                                                            • Instruction ID: eb86a149e6053dd3e5f2fad49fc0eb67cc511a2ae3aea0eafe3629d53610826c
                                                            • Opcode Fuzzy Hash: 099564d7cdba19da29b08d3fceb60b732cfbf26649ab9e2e94cdca976834e9f1
                                                            • Instruction Fuzzy Hash: 5AE1E231E10619CBDF24DFA8C8946EDB7F1FF89314F1586A9D419AB261EB30AD85CB40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ae7e19bc801b04ca86d4f5cf939e0de1be8abef513b0fa1386233c00bec75b8a
                                                            • Instruction ID: 4b60d4af55d2e6fd467b501c72cf452c62e3a0cb12960e6348a711359ac18c9c
                                                            • Opcode Fuzzy Hash: ae7e19bc801b04ca86d4f5cf939e0de1be8abef513b0fa1386233c00bec75b8a
                                                            • Instruction Fuzzy Hash: E7C1C434E106198FCF14DF69C894A9DB7B1FF89304F1586A9D449AB261EB30BE85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c2bc2e7448167683a11b0856851098deb49c8939f9b227bc8ab3675ab1b4acca
                                                            • Instruction ID: 00cf5949f57776501522b45ba106892cc3af8e39788575555af7d2c9297de294
                                                            • Opcode Fuzzy Hash: c2bc2e7448167683a11b0856851098deb49c8939f9b227bc8ab3675ab1b4acca
                                                            • Instruction Fuzzy Hash: B6A1D735E10619CFCB14DF68C884A98B7B1FF89304F1586E9D449AB221EB71BD89CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d3f667ac527eb6a10cfdafcd4a1e048d106a268df55cc574780c567bfe548203
                                                            • Instruction ID: a705902158629483f1c03314d08d67021af9505091ff9f037c9360ff83a2a38c
                                                            • Opcode Fuzzy Hash: d3f667ac527eb6a10cfdafcd4a1e048d106a268df55cc574780c567bfe548203
                                                            • Instruction Fuzzy Hash: 8C91D57590060ADFDB41DF68C884999FBF5FF89310B14879AE819AB355EB30E985CF80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f41fd8f63293394f902b9ce88e0d9b812d96995af0602dd92233ff3eae47f4ef
                                                            • Instruction ID: 14b5708fe533053c7ebac02ecb5de658541785939bf5ab8a138206f44cf52773
                                                            • Opcode Fuzzy Hash: f41fd8f63293394f902b9ce88e0d9b812d96995af0602dd92233ff3eae47f4ef
                                                            • Instruction Fuzzy Hash: 455128347002158FDB18EF69D8949AE7BF6FF89704B1444A9D406EB361DB35EC06CB60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5b86dce77d8f89adfb043c76071182abff8b89a95c6944f4629876611635b8e0
                                                            • Instruction ID: c83fac0be660c4efd29fbe6c1621ee77e61ca19f12ca0d7954cb3f83c9f287b5
                                                            • Opcode Fuzzy Hash: 5b86dce77d8f89adfb043c76071182abff8b89a95c6944f4629876611635b8e0
                                                            • Instruction Fuzzy Hash: 7A71CCB9300A008FCB18DF29C488959BBF2FF8971571589A9E54ACB372DB72EC45CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 00b1f3af9cf9a8c07d98c12c3aa37adcc6db541c16fe014501766fefd9291b74
                                                            • Instruction ID: ae78296a50c19612747c32aeca6c37a0f62d083fd03caeb59f40a70b77ec9046
                                                            • Opcode Fuzzy Hash: 00b1f3af9cf9a8c07d98c12c3aa37adcc6db541c16fe014501766fefd9291b74
                                                            • Instruction Fuzzy Hash: 6371E0B9700A008FCB18DF29C488959BBF2FF8931471589A9E54ACB372DB72EC45CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 86fbf679ad0419e71c11fad59430563507b867544a875303339b1bad49e86bd6
                                                            • Instruction ID: 7248a6a921c94742d04eaf697b4b39a9d67088f63bf83a396a16775ab05293b2
                                                            • Opcode Fuzzy Hash: 86fbf679ad0419e71c11fad59430563507b867544a875303339b1bad49e86bd6
                                                            • Instruction Fuzzy Hash: 36719EB4A012068FCB04DF69D584999FBF1FF49314B1986A9E84ADB316E734EC85CF90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: daea2985188545a0be825397c89db5ef7acca922b6bf3626c00f190b763145af
                                                            • Instruction ID: 20a85d55e47faee5336df95c7ae8adef1c767a5bb650459da40d2b0a47d21040
                                                            • Opcode Fuzzy Hash: daea2985188545a0be825397c89db5ef7acca922b6bf3626c00f190b763145af
                                                            • Instruction Fuzzy Hash: 466145306106008FDB14EF69D898B9D77F2FF89314F1486B9E51A9B3A5DB70AD098B60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 094baf64793f438d87a6338f3182dc5e5c250556b4113dacdf1969331267942e
                                                            • Instruction ID: a626dfb576e1181d21e1eb048d4db1296e274cc00629a037078710b8f68f9089
                                                            • Opcode Fuzzy Hash: 094baf64793f438d87a6338f3182dc5e5c250556b4113dacdf1969331267942e
                                                            • Instruction Fuzzy Hash: A4615E34A10619DFDF00EFA8D8549AEFBB1FF89300F108569E446A7354EB34AD95CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c2ec9e91c3a07fe5d556c524867f968e7612155477c3efd62a4cfe07e805f335
                                                            • Instruction ID: ef165d44c7f7fe9bd82921d908ce2f219b0d7956f94b9317c85a9943bc5ea673
                                                            • Opcode Fuzzy Hash: c2ec9e91c3a07fe5d556c524867f968e7612155477c3efd62a4cfe07e805f335
                                                            • Instruction Fuzzy Hash: 0C615D34A10619DFDF00EFA8D8549AEFBB5FF89300F108569E446A7354EB34AD95CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a3ceb3df8d5529b55e42b1fe420d96ffcef6da7ef8fd8783f873b6b6d7cd645f
                                                            • Instruction ID: f9f4d67b6a6f4df210a7d8d1c90434521f35b510703478db7a1ae62d35a875e6
                                                            • Opcode Fuzzy Hash: a3ceb3df8d5529b55e42b1fe420d96ffcef6da7ef8fd8783f873b6b6d7cd645f
                                                            • Instruction Fuzzy Hash: 8D515171E002499FDF54DFA9C844AAFBBF5EF88310F14886AE455E7250DB74AD05CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: da3e71fc5cbb16d212e2422c71e1ced62b1f9bfdb572d7354d0c3daf44d1a3dc
                                                            • Instruction ID: 52a34ef7141818f1c50ca53dbc33bdcbd1683fcb71b5a7c6e4b164c0e6369a0b
                                                            • Opcode Fuzzy Hash: da3e71fc5cbb16d212e2422c71e1ced62b1f9bfdb572d7354d0c3daf44d1a3dc
                                                            • Instruction Fuzzy Hash: 6461E77590070ACFCB51EF68C884999FBF1FF49310B14879AE859EB255EB70E985CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9ddd76930af426d8919768aeff24331a027ac44a327c4c8b3687ecc658cb692
                                                            • Instruction ID: 0616da63c578ab37fc2d8bd13fc30b0a6ec336609b947fc9b59921c581e7dd05
                                                            • Opcode Fuzzy Hash: b9ddd76930af426d8919768aeff24331a027ac44a327c4c8b3687ecc658cb692
                                                            • Instruction Fuzzy Hash: 00513575A00259DFCF04DF94D984AADBBB0FF88310F1581A9E806AB254E770AE55CF90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ace4c5b9486d95617f36ac3a4cc1d59675a98baf023bcea646ffd1ff854f50a
                                                            • Instruction ID: d66a228cbeff93aaf1b044fef4223e03726a9cd3277e453ffe837358aba1176a
                                                            • Opcode Fuzzy Hash: 3ace4c5b9486d95617f36ac3a4cc1d59675a98baf023bcea646ffd1ff854f50a
                                                            • Instruction Fuzzy Hash: ED318B70A02208DFCF18DFA4E5945AEFBB2FF89304F1185AAE44267264CB30AC56CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9fcf6380a6b20bdc49d757dbc724938778bd4266be15e4f1ed02785cfadf67a4
                                                            • Instruction ID: 1627f6155932977ab122b3158d6be93d1f026a1d5cd4339f71d3c30c588020c9
                                                            • Opcode Fuzzy Hash: 9fcf6380a6b20bdc49d757dbc724938778bd4266be15e4f1ed02785cfadf67a4
                                                            • Instruction Fuzzy Hash: 3E413F34A10719CFCB04EF78C4949DDBBB2FF89304F0185A9E519AB365EB71A946CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1f8f423e69bf75700da80b80e007e88d83aa7730d024b104d710d7505d466064
                                                            • Instruction ID: ef43f414b8722fe0b7a4195381e28f1768e7107f2494dfae246586df294f7a99
                                                            • Opcode Fuzzy Hash: 1f8f423e69bf75700da80b80e007e88d83aa7730d024b104d710d7505d466064
                                                            • Instruction Fuzzy Hash: 82411D34A10709CFCB04EF78C99499DBBB6FF89304F018569E519AB325EB71A946CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 794afc97cb30bb64a6cbd8b805298ebe1a06882c478254062bfbaae3c7f182ba
                                                            • Instruction ID: edb01f7f04affde46cebbcec9b6da35391908877787b6b1aea5a997c0b5e5406
                                                            • Opcode Fuzzy Hash: 794afc97cb30bb64a6cbd8b805298ebe1a06882c478254062bfbaae3c7f182ba
                                                            • Instruction Fuzzy Hash: B9411DB4A012068FCB15DF68C5C4999FBF1FF4A350B1986A9D849DB352E734EC46CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 35892c5832d60d5a41d7d4515fe7f6af40f3aac0d03e2de7dfbe941796d40dba
                                                            • Instruction ID: fca2720fed0f17953599060cd4a341e0d6db35335af93d60353f0112756d4a1f
                                                            • Opcode Fuzzy Hash: 35892c5832d60d5a41d7d4515fe7f6af40f3aac0d03e2de7dfbe941796d40dba
                                                            • Instruction Fuzzy Hash: 7541F675A0020ADFCB44DF68D98499AFBB5FF49314B14C6A9E918EB311E730E985CF90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6a2938cb9d702875aa89533a5861514c907450817fbfcd11555024559e1db727
                                                            • Instruction ID: b17519fc8c1843db94e260489a2e6c3b5a2aa205a781c4299c06296067b651a0
                                                            • Opcode Fuzzy Hash: 6a2938cb9d702875aa89533a5861514c907450817fbfcd11555024559e1db727
                                                            • Instruction Fuzzy Hash: 2741BEB0D103589BDB14CFAAC884A9EFBF1FF48714F20826AE818BB254D7746945CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 23351ca82739defad93077f4922f2e772fa49bc973e41b9574a4eb718f9459a5
                                                            • Instruction ID: 49706731c10dfa2cb562844c74d4088cb4255fe044194e67196256298b9fe147
                                                            • Opcode Fuzzy Hash: 23351ca82739defad93077f4922f2e772fa49bc973e41b9574a4eb718f9459a5
                                                            • Instruction Fuzzy Hash: 1E314B75B101049FEB18DB69C8949AEBBF5EF8C720F1540A9E805E7361DA31ED01CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f3a6099e7ddd47c4c683285e73f8a3c13436a3ffecdbd6d52072a6d03fe10be2
                                                            • Instruction ID: e0dc1fee25c82cd03ddcbf5da1ac365b6eaddbb4d390b47a0fb5c3aeeec87504
                                                            • Opcode Fuzzy Hash: f3a6099e7ddd47c4c683285e73f8a3c13436a3ffecdbd6d52072a6d03fe10be2
                                                            • Instruction Fuzzy Hash: 05410575A0020ADFCB44DF68D98499EFBB5FF49314B14C6A9E918AB311E730A985CF90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8cfce1a87767bcba92dbdbc7c1d579de6705d13643fc1b6478be58dae4269182
                                                            • Instruction ID: dee78f841944e7ef95b7f26d9e234963af8a392fefb5b65f105058a201078517
                                                            • Opcode Fuzzy Hash: 8cfce1a87767bcba92dbdbc7c1d579de6705d13643fc1b6478be58dae4269182
                                                            • Instruction Fuzzy Hash: C8317C35B11219DFCF04EFA8D8448DDB7B6FF88224B048569E506AB310EB35BD06CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4d00639f61e13e23d321bc1eaa39f4a494515c85a1855a4e64dd42f5c067fd88
                                                            • Instruction ID: 675bd8033a1812fec3a553487218711434c10daec526cf04a7a20eb7846294a7
                                                            • Opcode Fuzzy Hash: 4d00639f61e13e23d321bc1eaa39f4a494515c85a1855a4e64dd42f5c067fd88
                                                            • Instruction Fuzzy Hash: 252171323541118FDB149B2DC8C86697BE5EF89721B1985F6E10ADF3A6EA35EC048B90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8832936750ebb0d982d6425919b34ce48d5ab6d7136875d5367d85caf6f107c6
                                                            • Instruction ID: 23bca5a89520cfa70b3e99e33498080d2ff386cb89327669a39c7f56de810189
                                                            • Opcode Fuzzy Hash: 8832936750ebb0d982d6425919b34ce48d5ab6d7136875d5367d85caf6f107c6
                                                            • Instruction Fuzzy Hash: AE21A271E005466FDF15DBA9C8409BFBBFAEFD8304B1089AAE455D3254DA709E01C7A0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 104da5e9638a0decf9ab18fe1e83f4ab8b8831acffd34ad2db41e95e1e1e3d96
                                                            • Instruction ID: 5dee005f776f9ec236bac36055e38d86cafb6b185776e652cf539700b04aef06
                                                            • Opcode Fuzzy Hash: 104da5e9638a0decf9ab18fe1e83f4ab8b8831acffd34ad2db41e95e1e1e3d96
                                                            • Instruction Fuzzy Hash: 7921AC347042508FCB19AB28D49896E7FE2FFC971072485AEE406CB3A1DB34EC0AC761
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f22c4386517e0257f46da03db3c38a21414df02e60f1fd1102df4a6d9f027843
                                                            • Instruction ID: 09b1fd839cfe7aa64cb1b20c4e0d4fed58ff54bf4b41aa155dadd494e88601a7
                                                            • Opcode Fuzzy Hash: f22c4386517e0257f46da03db3c38a21414df02e60f1fd1102df4a6d9f027843
                                                            • Instruction Fuzzy Hash: E1215E71B04505AFEB14DF7A9844A6BBBF6EFC4210B1481B9E509C7255EE35FC028BA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 14a4d6b82df5a146220bf36c3bb3c36092c7c15602702c2c455604eeec42f3fd
                                                            • Instruction ID: 5096be311009deab10765dc07d2fab5dfb21432295d704176910a4d625a5c23b
                                                            • Opcode Fuzzy Hash: 14a4d6b82df5a146220bf36c3bb3c36092c7c15602702c2c455604eeec42f3fd
                                                            • Instruction Fuzzy Hash: FE21C575E002099FEF05DFB9C8905EEBBF6EF8C200B14457AC405F7255EB3099028762
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1356936156.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b1d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 83f9cbac6e80f388a30da3ae97931e1c1ed836aad584b9844217c1f15b3821a0
                                                            • Instruction ID: a9b1ca81da2eea8875e67a818630374cc6adc0491d78ed81c6ee7a4829844866
                                                            • Opcode Fuzzy Hash: 83f9cbac6e80f388a30da3ae97931e1c1ed836aad584b9844217c1f15b3821a0
                                                            • Instruction Fuzzy Hash: 58213A71504204DFDB05DF14D9C0B56BFA5FB98314F60C5A9E9090B35AC336E896C7A2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1356979508.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b2d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec4e6cc8a4e52e239937f197fb86f4c7081df9fd74b4dd8d0f966f05dea1106a
                                                            • Instruction ID: 687b97dd4dba44f861785f905f6d3c66771ec94e166394779703d1f310acdace
                                                            • Opcode Fuzzy Hash: ec4e6cc8a4e52e239937f197fb86f4c7081df9fd74b4dd8d0f966f05dea1106a
                                                            • Instruction Fuzzy Hash: 81210471604204EFDB05DF14E9C0B26BBA5FB88314F30C9ADE80D4B296C33AD806CA61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1356979508.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b2d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a563e72106b4b4f456b5deb676d3f15287d1c47f425ace7dd10e3b028b246a24
                                                            • Instruction ID: 63fcbe9aa7ae7bc1b610ab54fed25ef6467019ffed8a9d0cd48018f44c6ed474
                                                            • Opcode Fuzzy Hash: a563e72106b4b4f456b5deb676d3f15287d1c47f425ace7dd10e3b028b246a24
                                                            • Instruction Fuzzy Hash: 4021F275604244DFCB14DF14E9D4B27BBA5EB88314F20C5ADE94E4B2A6C33AD807CA61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 18a043531866dfab4383a8a7eaf96b4aeea8ce7c6d8bf031258cde97d0f596d6
                                                            • Instruction ID: 5c4da5d2d0f12e4134d0a2ad931555d3114eea24acc60d55bdfdb75bf923c26f
                                                            • Opcode Fuzzy Hash: 18a043531866dfab4383a8a7eaf96b4aeea8ce7c6d8bf031258cde97d0f596d6
                                                            • Instruction Fuzzy Hash: 722141359106099FCB10EF6DD98059DFBF5FF49310B50C26AE958A7200FB30A998CB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 990d4db4a6c00610b597707af58f26b78eee987b06f0225b3e643e6cbc3e4f6d
                                                            • Instruction ID: 12de0174495a7d3024c11302dff8e84b49476f98ff3cdf3acaf7c994ac544212
                                                            • Opcode Fuzzy Hash: 990d4db4a6c00610b597707af58f26b78eee987b06f0225b3e643e6cbc3e4f6d
                                                            • Instruction Fuzzy Hash: DF11067AF002149FDF11ABB8A8516EFBFF5DB88224F1400BAD605E7342CA35AD0287D5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3f3b76f89d4a1f854904f56f5fbbd47c6eab8694fc0001cdb0f0e70138240ee1
                                                            • Instruction ID: 723eeda9527ce27e71a44deb9102ec1d7826dbf52502a2487b2453a72d427898
                                                            • Opcode Fuzzy Hash: 3f3b76f89d4a1f854904f56f5fbbd47c6eab8694fc0001cdb0f0e70138240ee1
                                                            • Instruction Fuzzy Hash: BE113A35B101149FDB18CF6DD994CAABBF5EF8C320B1641B8E909E7366DA31EC058A60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1356979508.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b2d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: be5958c3d69cdf90cecefd0da4f8f706c6f953e2c2bc03ee6e7f784e8c40f97b
                                                            • Instruction ID: 2b8caf4e670bc4d6562129e1e1dd639ff680e55657d60ac56ebca979e2f791bd
                                                            • Opcode Fuzzy Hash: be5958c3d69cdf90cecefd0da4f8f706c6f953e2c2bc03ee6e7f784e8c40f97b
                                                            • Instruction Fuzzy Hash: 642192755083809FCB02CF14D994B12BFB1EB46314F29C5DAD8498F2A7C33A980ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 18850604c8cfec2102aa933a401d9e713d69298e753ceb9adfb38fee3120ff45
                                                            • Instruction ID: 382a972f8aedeb62ee62e895fb20d13fca8087d4b410469024e78127e0be98f8
                                                            • Opcode Fuzzy Hash: 18850604c8cfec2102aa933a401d9e713d69298e753ceb9adfb38fee3120ff45
                                                            • Instruction Fuzzy Hash: F411A1363042118FEB148A2DCCC96A93BE2EFC9710B1AC4F6E049CF7A6DA35DC018750
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c8f4e77dbfbf8a1c19612e06c85172b947b34c901e2071a39b33f9dd1218cd26
                                                            • Instruction ID: 75fc3c6156da670a241477feb959b0fb23d86fc3c644c0b4883d2704fd33982a
                                                            • Opcode Fuzzy Hash: c8f4e77dbfbf8a1c19612e06c85172b947b34c901e2071a39b33f9dd1218cd26
                                                            • Instruction Fuzzy Hash: 832106B6D04248DFCB20DF9AD844ADEBBF4EB48310F14842AE919A7310D374A944CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d389edc79787f660119bc353c6919b230ff13d39482f3bfe542bd7378ca26693
                                                            • Instruction ID: 23f7e13276f4aeeb7b75ae92c557fd7647278e1a3d11867ae82d2eafd75a476b
                                                            • Opcode Fuzzy Hash: d389edc79787f660119bc353c6919b230ff13d39482f3bfe542bd7378ca26693
                                                            • Instruction Fuzzy Hash: 5811C431A047448FEB126A7488506EE7BB4EFD2214B0505FED9469B252EB34F947C3A1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1356936156.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b1d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                            • Instruction ID: 6cb25f1058ec663ed1e9d0b9a68418959d706f824da2f320afb0e60218a8bcf4
                                                            • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                            • Instruction Fuzzy Hash: 73110372504240CFCB16CF00D5C4B56BFB1FB94324F24C6A9D8090B356C33AE85ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: da2628d264e07c23e9dad7df4935cca2bad324e46f84f2d97683c294c0c7dd70
                                                            • Instruction ID: 57fee813a0af5215ef8c3c6e6a0a21c503a2586fd07972cf347b38c00b61418d
                                                            • Opcode Fuzzy Hash: da2628d264e07c23e9dad7df4935cca2bad324e46f84f2d97683c294c0c7dd70
                                                            • Instruction Fuzzy Hash: 9B21E7B6D042489FDB10DF9AD444ADEFBF4FB48310F14846AE919A7210D374A944CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 133d5fd20d22bd914bc68867e3c715690f9afe79f709e44f4b1ebcc0e08c4967
                                                            • Instruction ID: 939083175a69662b4080a08d6600344f4ac6cf775626d4f615f9cd3a845e62e3
                                                            • Opcode Fuzzy Hash: 133d5fd20d22bd914bc68867e3c715690f9afe79f709e44f4b1ebcc0e08c4967
                                                            • Instruction Fuzzy Hash: D3118B72A00109EFCF108F54E8859D9BBF5EB89314B0180B6EC099B620E771E95ACB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1356979508.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b2d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                            • Instruction ID: de744f33ddf6693b4d0acad5b95217988aeddd0118cd9d55e2beec22a241d11c
                                                            • Opcode Fuzzy Hash: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                            • Instruction Fuzzy Hash: 47118B75504284DFDB16CF14D5C4B15BBA1FB84314F24C6A9D84D4B696C33AD84ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 07478d057ce6edf4c5abf91efccc44766d3b47a52b5e44307163698825eaa162
                                                            • Instruction ID: 5bb1ba6eb0dbc36f8ca1a3d98b66e23b1eb634c5be1cbea3f9145f2e4926f3bb
                                                            • Opcode Fuzzy Hash: 07478d057ce6edf4c5abf91efccc44766d3b47a52b5e44307163698825eaa162
                                                            • Instruction Fuzzy Hash: C011F6B6D002489FCB10DF9AD484ADEFBF4FB48310F14841AE919A7210D374A945CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7004e90080e525984a97d4f1e32e44d64f25ba524709c9ddf159cb31a6ebeee0
                                                            • Instruction ID: 4f82466fa232c5b2c55e05e4de8ecf39931cecd365a73b473519b7736a628b0e
                                                            • Opcode Fuzzy Hash: 7004e90080e525984a97d4f1e32e44d64f25ba524709c9ddf159cb31a6ebeee0
                                                            • Instruction Fuzzy Hash: 1C1102B1D047489FDB10DF9AD944A9EFBF4EB48320F10846AE819B7310D378A945CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3041c7a271859131092ea9289888235fd7b4d4cc5b8d4f5c824e3f8632f44f6c
                                                            • Instruction ID: 3cd18d10321d7f46edf6c0243d5a1d9d84b042ee5b0cf57c0770e711429a5280
                                                            • Opcode Fuzzy Hash: 3041c7a271859131092ea9289888235fd7b4d4cc5b8d4f5c824e3f8632f44f6c
                                                            • Instruction Fuzzy Hash: 3A1102B1D047489FDB10DF9AD944A9EFBF4EB48320F10846AE819B7310D378A945CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e6c80305fb059e81b88451b72e283b6a362efb8b2c27170d29ccf5becd2e2623
                                                            • Instruction ID: 52fa3b15170e7f768424e23d357c85562c0e20853911e0c1af166c2a47426436
                                                            • Opcode Fuzzy Hash: e6c80305fb059e81b88451b72e283b6a362efb8b2c27170d29ccf5becd2e2623
                                                            • Instruction Fuzzy Hash: E9110030A001059FEF04AF58C459AABBBF2EB88710F0040AAE002AF349CB759C04CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3fa83f6438a9fffc2b50d96a092dd783e41f7ef906ada5cc064f36c33391e844
                                                            • Instruction ID: dc9c679aa50aea45cfccba4160d1f7f53dd70609dfda87e08f65ef5ba0c663c6
                                                            • Opcode Fuzzy Hash: 3fa83f6438a9fffc2b50d96a092dd783e41f7ef906ada5cc064f36c33391e844
                                                            • Instruction Fuzzy Hash: 691102B1D006498FDB10DFAAD544ADEFBF4EB48310F15856AE819B3210D378A545CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 626a332aca184ffc6ac5e307b78a1cd275e6caa3271fe2b54f55e08ca3ce92cb
                                                            • Instruction ID: 462fb1baf4db8fedf69ed45d5b021ca3d1ce7df3e627c062925b8abf243257ce
                                                            • Opcode Fuzzy Hash: 626a332aca184ffc6ac5e307b78a1cd275e6caa3271fe2b54f55e08ca3ce92cb
                                                            • Instruction Fuzzy Hash: 971103B69002489FDB20DFAAD545B9EFBF4EB48324F10845AE919A7340D378A944CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 00a7917e7110325893b562d971ffc09b40b42544768d56f80e1ecd96adac521f
                                                            • Instruction ID: 846c00b2aab2b00819a20b92fbeefea4b1fc20bcace195993a2b09bb22a4fa5a
                                                            • Opcode Fuzzy Hash: 00a7917e7110325893b562d971ffc09b40b42544768d56f80e1ecd96adac521f
                                                            • Instruction Fuzzy Hash: 02018F70A001059FEF04AF68D958AAB7BF6EF88710F14416AE106AB349DB75AC44CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf2b99354d71f3333b65b420c994d1907f2b5d88fddcc19dd263bb14c57a7709
                                                            • Instruction ID: 9195ff33c08103df8b955817a17b89822c6fc245c08698c7c59f078abd2a5524
                                                            • Opcode Fuzzy Hash: bf2b99354d71f3333b65b420c994d1907f2b5d88fddcc19dd263bb14c57a7709
                                                            • Instruction Fuzzy Hash: A7011A747002108FD718DB29E89896ABBE6FF8971572485B9E50A8B365CB71EC06CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1356936156.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b1d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f88d4bf5fdb92b4c437a23d548196ad6828e9e6d66cc0efcb3eeb1d7c608ed49
                                                            • Instruction ID: e74e22e82cb9e6225ad173269e6ca853bc5d3b155f353762e2b6904debba3e57
                                                            • Opcode Fuzzy Hash: f88d4bf5fdb92b4c437a23d548196ad6828e9e6d66cc0efcb3eeb1d7c608ed49
                                                            • Instruction Fuzzy Hash: 1701DB711043449AE7209F15CDC4BA7FFD8DF51324F58C5AAED095A2CAD7799C80CA71
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf55af6fb3b811422328a4fc9cb8a21deb7d580da8c0b6189ef5098e489fa573
                                                            • Instruction ID: 93ca9dcbd0173190c2935a5bfb45f1ab266591cdbd49e05d0405d829651c359f
                                                            • Opcode Fuzzy Hash: bf55af6fb3b811422328a4fc9cb8a21deb7d580da8c0b6189ef5098e489fa573
                                                            • Instruction Fuzzy Hash: 4C1112B59002489FCB20DFAAD585BDEFFF4EB48320F20845AD919A7340D378A944CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bdf99c4a1f736518763b6326a757d1828f7e9ab2337d22d436ae06f2750c226c
                                                            • Instruction ID: a77d53a07c061aa62ceee1cde7187d7a04053648614613c5140bdc40b1909a43
                                                            • Opcode Fuzzy Hash: bdf99c4a1f736518763b6326a757d1828f7e9ab2337d22d436ae06f2750c226c
                                                            • Instruction Fuzzy Hash: B0010531601704CFDB25EF69C42055A77F6EF85348B50C6BEE4468B260EB31E982CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba5cd42d6c48dbfaa7e61fe2d4f5e2ad489e23bc36570d404b83c3a8b10fc44e
                                                            • Instruction ID: ef341104dab442d65b5ddf5f83a1211275fe95b013f371d3af35efb034dc45a4
                                                            • Opcode Fuzzy Hash: ba5cd42d6c48dbfaa7e61fe2d4f5e2ad489e23bc36570d404b83c3a8b10fc44e
                                                            • Instruction Fuzzy Hash: C0015E31A11704CFDB25EF68C46059A77F1EF95308B5085BAD4468B260FF35EC82CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fb65fb594ffb555606b3978b76f4c14d9b6d827462bd82f40b91497438a086f6
                                                            • Instruction ID: 70cdd9cde8da1b7c82004fddc0685b7765d7b062795d2330bcf32cca74b006a6
                                                            • Opcode Fuzzy Hash: fb65fb594ffb555606b3978b76f4c14d9b6d827462bd82f40b91497438a086f6
                                                            • Instruction Fuzzy Hash: 4FF096353099118FDF245E29D454ABD27E69F8564170540FED842C76A2DA20FC03D751
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5a980b52182d42a9de8931e9734acbd4d9c5712a882cf5e5ffae2ef75d02316c
                                                            • Instruction ID: 1771ef299e92dfcf5ad2eddf6be99493809c0506dc97726ab8ce1b1a082dd839
                                                            • Opcode Fuzzy Hash: 5a980b52182d42a9de8931e9734acbd4d9c5712a882cf5e5ffae2ef75d02316c
                                                            • Instruction Fuzzy Hash: B8F090317052204BDF5A6B3AA05466D77EADFC6B58B1540BAD806CB395DE34EC03C789
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5989e8694c1e0cc22422652b4eddf2abe0f312af030fa4e9955ad5296f8b6f6d
                                                            • Instruction ID: 2ed61d95851ad8056709003eb8999bea398c2d3c2972742508087f3beca04faa
                                                            • Opcode Fuzzy Hash: 5989e8694c1e0cc22422652b4eddf2abe0f312af030fa4e9955ad5296f8b6f6d
                                                            • Instruction Fuzzy Hash: 61F09679B00118AB9F15F7B898506BFBAFA9BCC514B000079DA05E7341CA31AE1187E5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37ea089c2a994ea0604e56e973c4fa2e2f9e79c27a852c9898cdd56438c7c712
                                                            • Instruction ID: 26a093eabe316202e2b11621ec86ee2bbfbe1852b15c4eb5257eb22a6e082f62
                                                            • Opcode Fuzzy Hash: 37ea089c2a994ea0604e56e973c4fa2e2f9e79c27a852c9898cdd56438c7c712
                                                            • Instruction Fuzzy Hash: 11F0E9303155218BDE289E2E8454EBE33D9DFC4B4170444BEA912C32A1DE60FC01D660
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 611b8f0aa03d8c1a929de3fe9c1c41192b7049bb68039b4a32537905250d5aeb
                                                            • Instruction ID: 936aa6b6ce1024d0cbc0df6a51edb1156a651ca9ebea776c43337decd3672f23
                                                            • Opcode Fuzzy Hash: 611b8f0aa03d8c1a929de3fe9c1c41192b7049bb68039b4a32537905250d5aeb
                                                            • Instruction Fuzzy Hash: 10F0F435600204CFC721AB29D484A6EB7B3EFC8721B15016AE509C77A1DF30AC46CB94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1320cdfe5284cb3b143d3c293b7dc937d1f8ef94678ed002ad89b6c82cab55da
                                                            • Instruction ID: 9d8a4e7ba3ed0b291eff48006c0bf00f94bcfa212dfd9a6f9a220f92de7598c9
                                                            • Opcode Fuzzy Hash: 1320cdfe5284cb3b143d3c293b7dc937d1f8ef94678ed002ad89b6c82cab55da
                                                            • Instruction Fuzzy Hash: 20011671D00609DFCB40EFA8C5858EDBBF0EF49200B1185ABE459EB322EB709A44CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d2976ac48e3913254acc7db2f52e45351d4af27660f665a5df2cda8a5b32507c
                                                            • Instruction ID: b2a5f2c0462cd39c8d313492d3d83c6a626de2105230baa5ce09ac0ec0c375be
                                                            • Opcode Fuzzy Hash: d2976ac48e3913254acc7db2f52e45351d4af27660f665a5df2cda8a5b32507c
                                                            • Instruction Fuzzy Hash: 21F054367047114F9B14AB6EF84495EBBEAEBC4725304457AE10AC7225DF71ED098790
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6e7f8c3ae395126782f3496c4f0b8c5de3bf9f423d001955e59d7d2446dd5bfd
                                                            • Instruction ID: bab8eade43ecde72294e033d2657f28dcc2334ca2f58f52ce41661857d27827a
                                                            • Opcode Fuzzy Hash: 6e7f8c3ae395126782f3496c4f0b8c5de3bf9f423d001955e59d7d2446dd5bfd
                                                            • Instruction Fuzzy Hash: 44F090353042518FCB15AB78E89499EBBE5EF8662531545BAE009CB266DEA0DD0E8390
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 767e7a6895cbbb6acc997f929e08649075b24be2cdbb69c06279d92d4c29cc95
                                                            • Instruction ID: 5e14cab2c508a0a91ec0072028b2f9d1ddeb81ef25b5facaa8e7f6391d388666
                                                            • Opcode Fuzzy Hash: 767e7a6895cbbb6acc997f929e08649075b24be2cdbb69c06279d92d4c29cc95
                                                            • Instruction Fuzzy Hash: 24F0A931A007088BDF12BA7888105AEB7B9EFC6650F0146BDD84927300EF30B982C6D2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5326a57d255634754f379fb8696be6c07b34c49e236ed66907d7fd7166833d32
                                                            • Instruction ID: 26c0107a4cad3322e2adc26249c13d3fcb55243d543f6addd3edaeae13224c21
                                                            • Opcode Fuzzy Hash: 5326a57d255634754f379fb8696be6c07b34c49e236ed66907d7fd7166833d32
                                                            • Instruction Fuzzy Hash: 80F08C313046244B9F5AAB3AA01467E77DAEFC5B99B1940BDD906CB390DE34EC03C799
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1356936156.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b1d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06b48bea9baa4fe3c183fb6012de2f0e1bf7eb9c79c5c9812a1012428e2a089a
                                                            • Instruction ID: adc97ec99abecdb69587c6eb3ebf8e12c8e7830c2ba159ffa3ed5daea5e6908b
                                                            • Opcode Fuzzy Hash: 06b48bea9baa4fe3c183fb6012de2f0e1bf7eb9c79c5c9812a1012428e2a089a
                                                            • Instruction Fuzzy Hash: 90F06271404344AEE7209F16CC88B62FFD8EF91734F18C55AED085A2C6C3799C84CAB1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: af6a6c944a0dc8dabd81785969a0c3a1e9093070c90065ac551164c2c3693e31
                                                            • Instruction ID: 2b77581ee9c5c997762a62d33e08b9d86faf1dddc88a029850711465c0097114
                                                            • Opcode Fuzzy Hash: af6a6c944a0dc8dabd81785969a0c3a1e9093070c90065ac551164c2c3693e31
                                                            • Instruction Fuzzy Hash: 88F032752006408FC715DB38D598888BBF1EF4AB0530244E9E00ACB332DB66EC46CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 19dadec8cd3ab46d3a6d36e067b22246f0301d71cd749fdbd80f8617b50d81f9
                                                            • Instruction ID: 144c399ec44f263f31cc6f04834c919c6f2f086a14db19e1d9d37ca71c73d512
                                                            • Opcode Fuzzy Hash: 19dadec8cd3ab46d3a6d36e067b22246f0301d71cd749fdbd80f8617b50d81f9
                                                            • Instruction Fuzzy Hash: 90F03035200604CFC725AB1AD484A5EB7EAEF89B21B15056DE50A87764DF31BC46CB94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e26b3b693c3fa3a092213b46d9974f97095fdf38ae2968b16eb170a88f8efb51
                                                            • Instruction ID: 4243ceffdd30f352615e2fe6667d750750fc4abca0ae9b7f9b7c733986b7bd1f
                                                            • Opcode Fuzzy Hash: e26b3b693c3fa3a092213b46d9974f97095fdf38ae2968b16eb170a88f8efb51
                                                            • Instruction Fuzzy Hash: 0601B675D00609DFCB40EFACC54589DBBF4FF49210B1185AAE859EB321E770AA44CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0c0fa051b43b62340324e5abe8f14b8b84692f33fde8d6ee55d3b70f52568b7d
                                                            • Instruction ID: 4949ac38fe5822598d396863a8b8ead5164148a672d309420efb28ae2df94edf
                                                            • Opcode Fuzzy Hash: 0c0fa051b43b62340324e5abe8f14b8b84692f33fde8d6ee55d3b70f52568b7d
                                                            • Instruction Fuzzy Hash: A9F055711097447FEF358E71D8808A3BBFCEB4822830405AAE889CB522E624FC07C7A0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 71126ceaffa480255169f6a1ffc9ba5d37493affa4a79248fc85ce8ca0f73c30
                                                            • Instruction ID: c3c92efa52e4b4607e21b8813deb84a63abdf016cafafa9b1d9b23cc7020f40c
                                                            • Opcode Fuzzy Hash: 71126ceaffa480255169f6a1ffc9ba5d37493affa4a79248fc85ce8ca0f73c30
                                                            • Instruction Fuzzy Hash: 80E092B2B041047FAB14EEBDCC405AFBBEACB94554F10C0B5D405D3201ED30BD028790
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b5ef0b499067f461eefae91ca4f184fb87c96f1f76d926aa0d44deff3f512098
                                                            • Instruction ID: 57e14b4399a3be2673be77c6b1541588a64a2e12f822fe95d2ba1910eae401b3
                                                            • Opcode Fuzzy Hash: b5ef0b499067f461eefae91ca4f184fb87c96f1f76d926aa0d44deff3f512098
                                                            • Instruction Fuzzy Hash: 59F0BC34250610CFC718DB28D588D597BE6EF4AB1971245A9E10ACB332CB72EC44CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b76efb86478ed585aa3c42f5ad032f6160e85d6d8c10c8dcfeb221de0f3c143d
                                                            • Instruction ID: 5511ca30ee9ca19b8b473b5da86e2ea918faed54771fad5e2164b7df0bc5aa1a
                                                            • Opcode Fuzzy Hash: b76efb86478ed585aa3c42f5ad032f6160e85d6d8c10c8dcfeb221de0f3c143d
                                                            • Instruction Fuzzy Hash: A3E0E535B101049FDB08CF9DD884DAEB7F5FB8C224B2180A9E619E7321E631AD058A90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c35c4f3b6aed4b5eb133ad7a2f285c52487bb60cf6789fdf91f2c5658dc0bd01
                                                            • Instruction ID: fe54fc6f605bac4f976a37ff95413c41914be4531687abbf898822c39732657e
                                                            • Opcode Fuzzy Hash: c35c4f3b6aed4b5eb133ad7a2f285c52487bb60cf6789fdf91f2c5658dc0bd01
                                                            • Instruction Fuzzy Hash: 73E04FB5A5411DEBCF14AF91E5147EDBFB0FB49316F2084A2E112B2950C7311955CEA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fae600b941093275dc8a5446bb7354d05c1b78bb3e72feb89018b835f71eb97a
                                                            • Instruction ID: 09d45fb70ebea61df49369e4ab40a63cb4e9b04be0dc9f4e59a5de7a03324a77
                                                            • Opcode Fuzzy Hash: fae600b941093275dc8a5446bb7354d05c1b78bb3e72feb89018b835f71eb97a
                                                            • Instruction Fuzzy Hash: 0CE086303046109FCB18DB1CE8809EAB7E6EF8931072546BAF04AC7A76C660ED168744
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: acf7c6a4d7ffbd4372b1aa428eee112c5f99a4c38f58bf568b6d2af12389c274
                                                            • Instruction ID: f8531b9f8028abb13c0db774da0c58899e2320f5131836d1b9146805dc09b4bd
                                                            • Opcode Fuzzy Hash: acf7c6a4d7ffbd4372b1aa428eee112c5f99a4c38f58bf568b6d2af12389c274
                                                            • Instruction Fuzzy Hash: B4F0F276A0065ACBCF00DF84D4405DCFBB0FF48320F258696D9147B200E330BA96CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 357983a34a462fd4218a3d49727d8a0244317d58c6ca0243c8c6e52598ec6c65
                                                            • Instruction ID: a23642e8f961eb8fbf48cd65319ce785e9aeae8ba83db6e761d29252c7a3d9ea
                                                            • Opcode Fuzzy Hash: 357983a34a462fd4218a3d49727d8a0244317d58c6ca0243c8c6e52598ec6c65
                                                            • Instruction Fuzzy Hash: 79E04F70A01108EFCB00EFA4E5015ACBBF5EB4831471081A5E819A7319EB366F049B50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5abdf452cda9088f60d04441dc7d2134e881d5b68999d238353da0c3e904a843
                                                            • Instruction ID: 20219784795c91e056c87085efd800aeef66b6f66692c26d23f10a3eac4ee30d
                                                            • Opcode Fuzzy Hash: 5abdf452cda9088f60d04441dc7d2134e881d5b68999d238353da0c3e904a843
                                                            • Instruction Fuzzy Hash: EDE0E670A01109EFCB00EFA4E5455ADBFF5EF4831471085D5E8199731DEB766F049B51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ee715dccb64cb544c34d07c629c18011930a8630d1b5eec8e5cc3caf326ac0d8
                                                            • Instruction ID: b41d33f1e0f0ad96bcdb8a38047ef4e782bf0869abd1019d17d6d88e7a147215
                                                            • Opcode Fuzzy Hash: ee715dccb64cb544c34d07c629c18011930a8630d1b5eec8e5cc3caf326ac0d8
                                                            • Instruction Fuzzy Hash: 0BD05E303107149FCB28DB1CE840C9AB3EAEF8831032586B9F009C7765DA60FC054784
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6039a3dbba77254888e0240f991619bfa1fc09902ce0c83842a534ee4426e935
                                                            • Instruction ID: 61dd02b1e944898da3bc37bb67cc22090db44c9694e7e9a9254f30da424819c3
                                                            • Opcode Fuzzy Hash: 6039a3dbba77254888e0240f991619bfa1fc09902ce0c83842a534ee4426e935
                                                            • Instruction Fuzzy Hash: D2D0A9633161600BAA05222CB8167AD1ADACBCAA6274D45FBE209D3382C8289C0743A6
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b23af70e05059e5bb552d78304bf0808fecc9edb12896699ee11a35b2f7728d9
                                                            • Instruction ID: ff9a0efbe03cc7cfc7fcd7e0c1561b0ef56440f0af2506c94aaafaca7799b736
                                                            • Opcode Fuzzy Hash: b23af70e05059e5bb552d78304bf0808fecc9edb12896699ee11a35b2f7728d9
                                                            • Instruction Fuzzy Hash: F8E09236100209EFCB01EF54D848C597BF6FB09304B55C0A6E90A4F235DB72E965DB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 88dd3cb4ff1698a1c2022828f46d95b16f56542687552a13b6d2175715df9a80
                                                            • Instruction ID: 447dd46794fcd0a771a16f38e44794bca6c410c78c74fc8bf1908045c63fffc8
                                                            • Opcode Fuzzy Hash: 88dd3cb4ff1698a1c2022828f46d95b16f56542687552a13b6d2175715df9a80
                                                            • Instruction Fuzzy Hash: 34D05B3054D165DFCB156BA4D4689743BA2FF4564131500EDC849CB6B2EB21AC3AD311
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 602bbba7b030c68845e746990f011e84a817aa1d80dfc1dacd851f388ddf2803
                                                            • Instruction ID: a681cfc0fd8740d05785ed52bbef8fbbe7725d1aae7e743eb8e3864df91a2a71
                                                            • Opcode Fuzzy Hash: 602bbba7b030c68845e746990f011e84a817aa1d80dfc1dacd851f388ddf2803
                                                            • Instruction Fuzzy Hash: 87D0C97025421A97DF585BA5A459B3977D8EF44A05B0400BCE80EC6640EA16FC619521
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ab647066f5e6a6e4820acb25b48de2c35cb42b16235325e290700798fbe12b5
                                                            • Instruction ID: 9bedf2d026169208cb50ba3283137696e7cb59cf694663f146f07f730b83b2c6
                                                            • Opcode Fuzzy Hash: 3ab647066f5e6a6e4820acb25b48de2c35cb42b16235325e290700798fbe12b5
                                                            • Instruction Fuzzy Hash: 32C04C6175416917E90821D964116ED73CD8B8B968F4540B6E50E977418D86ED4302EA
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359860570.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4b90000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 392d3788d873ea57c7e7dcdb9a417a7e215d7a303de4f9bb38367ac4a0fc7063
                                                            • Instruction ID: c5290842f42eb5d99d0b2aa0c2d2d05e2303735f520ce98fcfc9baaa5bc5c3ea
                                                            • Opcode Fuzzy Hash: 392d3788d873ea57c7e7dcdb9a417a7e215d7a303de4f9bb38367ac4a0fc7063
                                                            • Instruction Fuzzy Hash: 72B09B2131413913D90831DD64115BD72CD478B564F414077950D977418DC69C4203DA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1362913994.000000000B340000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_b340000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fff?
                                                            • API String ID: 0-4136771917
                                                            • Opcode ID: 4ad8d4abeb339b77a05a2ea642e3e2561fa825820960e1136c771e129a6f2bbe
                                                            • Instruction ID: 293e47d63ede1d09abe140475893cb4fa6f66ebb5645460e8f1f84abbf6a2d74
                                                            • Opcode Fuzzy Hash: 4ad8d4abeb339b77a05a2ea642e3e2561fa825820960e1136c771e129a6f2bbe
                                                            • Instruction Fuzzy Hash: EF62363681061ADFCF11DF60C884AD9B7B2FF99304F1586D5E9086B125EB71AAD5CF80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,es1
                                                            • API String ID: 0-3497061470
                                                            • Opcode ID: 8c22f581916ebe2dd7dd3e0a1a33aed895a9a56343c8e9d5df9b8deb95568b15
                                                            • Instruction ID: 97908a99c46c436cdbb7b0c139ff46ac171a91c77a8b663e89f5ef6f770ad5ad
                                                            • Opcode Fuzzy Hash: 8c22f581916ebe2dd7dd3e0a1a33aed895a9a56343c8e9d5df9b8deb95568b15
                                                            • Instruction Fuzzy Hash: ABE11A74E1015A8FCB54DFA9C9809AEFBF2BF89304F248169D404AB359D731AD42CFA0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,es1
                                                            • API String ID: 0-3497061470
                                                            • Opcode ID: 42ef4b408601c40b5116231cf77ab05b0d61ec5cd49bc25c9abda6d6b3ca5904
                                                            • Instruction ID: 8ec7f1694c14ede280ae72a279ebe5a490230bdd10cce30957bffd4fa8a704db
                                                            • Opcode Fuzzy Hash: 42ef4b408601c40b5116231cf77ab05b0d61ec5cd49bc25c9abda6d6b3ca5904
                                                            • Instruction Fuzzy Hash: 08510C70E102198BDB54DFAAD9805AEFBF2BF89304F248169D418AB719D7359D42CFA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359782961.0000000004AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4ac0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51a88a05a9859e26189eec3c11a22165590ebeda1f7a53dacfc135f0d62fd94c
                                                            • Instruction ID: aff8de5c901f9842a180b9ccea5f4d2647987f06de0807b8d78040801938f361
                                                            • Opcode Fuzzy Hash: 51a88a05a9859e26189eec3c11a22165590ebeda1f7a53dacfc135f0d62fd94c
                                                            • Instruction Fuzzy Hash: F212C6B0C827458BE718CF65E94C1893BB1BB85719FD08E09D261AF2E4DFB4116ACF64
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 981aa704c45251bbae556c8d6be2faa6fab6b6cf8f866370124f05bfc61f75fc
                                                            • Instruction ID: 4c58cc990fc921a25a8639fc1a40a7ce1d0d937748fd0d7f45a9816447b270fb
                                                            • Opcode Fuzzy Hash: 981aa704c45251bbae556c8d6be2faa6fab6b6cf8f866370124f05bfc61f75fc
                                                            • Instruction Fuzzy Hash: B3E1F975E0115A8FCB14DFA9C9809AEFBF2BF89304F248169D414AB359D730AD42CF60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 36d5557d5820875a87034ec7b91c0368727e62c8be1eaddd04d23dc2078152e9
                                                            • Instruction ID: 4779e8a96df737f834b4da868ef7bfb4ed671b69f635184bb1591c8f87f68e85
                                                            • Opcode Fuzzy Hash: 36d5557d5820875a87034ec7b91c0368727e62c8be1eaddd04d23dc2078152e9
                                                            • Instruction Fuzzy Hash: AEE1E874E1015ACFCB54DFA9C9809AEBBF2BF89304F248169D415AB359D730AD42CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cdb287d9b821cbdb727419b4f9aa6ed8e962f11ecde9ca4b859881e2594516f6
                                                            • Instruction ID: b76f01cad68bee9ef1f0f13ed5ff95e9e709d5ff742f04d7d9a8d8b2faff026b
                                                            • Opcode Fuzzy Hash: cdb287d9b821cbdb727419b4f9aa6ed8e962f11ecde9ca4b859881e2594516f6
                                                            • Instruction Fuzzy Hash: C2E1E974E1016A8FDB14DFA9C9909AEFBF2BF89304F248169D414AB359D730AD42CF61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d71d31d4d30702f9beaf43c883f076cc1fd202e7e77e64f1a477588a2e5baf37
                                                            • Instruction ID: c60e7b6afb77a50db43713a97d3336bae888a6084fbe9624f0c50340ce963d53
                                                            • Opcode Fuzzy Hash: d71d31d4d30702f9beaf43c883f076cc1fd202e7e77e64f1a477588a2e5baf37
                                                            • Instruction Fuzzy Hash: C6E1FA74E0016A8FDB14DFA9C9909AEFBF2BF89304F248169D415AB359D734AD42CF60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1357285592.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_24b0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7bafc93337eb2c4ec1ae3a6bcdaa84553e338710f4fb293b458190a2b2ead9d3
                                                            • Instruction ID: 72f157e9e9335e986f855ed4caf4f9425475fe5f2fd9a893997e2a99e8159f27
                                                            • Opcode Fuzzy Hash: 7bafc93337eb2c4ec1ae3a6bcdaa84553e338710f4fb293b458190a2b2ead9d3
                                                            • Instruction Fuzzy Hash: E1A18D32E00205CFCF0ADFB5C8805EEB7B2FF85304B1545AAE805AB265DB75E956CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1359782961.0000000004AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4ac0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 91cd90237bc6bbda18041dfa6e8bfbf041fd1aebbb372de9488e9a136b9b0e1b
                                                            • Instruction ID: f088c83d577f0475da4afa40ae3d7b78e525f278a150a876378f063b0a5b191b
                                                            • Opcode Fuzzy Hash: 91cd90237bc6bbda18041dfa6e8bfbf041fd1aebbb372de9488e9a136b9b0e1b
                                                            • Instruction Fuzzy Hash: D1C13BB0C827458FE718CF65E84C1897BB1BB85714FA08E0AD161AF2E5DFB414AACF54
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1361084066.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6920000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 271587b72f83f6d16b38cefca4958c877818ee5cc88713bb1b6b46cf7da404e9
                                                            • Instruction ID: 80ce2fed0db7068d1e548bf1b689a71c30e49f99b795e6133e69543def610226
                                                            • Opcode Fuzzy Hash: 271587b72f83f6d16b38cefca4958c877818ee5cc88713bb1b6b46cf7da404e9
                                                            • Instruction Fuzzy Hash: CE51FA71E0021A8FDB54DFA9C9805AEFBF2BF89304F24C169D418AB319D7319942CFA1

                                                            Execution Graph

                                                            Execution Coverage:11.1%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:12.5%
                                                            Total number of Nodes:32
                                                            Total number of Limit Nodes:3
                                                            execution_graph 26152 2bfced8 26153 2bfcee4 26152->26153 26157 6a478a8 26153->26157 26163 6a478b8 26153->26163 26154 2bfd0b7 26158 6a478da 26157->26158 26159 6a479ec 26158->26159 26169 5967b8c 26158->26169 26175 59677a8 26158->26175 26181 5967588 26158->26181 26159->26154 26164 6a478da 26163->26164 26165 6a479ec 26164->26165 26166 5967b8c 2 API calls 26164->26166 26167 5967588 LdrInitializeThunk 26164->26167 26168 59677a8 2 API calls 26164->26168 26165->26154 26166->26165 26167->26165 26168->26165 26173 5967a43 26169->26173 26170 5967b84 LdrInitializeThunk 26172 5967ce1 26170->26172 26172->26159 26173->26170 26174 5967588 LdrInitializeThunk 26173->26174 26174->26173 26179 59677d9 26175->26179 26176 5967939 26176->26159 26177 5967b84 LdrInitializeThunk 26177->26176 26179->26176 26179->26177 26180 5967588 LdrInitializeThunk 26179->26180 26180->26179 26182 596759a 26181->26182 26184 596759f 26181->26184 26182->26159 26183 5967cc9 LdrInitializeThunk 26183->26182 26184->26182 26184->26183 26185 5967e78 26186 5967e7f 26185->26186 26187 5967588 LdrInitializeThunk 26186->26187 26188 5969ddf 26186->26188 26190 5968206 26186->26190 26187->26190 26189 5967588 LdrInitializeThunk 26189->26190 26190->26188 26190->26189

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 147 2bf6880-2bf68a3 148 2bf68ae-2bf68ce 147->148 149 2bf68a5-2bf68ab 147->149 152 2bf68d5-2bf68dc 148->152 153 2bf68d0 148->153 149->148 155 2bf68de-2bf68e9 152->155 154 2bf6c64-2bf6c6d 153->154 156 2bf68ef-2bf6902 155->156 157 2bf6c75-2bf6c9a 155->157 160 2bf6918-2bf6933 156->160 161 2bf6904-2bf6912 156->161 165 2bf6957-2bf695a 160->165 166 2bf6935-2bf693b 160->166 161->160 164 2bf6bec-2bf6bf3 161->164 164->154 167 2bf6bf5-2bf6bf7 164->167 168 2bf6ab4-2bf6aba 165->168 169 2bf6960-2bf6963 165->169 170 2bf693d 166->170 171 2bf6944-2bf6947 166->171 174 2bf6bf9-2bf6bfe 167->174 175 2bf6c06-2bf6c0c 167->175 173 2bf6ba6-2bf6ba9 168->173 177 2bf6ac0-2bf6ac5 168->177 169->168 178 2bf6969-2bf696f 169->178 170->168 170->171 172 2bf697a-2bf6980 170->172 170->173 171->172 176 2bf6949-2bf694c 171->176 183 2bf6986-2bf6988 172->183 184 2bf6982-2bf6984 172->184 185 2bf6baf-2bf6bb5 173->185 186 2bf6c70 173->186 174->175 175->157 181 2bf6c0e-2bf6c13 175->181 179 2bf69e6-2bf69ec 176->179 180 2bf6952 176->180 177->173 178->168 182 2bf6975 178->182 179->173 189 2bf69f2-2bf69f8 179->189 180->173 187 2bf6c58-2bf6c5b 181->187 188 2bf6c15-2bf6c1a 181->188 182->173 190 2bf6992-2bf699b 183->190 184->190 191 2bf6bda-2bf6bde 185->191 192 2bf6bb7-2bf6bbf 185->192 186->157 187->186 193 2bf6c5d-2bf6c62 187->193 188->186 194 2bf6c1c 188->194 195 2bf69fe-2bf6a00 189->195 196 2bf69fa-2bf69fc 189->196 198 2bf69ae-2bf69d6 190->198 199 2bf699d-2bf69a8 190->199 191->164 200 2bf6be0-2bf6be6 191->200 192->157 197 2bf6bc5-2bf6bd4 192->197 193->154 193->167 201 2bf6c23-2bf6c28 194->201 202 2bf6a0a-2bf6a21 195->202 196->202 197->160 197->191 220 2bf69dc-2bf69e1 198->220 221 2bf6aca-2bf6b00 198->221 199->173 199->198 200->155 200->164 204 2bf6c4a-2bf6c4c 201->204 205 2bf6c2a-2bf6c2c 201->205 214 2bf6a4c-2bf6a73 202->214 215 2bf6a23-2bf6a3c 202->215 204->186 211 2bf6c4e-2bf6c51 204->211 208 2bf6c2e-2bf6c33 205->208 209 2bf6c3b-2bf6c41 205->209 208->209 209->157 213 2bf6c43-2bf6c48 209->213 211->187 213->204 216 2bf6c1e-2bf6c21 213->216 214->186 226 2bf6a79-2bf6a7c 214->226 215->221 224 2bf6a42-2bf6a47 215->224 216->186 216->201 220->221 227 2bf6b0d-2bf6b15 221->227 228 2bf6b02-2bf6b06 221->228 224->221 226->186 229 2bf6a82-2bf6aab 226->229 227->186 232 2bf6b1b-2bf6b20 227->232 230 2bf6b08-2bf6b0b 228->230 231 2bf6b25-2bf6b29 228->231 229->221 244 2bf6aad-2bf6ab2 229->244 230->227 230->231 233 2bf6b2b-2bf6b31 231->233 234 2bf6b48-2bf6b4c 231->234 232->173 233->234 238 2bf6b33-2bf6b3b 233->238 236 2bf6b4e-2bf6b54 234->236 237 2bf6b56-2bf6b75 call 2bf6e58 234->237 236->237 239 2bf6b7b-2bf6b7f 236->239 237->239 238->186 240 2bf6b41-2bf6b46 238->240 239->173 242 2bf6b81-2bf6b9d 239->242 240->173 242->173 244->221
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q$(o_q$,cq$,cq
                                                            • API String ID: 0-196421762
                                                            • Opcode ID: 299654e98a3b835abafe1fa4cd85d4b4c3be4e148bee719292b5d0fb0e7d118c
                                                            • Instruction ID: a75d6aafe89d9a026f6c39a025441e38198ca125b6bdb6d56a84489a6aac3122
                                                            • Opcode Fuzzy Hash: 299654e98a3b835abafe1fa4cd85d4b4c3be4e148bee719292b5d0fb0e7d118c
                                                            • Instruction Fuzzy Hash: 78D15C70A00109DFCB54CFA9C984AADBBFAFF89304F1581A5EA65EB265D730EC45CB50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q$4'_q
                                                            • API String ID: 0-2938337118
                                                            • Opcode ID: af4ad64a66e0ae36caffac92ef02a35d0641bfdbb65cafea6191d223fd1c1ca0
                                                            • Instruction ID: 4a692c4b4a2d53d095d394371d695b08c06094dc09afe8403c60fe6f93c35ffa
                                                            • Opcode Fuzzy Hash: af4ad64a66e0ae36caffac92ef02a35d0641bfdbb65cafea6191d223fd1c1ca0
                                                            • Instruction Fuzzy Hash: C282B035A00609DFCB59CF68C884BAEBBF2FF49304F158595E9099B3A1D730E989CB50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1677 2bf6108-2bf614e 1679 2bf6719-2bf6774 call 2bf6880 1677->1679 1680 2bf6154-2bf6162 1677->1680 1697 2bf6776-2bf677a 1679->1697 1698 2bf67c4-2bf67c8 1679->1698 1684 2bf6164-2bf6175 1680->1684 1685 2bf6190-2bf61a1 1680->1685 1684->1685 1699 2bf6177-2bf6183 1684->1699 1686 2bf61a3-2bf61a7 1685->1686 1687 2bf6212-2bf6226 1685->1687 1688 2bf61a9-2bf61b5 1686->1688 1689 2bf61c2-2bf61cb 1686->1689 1821 2bf6229 call 2bf6108 1687->1821 1822 2bf6229 call 2bf6730 1687->1822 1693 2bf61bb-2bf61bd 1688->1693 1694 2bf6543-2bf658e 1688->1694 1695 2bf64d4 1689->1695 1696 2bf61d1-2bf61d4 1689->1696 1692 2bf622f-2bf6235 1702 2bf623e-2bf6245 1692->1702 1703 2bf6237-2bf6239 1692->1703 1704 2bf64ca-2bf64d1 1693->1704 1775 2bf6595-2bf6614 1694->1775 1700 2bf64d9-2bf653c 1695->1700 1696->1695 1705 2bf61da-2bf61f9 1696->1705 1706 2bf677c-2bf6781 1697->1706 1707 2bf6789-2bf6790 1697->1707 1708 2bf67df-2bf67f3 1698->1708 1709 2bf67ca-2bf67d9 1698->1709 1699->1700 1701 2bf6189-2bf618b 1699->1701 1700->1694 1701->1704 1711 2bf624b-2bf6262 1702->1711 1712 2bf6333-2bf6344 1702->1712 1703->1704 1705->1695 1742 2bf61ff-2bf6205 1705->1742 1706->1707 1714 2bf6866-2bf687a 1707->1714 1715 2bf6796-2bf679d 1707->1715 1710 2bf67fb-2bf6802 1708->1710 1823 2bf67f5 call 2bf97e8 1708->1823 1824 2bf67f5 call 2bf9848 1708->1824 1825 2bf67f5 call 2bf9530 1708->1825 1716 2bf67db-2bf67dd 1709->1716 1717 2bf6805-2bf680f 1709->1717 1711->1712 1732 2bf6268-2bf6274 1711->1732 1735 2bf636e-2bf6374 1712->1735 1736 2bf6346-2bf6353 1712->1736 1715->1698 1722 2bf679f-2bf67a3 1715->1722 1716->1710 1718 2bf6819-2bf681d 1717->1718 1719 2bf6811-2bf6817 1717->1719 1724 2bf6825-2bf685f 1718->1724 1725 2bf681f 1718->1725 1719->1724 1729 2bf67a5-2bf67aa 1722->1729 1730 2bf67b2-2bf67b9 1722->1730 1724->1714 1725->1724 1729->1730 1730->1714 1731 2bf67bf-2bf67c2 1730->1731 1731->1710 1739 2bf632c-2bf632e 1732->1739 1740 2bf627a-2bf62e6 1732->1740 1737 2bf638f-2bf6395 1735->1737 1738 2bf6376-2bf6382 1735->1738 1736->1737 1753 2bf6355-2bf6361 1736->1753 1746 2bf639b-2bf63b8 1737->1746 1747 2bf64c7 1737->1747 1744 2bf662b-2bf668e 1738->1744 1745 2bf6388-2bf638a 1738->1745 1739->1704 1777 2bf62e8-2bf6312 1740->1777 1778 2bf6314-2bf6329 1740->1778 1742->1679 1749 2bf620b-2bf620f 1742->1749 1802 2bf6695-2bf6714 1744->1802 1745->1704 1746->1695 1768 2bf63be-2bf63c1 1746->1768 1747->1704 1749->1687 1755 2bf6619-2bf6624 1753->1755 1756 2bf6367-2bf6369 1753->1756 1755->1744 1756->1704 1768->1679 1773 2bf63c7-2bf63ed 1768->1773 1773->1747 1784 2bf63f3-2bf63ff 1773->1784 1777->1778 1778->1739 1788 2bf6405-2bf647d 1784->1788 1789 2bf64c3-2bf64c5 1784->1789 1804 2bf647f-2bf64a9 1788->1804 1805 2bf64ab-2bf64c0 1788->1805 1789->1704 1804->1805 1805->1789 1821->1692 1822->1692 1823->1710 1824->1710 1825->1710
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q$Hcq
                                                            • API String ID: 0-689770731
                                                            • Opcode ID: ba059b2d7f30e868ce82f31c2d8eeb378f5ca9c23923653dd9a7cc291c308cfa
                                                            • Instruction ID: fcfad1543ca16001bd88e3d9bcf63fb21d2a86eb7aac50459aec4e7cb6c23a6d
                                                            • Opcode Fuzzy Hash: ba059b2d7f30e868ce82f31c2d8eeb378f5ca9c23923653dd9a7cc291c308cfa
                                                            • Instruction Fuzzy Hash: 1A12D170A002199FDB54DF69C854BAEBBFAFF88304F148569E916DB394EB309C45CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1827 2bfb328-2bfb33b 1828 2bfb47a-2bfb481 1827->1828 1829 2bfb341-2bfb34a 1827->1829 1830 2bfb484 1829->1830 1831 2bfb350-2bfb354 1829->1831 1834 2bfb489-2bfb491 1830->1834 1832 2bfb36e-2bfb375 1831->1832 1833 2bfb356 1831->1833 1832->1828 1836 2bfb37b-2bfb388 1832->1836 1835 2bfb359-2bfb364 1833->1835 1841 2bfb4cc-2bfb4d1 1834->1841 1842 2bfb493-2bfb4b0 1834->1842 1835->1830 1837 2bfb36a-2bfb36c 1835->1837 1836->1828 1840 2bfb38e-2bfb3a1 1836->1840 1837->1832 1837->1835 1843 2bfb3a6-2bfb3ae 1840->1843 1844 2bfb3a3 1840->1844 1847 2bfb4de-2bfb4e2 1841->1847 1845 2bfb4dc 1842->1845 1846 2bfb4b2-2bfb4ca 1842->1846 1848 2bfb41b-2bfb41d 1843->1848 1849 2bfb3b0-2bfb3b6 1843->1849 1844->1843 1845->1847 1846->1841 1858 2bfb4d3-2bfb4d6 1846->1858 1848->1828 1850 2bfb41f-2bfb425 1848->1850 1849->1848 1851 2bfb3b8-2bfb3be 1849->1851 1850->1828 1853 2bfb427-2bfb431 1850->1853 1851->1834 1854 2bfb3c4-2bfb3dc 1851->1854 1853->1834 1855 2bfb433-2bfb44b 1853->1855 1865 2bfb3de-2bfb3e4 1854->1865 1866 2bfb409-2bfb40c 1854->1866 1870 2bfb44d-2bfb453 1855->1870 1871 2bfb470-2bfb473 1855->1871 1860 2bfb4d8-2bfb4da 1858->1860 1861 2bfb4e3-2bfb520 1858->1861 1860->1845 1860->1846 1868 2bfb527-2bfb604 call 2bf3908 call 2bf3428 1861->1868 1869 2bfb522 1861->1869 1865->1834 1872 2bfb3ea-2bfb3fe 1865->1872 1866->1830 1867 2bfb40e-2bfb411 1866->1867 1867->1830 1874 2bfb413-2bfb419 1867->1874 1889 2bfb60b-2bfb62c call 2bf4dc8 1868->1889 1890 2bfb606 1868->1890 1869->1868 1870->1834 1875 2bfb455-2bfb469 1870->1875 1871->1830 1873 2bfb475-2bfb478 1871->1873 1872->1834 1879 2bfb404 1872->1879 1873->1828 1873->1853 1874->1848 1874->1849 1875->1834 1881 2bfb46b 1875->1881 1879->1866 1881->1871 1892 2bfb631-2bfb63c 1889->1892 1890->1889 1893 2bfb63e 1892->1893 1894 2bfb643-2bfb647 1892->1894 1893->1894 1895 2bfb64c-2bfb653 1894->1895 1896 2bfb649-2bfb64a 1894->1896 1897 2bfb65a-2bfb668 1895->1897 1898 2bfb655 1895->1898 1899 2bfb66b-2bfb6af 1896->1899 1897->1899 1898->1897 1903 2bfb715-2bfb72c 1899->1903 1905 2bfb72e-2bfb753 1903->1905 1906 2bfb6b1-2bfb6c7 1903->1906 1913 2bfb76b 1905->1913 1914 2bfb755-2bfb76a 1905->1914 1910 2bfb6c9-2bfb6d5 1906->1910 1911 2bfb6f1 1906->1911 1915 2bfb6df-2bfb6e5 1910->1915 1916 2bfb6d7-2bfb6dd 1910->1916 1912 2bfb6f7-2bfb714 1911->1912 1912->1903 1918 2bfb76c 1913->1918 1914->1913 1917 2bfb6ef 1915->1917 1916->1917 1917->1912 1918->1918
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: f3f7892312b0a1efa683b90ea8e46f9f2643fc43410c2ed048c9d7fd3d566b9a
                                                            • Instruction ID: 193d0cee2ba74173c15e4b0bb5e032b9cbbb125b56fd4530a9b619841f837dff
                                                            • Opcode Fuzzy Hash: f3f7892312b0a1efa683b90ea8e46f9f2643fc43410c2ed048c9d7fd3d566b9a
                                                            • Instruction Fuzzy Hash: 96E11974E00218DFDB54DFA9C984A9DBBB2FF49314F1580A9E909AB365DB30E845CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2395 6a47eb3-6a47eb4 2396 6a47eb6-6a47eb9 2395->2396 2397 6a47f30-6a47fe3 2395->2397 2399 6a47e5f-6a47e68 2396->2399 2400 6a47ebb-6a47ec9 2396->2400 2409 6a47fe5-6a47fec 2397->2409 2410 6a47ff1-6a48042 2397->2410 2405 6a47e70-6a47e76 2399->2405 2406 6a47e6a 2399->2406 2401 6a47e6f 2400->2401 2402 6a47ecb-6a47ecf 2400->2402 2401->2405 2402->2397 2406->2401 2411 6a4824c-6a4826a 2409->2411 2418 6a48114 2410->2418 2419 6a4811d-6a4812b 2418->2419 2420 6a48047-6a48074 2419->2420 2421 6a48131-6a48156 2419->2421 2428 6a48095 2420->2428 2429 6a48076-6a4807f 2420->2429 2425 6a4816e 2421->2425 2426 6a48158-6a4816d 2421->2426 2425->2411 2426->2425 2430 6a48098-6a480b9 2428->2430 2432 6a48086-6a48089 2429->2432 2433 6a48081-6a48084 2429->2433 2437 6a48112-6a48113 2430->2437 2438 6a480bb-6a48111 2430->2438 2434 6a48093 2432->2434 2433->2434 2434->2430 2437->2418 2438->2437
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 9a724b65aac5c6a615b8c44c15be6aaba9c98a51821381c800080f0f4bc990ba
                                                            • Instruction ID: a7f7ebe5b235077485ab1b98ad66df7953a56cd50efbc0e17f23d30540299e36
                                                            • Opcode Fuzzy Hash: 9a724b65aac5c6a615b8c44c15be6aaba9c98a51821381c800080f0f4bc990ba
                                                            • Instruction Fuzzy Hash: E381E074E01218CFDB58EFA9D984BEDBBF2BF89304F20846AD419AB254DB349945CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2443 2bfbbb8-2bfbbd1 2446 2bfbc0c-2bfbce4 call 2bf3908 call 2bf3428 2443->2446 2447 2bfbbd3-2bfbc00 2443->2447 2459 2bfbceb-2bfbd0c call 2bf4dc8 2446->2459 2460 2bfbce6 2446->2460 2448 2bfbc07-2bfbc09 2447->2448 2449 2bfbc02 2447->2449 2448->2446 2449->2448 2462 2bfbd11-2bfbd1c 2459->2462 2460->2459 2463 2bfbd1e 2462->2463 2464 2bfbd23-2bfbd27 2462->2464 2463->2464 2465 2bfbd2c-2bfbd33 2464->2465 2466 2bfbd29-2bfbd2a 2464->2466 2468 2bfbd3a-2bfbd48 2465->2468 2469 2bfbd35 2465->2469 2467 2bfbd4b-2bfbd8f 2466->2467 2473 2bfbdf5-2bfbe0c 2467->2473 2468->2467 2469->2468 2475 2bfbe0e-2bfbe33 2473->2475 2476 2bfbd91-2bfbda7 2473->2476 2483 2bfbe4b 2475->2483 2484 2bfbe35-2bfbe4a 2475->2484 2480 2bfbda9-2bfbdb5 2476->2480 2481 2bfbdd1 2476->2481 2485 2bfbdbf-2bfbdc5 2480->2485 2486 2bfbdb7-2bfbdbd 2480->2486 2482 2bfbdd7-2bfbdf4 2481->2482 2482->2473 2484->2483 2487 2bfbdcf 2485->2487 2486->2487 2487->2482
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 30db8939ada8880d509965b77b4a1e9e12d7c2f21ac215ebbea1573c7b8ffd56
                                                            • Instruction ID: d9a98ce7f565cf7962a377b87c08fc95d2d891940299545e0b22a0534186e796
                                                            • Opcode Fuzzy Hash: 30db8939ada8880d509965b77b4a1e9e12d7c2f21ac215ebbea1573c7b8ffd56
                                                            • Instruction Fuzzy Hash: 1591E675E00258CFDB54DFA9D894A9DBBF2FF89304F1484A9E909AB365EB305885CF10

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2539 2bfc753-2bfc758 2540 2bfc6dd-2bfc6eb 2539->2540 2541 2bfc75a-2bfc780 2539->2541 2540->2539 2542 2bfc787-2bfc7cf 2541->2542 2543 2bfc782 2541->2543 2548 2bfc7d7-2bfc7e6 call 2bf3908 2542->2548 2543->2542 2550 2bfc7eb-2bfc864 call 2bf3428 2548->2550 2556 2bfc86b-2bfc88c call 2bf4dc8 2550->2556 2557 2bfc866 2550->2557 2559 2bfc891-2bfc89c 2556->2559 2557->2556 2560 2bfc89e 2559->2560 2561 2bfc8a3-2bfc8a7 2559->2561 2560->2561 2562 2bfc8ac-2bfc8b3 2561->2562 2563 2bfc8a9-2bfc8aa 2561->2563 2565 2bfc8ba-2bfc8c8 2562->2565 2566 2bfc8b5 2562->2566 2564 2bfc8cb-2bfc90f 2563->2564 2570 2bfc975-2bfc98c 2564->2570 2565->2564 2566->2565 2572 2bfc98e-2bfc9b3 2570->2572 2573 2bfc911-2bfc927 2570->2573 2582 2bfc9cb 2572->2582 2583 2bfc9b5-2bfc9ca 2572->2583 2577 2bfc929-2bfc935 2573->2577 2578 2bfc951 2573->2578 2579 2bfc93f-2bfc945 2577->2579 2580 2bfc937-2bfc93d 2577->2580 2581 2bfc957-2bfc974 2578->2581 2584 2bfc94f 2579->2584 2580->2584 2581->2570 2583->2582 2584->2581
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 6aeb230d2ebe5814ea050ad9565c54a631c8abe2ff81fedadfda965361498310
                                                            • Instruction ID: 0e1a5d51346587adb94036165c1acea541ca622e1f5e33a75b5eb84fa3c33392
                                                            • Opcode Fuzzy Hash: 6aeb230d2ebe5814ea050ad9565c54a631c8abe2ff81fedadfda965361498310
                                                            • Instruction Fuzzy Hash: 4A81C674E01218DFDB54DFA9D884A9DBBF2BF89300F14C46AE909AB365DB305985CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2491 2bfbeb0-2bfbeb1 2492 2bfbeec-2bfbef3 2491->2492 2493 2bfbeb3-2bfbeb9 2491->2493 2495 2bfbef4-2bfbfc4 call 2bf3908 call 2bf3428 2492->2495 2494 2bfbebb-2bfbee0 2493->2494 2493->2495 2496 2bfbee7-2bfbee9 2494->2496 2497 2bfbee2 2494->2497 2507 2bfbfcb-2bfbfec call 2bf4dc8 2495->2507 2508 2bfbfc6 2495->2508 2496->2492 2497->2496 2510 2bfbff1-2bfbffc 2507->2510 2508->2507 2511 2bfbffe 2510->2511 2512 2bfc003-2bfc007 2510->2512 2511->2512 2513 2bfc00c-2bfc013 2512->2513 2514 2bfc009-2bfc00a 2512->2514 2515 2bfc01a-2bfc028 2513->2515 2516 2bfc015 2513->2516 2517 2bfc02b-2bfc06f 2514->2517 2515->2517 2516->2515 2521 2bfc0d5-2bfc0ec 2517->2521 2523 2bfc0ee-2bfc113 2521->2523 2524 2bfc071-2bfc087 2521->2524 2531 2bfc12b 2523->2531 2532 2bfc115-2bfc12a 2523->2532 2528 2bfc089-2bfc095 2524->2528 2529 2bfc0b1 2524->2529 2533 2bfc09f-2bfc0a5 2528->2533 2534 2bfc097-2bfc09d 2528->2534 2530 2bfc0b7-2bfc0d4 2529->2530 2530->2521 2532->2531 2535 2bfc0af 2533->2535 2534->2535 2535->2530
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 35d374692847f61b1f9effe6cc1f2f4a9c406becdc6b702d082188446f65d8f4
                                                            • Instruction ID: 28e5d661dd01d056504dca5439b055bf67dde1463494424cfaf09025cabef2ae
                                                            • Opcode Fuzzy Hash: 35d374692847f61b1f9effe6cc1f2f4a9c406becdc6b702d082188446f65d8f4
                                                            • Instruction Fuzzy Hash: C181C574E00218CFDB54DFA9D984A9DBBF2FF89304F1484AAE509AB365DB305985CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2588 2bfc190-2bfc195 2589 2bfc197-2bfc1c0 2588->2589 2590 2bfc1d0-2bfc2a4 call 2bf3908 call 2bf3428 2588->2590 2591 2bfc1c7-2bfc1ce 2589->2591 2592 2bfc1c2 2589->2592 2602 2bfc2ab-2bfc2cc call 2bf4dc8 2590->2602 2603 2bfc2a6 2590->2603 2591->2590 2592->2591 2605 2bfc2d1-2bfc2dc 2602->2605 2603->2602 2606 2bfc2de 2605->2606 2607 2bfc2e3-2bfc2e7 2605->2607 2606->2607 2608 2bfc2ec-2bfc2f3 2607->2608 2609 2bfc2e9-2bfc2ea 2607->2609 2611 2bfc2fa-2bfc308 2608->2611 2612 2bfc2f5 2608->2612 2610 2bfc30b-2bfc34f 2609->2610 2616 2bfc3b5-2bfc3cc 2610->2616 2611->2610 2612->2611 2618 2bfc3ce-2bfc3f3 2616->2618 2619 2bfc351-2bfc367 2616->2619 2625 2bfc40b 2618->2625 2626 2bfc3f5-2bfc40a 2618->2626 2623 2bfc369-2bfc375 2619->2623 2624 2bfc391 2619->2624 2627 2bfc37f-2bfc385 2623->2627 2628 2bfc377-2bfc37d 2623->2628 2629 2bfc397-2bfc3b4 2624->2629 2626->2625 2630 2bfc38f 2627->2630 2628->2630 2629->2616 2630->2629
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 3071f7cc93e42b8f3831282a9d8673015cf5eb554bc10d8f54b144f4c852a26b
                                                            • Instruction ID: 8e400499098150efbd86ed652cef842b1b2b7e3bae8aeb8df736251e6208c282
                                                            • Opcode Fuzzy Hash: 3071f7cc93e42b8f3831282a9d8673015cf5eb554bc10d8f54b144f4c852a26b
                                                            • Instruction Fuzzy Hash: A181B374E002188FDB54DFAAD884A9DBBF2FF89300F14C4AAE519AB365DB305985CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 60fd48e71947cb9ed3861368df302e4fc1c6315b63bda8b75abd32364439722d
                                                            • Instruction ID: 34f62758070fd3159aee899054a948b27b7ac9ac8274bf09ec4a0301d1c7d3d7
                                                            • Opcode Fuzzy Hash: 60fd48e71947cb9ed3861368df302e4fc1c6315b63bda8b75abd32364439722d
                                                            • Instruction Fuzzy Hash: 5981C474E00218DFDB54DFAAD884A9DBBF2BF89300F14D4AAE509AB365DB305985CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 31c65dc60f1ca9c7280e135b9621092bc8147ef551bffcabfe0f8ecd5ed72e7e
                                                            • Instruction ID: 9e70a1c2423dcb3d9e4da4aaa26f00c87a77052716c1dfec1ad21790c7327548
                                                            • Opcode Fuzzy Hash: 31c65dc60f1ca9c7280e135b9621092bc8147ef551bffcabfe0f8ecd5ed72e7e
                                                            • Instruction Fuzzy Hash: 3E81D474E00218CFDB58DFA9D884A9DBBF2FF88300F1494A9E919AB365DB305985CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 1af26df071a3ad59254d768516ce635ed8beec5215de369397e2aea31a0eac89
                                                            • Instruction ID: aee05b102e97dac7547348a89c4b926c1d25196077d3227e42769f88d7efd482
                                                            • Opcode Fuzzy Hash: 1af26df071a3ad59254d768516ce635ed8beec5215de369397e2aea31a0eac89
                                                            • Instruction Fuzzy Hash: B381B674E00218CFDB54DFAAD994A9DBBF2BF88300F1484AAE519AB365DB305985CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 3bba5f291f2a120c565ebeb5ebc3a0175a1225d8fecdbf3729e488d3c24acb92
                                                            • Instruction ID: d941c083b7b0aaa15f07cbd0b166d26716682e152d468e03d565527151aac3fd
                                                            • Opcode Fuzzy Hash: 3bba5f291f2a120c565ebeb5ebc3a0175a1225d8fecdbf3729e488d3c24acb92
                                                            • Instruction Fuzzy Hash: 7761D274E002089FDB58DFAAD984A9DBBF2FF89304F14C469E918AB365DB345845CF10
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3766939727.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_5960000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0be3e3ee93160084088274a41f5e38f4aba60508e5b1da6f4368b1c339f80e1a
                                                            • Instruction ID: 8e4839813d944511f90d19436271c95b154b882340e50e69fe2d2d9e06697a4d
                                                            • Opcode Fuzzy Hash: 0be3e3ee93160084088274a41f5e38f4aba60508e5b1da6f4368b1c339f80e1a
                                                            • Instruction Fuzzy Hash: 39224870E002198FDB14DFA9C994BADBBB2FF88304F1085A9D409AB395DB35AD85CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9d81ea35caa7e3d771906cb4c0268945ba5d2d7415e192f67a14693765142a80
                                                            • Instruction ID: 8746b9db61eb3def9a298aa04119033a512999ade9d57b1db26d38bb582e5c7b
                                                            • Opcode Fuzzy Hash: 9d81ea35caa7e3d771906cb4c0268945ba5d2d7415e192f67a14693765142a80
                                                            • Instruction Fuzzy Hash: BA825D74E012299FDB65DF69CD98BDDBBB2BB89300F1081E9A40DA7264DB315E85CF40
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 34f1cd30dbb35c67607d03bc167647f1952e55c340b21c2d341657fa52e425f8
                                                            • Instruction ID: 98cb2fd4908f1454a519dc94618d5ec5d226fd4ed1b78762885b2aaf03857e80
                                                            • Opcode Fuzzy Hash: 34f1cd30dbb35c67607d03bc167647f1952e55c340b21c2d341657fa52e425f8
                                                            • Instruction Fuzzy Hash: DD72E274E012288FDB64DF29C994BEDBBB2BB49304F1085E9E509A7365DB309E85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e178d5767d458ef3230b9007ce099b2d5eac3b2f35ad3832f718311ffd9b949
                                                            • Instruction ID: 31b391d22bf0d2f4955835e2bd85ac99cf625c955776993e19c4608ed1ab6202
                                                            • Opcode Fuzzy Hash: 8e178d5767d458ef3230b9007ce099b2d5eac3b2f35ad3832f718311ffd9b949
                                                            • Instruction Fuzzy Hash: A2E1C274E01218CFEB64DFA5C954B9DBBB2BF89304F2081A9D409BB394DB759A85CF10
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e78b397ebd452bb42ce12b181d0ec2d4f155136244f83244ac15de55ad8ebe91
                                                            • Instruction ID: 3c62f934ede9824287608e125768bc3cfd0f85eb3ce55cb8c3792572a5e24083
                                                            • Opcode Fuzzy Hash: e78b397ebd452bb42ce12b181d0ec2d4f155136244f83244ac15de55ad8ebe91
                                                            • Instruction Fuzzy Hash: 43D1B074E00218CFDB54DFA5D954BADBBB2BF89300F2085A9D809AB369DB355A85CF10
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f01c3f9bb3246e8a81c903e969f7956cbc7ba167f6c952fb04f8828fe5fef42a
                                                            • Instruction ID: 6f622c038816da8d19b10085aaba4b796736950bcdb449f21273bc4d76e4cfd5
                                                            • Opcode Fuzzy Hash: f01c3f9bb3246e8a81c903e969f7956cbc7ba167f6c952fb04f8828fe5fef42a
                                                            • Instruction Fuzzy Hash: 18A19F71E016288FEB68DF6AC944B9DFBF2AF89300F14C1AAD50DA7255DB305A85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bdef7cb22f6678a0129d15d8b595542134a6a6d70ea0c22f898c9506753e7c77
                                                            • Instruction ID: 3c1431b4e6c608bdbf78e4907b3b3fe3d238b4bef4047b0ea79ec87f86444946
                                                            • Opcode Fuzzy Hash: bdef7cb22f6678a0129d15d8b595542134a6a6d70ea0c22f898c9506753e7c77
                                                            • Instruction Fuzzy Hash: B7A1B071E012288FEB68DF6AC944B9DFAF2BF89310F14D0AAD40DA7250DB705A85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 186dccbc215d1e205368c4f6b29d3b42cb0c02c6e0da67f0df7c3428935c94b6
                                                            • Instruction ID: 6cc06dcf4c1bd21884d10753d1eebac6c0f7ca8ade641abaea383781c02497b9
                                                            • Opcode Fuzzy Hash: 186dccbc215d1e205368c4f6b29d3b42cb0c02c6e0da67f0df7c3428935c94b6
                                                            • Instruction Fuzzy Hash: DCA1A071E012188FEB68DF6AD944B9EFBF2AF89300F14C0AAD40DA7255DB345A85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 61f4c01da8fdf607e95740e53e84a8fd214b1bd9a7aba62822e4e511a33a4c19
                                                            • Instruction ID: ba7eb9c8405935bac540ab948488a8071c05337c7de7f3412a72c85b5c9462fd
                                                            • Opcode Fuzzy Hash: 61f4c01da8fdf607e95740e53e84a8fd214b1bd9a7aba62822e4e511a33a4c19
                                                            • Instruction Fuzzy Hash: 59A1A375E012288FEB68DF6AC944B9DFBF2AF89300F14C0AAD50DA7255DB345A85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 69bb29f2a2590c869b5221c503a8b34b07ad5372926f7fa6c577814a167e0373
                                                            • Instruction ID: 721eea8af4bdc1defbf189f4149a8cc533e9c438f6ec5123a9692638b986c28e
                                                            • Opcode Fuzzy Hash: 69bb29f2a2590c869b5221c503a8b34b07ad5372926f7fa6c577814a167e0373
                                                            • Instruction Fuzzy Hash: F9A19375E01218CFEB64DF6AC944B9DFBF2AF89300F14C1AAD409A7255DB309A85CF61
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 81abd9c4404f323a3c5c1e532b140d3df01ea314e0e862ef1b68764b1b3ad3fc
                                                            • Instruction ID: 188c83d2e1f4fb6a9dd5436c4c699ca353167bdae968568ac5144d5fdbfeda5a
                                                            • Opcode Fuzzy Hash: 81abd9c4404f323a3c5c1e532b140d3df01ea314e0e862ef1b68764b1b3ad3fc
                                                            • Instruction Fuzzy Hash: 5BA1B075E012288FEB68DF6AC944B9DFBF2AF89300F14C0AAD50DA7255DB305A85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1e999b7bc243a9d07ae7e52544fa63e46ee8217013e40add11a8e73ca4e9998a
                                                            • Instruction ID: 7735456c141d8bf1fbc1285dd7d54d76eadc66de77a64ef5a0c36726b1a074fa
                                                            • Opcode Fuzzy Hash: 1e999b7bc243a9d07ae7e52544fa63e46ee8217013e40add11a8e73ca4e9998a
                                                            • Instruction Fuzzy Hash: F1A1A271E016188FEB68DF6AD944B9EFBF2AF89300F14C0AAD40DA7255DB705A85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 92b1d7ced219746b4f523cd214f5d83d509c86d62ab69cff3a503d38afbba7a7
                                                            • Instruction ID: eaf0a3863b9791879da681aa0f3195af4bea9988d3b9ec02344fc5135f9f2895
                                                            • Opcode Fuzzy Hash: 92b1d7ced219746b4f523cd214f5d83d509c86d62ab69cff3a503d38afbba7a7
                                                            • Instruction Fuzzy Hash: 85A1A275E012188FEB68DF6AC944B9EFBF2AF89300F14C0AAD40DA7255DB305A85CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4c7cd42faca19843748324c443f76d0e7025b70e3009095c72070d64d2b3e2d5
                                                            • Instruction ID: dc438fa384601eb83966c7badab53b481eafa5aeccfd4648857dc12435f47424
                                                            • Opcode Fuzzy Hash: 4c7cd42faca19843748324c443f76d0e7025b70e3009095c72070d64d2b3e2d5
                                                            • Instruction Fuzzy Hash: 3BA18475E016188FEB68DF6AC98479DFAF2AF89300F14C0AAD409A7255DB349A85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6aa548699c6a5b9f22c8ddb53f1554d3b20b0253cc0559d931cfbe11c02e6c97
                                                            • Instruction ID: e8416bbd85799de69fa47c44bbb7f4b2451c30b825e4940c70120b6751fc1cec
                                                            • Opcode Fuzzy Hash: 6aa548699c6a5b9f22c8ddb53f1554d3b20b0253cc0559d931cfbe11c02e6c97
                                                            • Instruction Fuzzy Hash: 7A81A174E412299FEB65DF29D851BEDBBB2BB89300F1081EAD909A7354DB305E91CF40
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b1b5150433473cd84bdabb87ade374d37e0d6c3a95ed2d5aa33e8f5258ceb28a
                                                            • Instruction ID: c47f67be52a3c4d474a60a33596d65613506e6de659cfae949fe1c5d249cb5a5
                                                            • Opcode Fuzzy Hash: b1b5150433473cd84bdabb87ade374d37e0d6c3a95ed2d5aa33e8f5258ceb28a
                                                            • Instruction Fuzzy Hash: 07718571E006188FEB68DF6AC944B9EFBF2AF89300F14C1AAD40DA7255DB345A85CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ad6b6efebf4ba3cf81c6f48d6b78d70bb52376897149d5b5b3d135a3879c07b
                                                            • Instruction ID: 682487e76a9b21020d0068a6b0f2cfa5452eb2f05cdb35229152599eb1dd9ee5
                                                            • Opcode Fuzzy Hash: 5ad6b6efebf4ba3cf81c6f48d6b78d70bb52376897149d5b5b3d135a3879c07b
                                                            • Instruction Fuzzy Hash: AC718671E006188FEB68DF6AD94479EFBF2AF89300F14C0AAD40DA7255DB705A85CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4e4fb44c49e165fcb472dbcdb5bf9646af4b50f06d68774777bc1f073645ece4
                                                            • Instruction ID: f556878a5293b348976f38e04d4b83959e1a7b01e9ff5713ab5863d348ed7152
                                                            • Opcode Fuzzy Hash: 4e4fb44c49e165fcb472dbcdb5bf9646af4b50f06d68774777bc1f073645ece4
                                                            • Instruction Fuzzy Hash: 25718371E016288FEB68DF6AC944B9DFAF2BF89300F14C1AAD40DA7255DB305A85CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b7b7297675107b521f4328acd6639c47cf7424d2d67cb1cd62589387595f9fd4
                                                            • Instruction ID: c8df671cfc604e874914fedff45550518193fa1405a83f3e6707a588082b7cbe
                                                            • Opcode Fuzzy Hash: b7b7297675107b521f4328acd6639c47cf7424d2d67cb1cd62589387595f9fd4
                                                            • Instruction Fuzzy Hash: 524189B1D016188BEB58DF6BCD4579AFAF3AFC8300F14C1AAD50CA7264EB740A858F50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 20ac1daefd095f5a50f7f8c9e9e858ba3e4416425e9e8785ded677ce7a8ac198
                                                            • Instruction ID: 1d16c075e5f890940f20d29dcabe29d634102a4bb7f4f8600a978b0503ef69cb
                                                            • Opcode Fuzzy Hash: 20ac1daefd095f5a50f7f8c9e9e858ba3e4416425e9e8785ded677ce7a8ac198
                                                            • Instruction Fuzzy Hash: B141D3B0D006488BEB58DFAAC9547DDBBF2AF89300F14C16AC418BB254DB355946CF64
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8baac577b4c1bf5df4cf2756aa1a844a73fc12cf45d86006de518ccd23d33a4a
                                                            • Instruction ID: c994aa8b12a8a3ad55d6fc3f8a4fc27c798367e220ac09876272cf263aa384dc
                                                            • Opcode Fuzzy Hash: 8baac577b4c1bf5df4cf2756aa1a844a73fc12cf45d86006de518ccd23d33a4a
                                                            • Instruction Fuzzy Hash: 53415BB1E016188BEB58DF6BCD457CAFAF3AFC9300F14C1AAD50CA6254DB740A858F51
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c96445f3e7822a66e686775040fe315587ec6878bdf52570cbad6bd2be80c293
                                                            • Instruction ID: 829fad469c397c07019747995f1458d7b20a5c436903f58f6df19cb0dd3674c9
                                                            • Opcode Fuzzy Hash: c96445f3e7822a66e686775040fe315587ec6878bdf52570cbad6bd2be80c293
                                                            • Instruction Fuzzy Hash: A1417AB1D016188BEB58DF6BD9457D9FAF3AFC8310F04C1AAC54CA6254DB740A858F50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 366a6d566129bf563b389279c35ae469e45acf4b13dd3f10fb0d4fc63784b138
                                                            • Instruction ID: 89315f775fe4ca15d23119a902a965dd81b23dadb03d1b8874744967b7962041
                                                            • Opcode Fuzzy Hash: 366a6d566129bf563b389279c35ae469e45acf4b13dd3f10fb0d4fc63784b138
                                                            • Instruction Fuzzy Hash: 714159B1D016188BEB58DF6BD9457D9FBF3AFC8300F14C1AAD50CA6264EB740A858F50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cafbe6ed7eca4bb694c57baac35eeb61c303401e0cac9d3a26e771b4e15650dd
                                                            • Instruction ID: 3ac7a39c9a4063dd429ce1ad7663b404bbdfd2919b3a54f0a7e6914135d511dd
                                                            • Opcode Fuzzy Hash: cafbe6ed7eca4bb694c57baac35eeb61c303401e0cac9d3a26e771b4e15650dd
                                                            • Instruction Fuzzy Hash: 5A4159B1D016188BEB58DF6BD9457D9FAF3AFC8300F04C1AAC54CA6264EB740A86CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b94a0f20537d8e7eeb4fa361983ecf32ea34eb048705b5ea6d609cf68cf1c7bf
                                                            • Instruction ID: 563127e1c29e55a8b482b90fadd734b7b4515c36f5052d5093f30c23b40b2275
                                                            • Opcode Fuzzy Hash: b94a0f20537d8e7eeb4fa361983ecf32ea34eb048705b5ea6d609cf68cf1c7bf
                                                            • Instruction Fuzzy Hash: D74149B1E016188BEB58DF6BCD45789FAF3AFC9300F04C1AAD50CA6264DB740A85CF51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 2bf6e58-2bf6e8d 1 2bf72bc-2bf72c0 0->1 2 2bf6e93-2bf6eb6 0->2 3 2bf72d9-2bf72e7 1->3 4 2bf72c2-2bf72d6 1->4 11 2bf6ebc-2bf6ec9 2->11 12 2bf6f64-2bf6f68 2->12 9 2bf72e9-2bf72fe 3->9 10 2bf7358-2bf736d 3->10 20 2bf7305-2bf7312 9->20 21 2bf7300-2bf7303 9->21 22 2bf736f-2bf7372 10->22 23 2bf7374-2bf7381 10->23 28 2bf6ecb-2bf6ed6 11->28 29 2bf6ed8 11->29 13 2bf6f6a-2bf6f78 12->13 14 2bf6fb0-2bf6fb9 12->14 13->14 36 2bf6f7a-2bf6f95 13->36 17 2bf73cf 14->17 18 2bf6fbf-2bf6fc9 14->18 30 2bf73d4-2bf7404 17->30 18->1 26 2bf6fcf-2bf6fd8 18->26 24 2bf7314-2bf7355 20->24 21->24 25 2bf7383-2bf73be 22->25 23->25 78 2bf73c5-2bf73cc 25->78 34 2bf6fda-2bf6fdf 26->34 35 2bf6fe7-2bf6ff3 26->35 31 2bf6eda-2bf6edc 28->31 29->31 63 2bf741d-2bf7424 30->63 64 2bf7406-2bf741c 30->64 31->12 37 2bf6ee2-2bf6f44 31->37 34->35 35->30 40 2bf6ff9-2bf6fff 35->40 59 2bf6f97-2bf6fa1 36->59 60 2bf6fa3 36->60 89 2bf6f4a-2bf6f61 37->89 90 2bf6f46 37->90 43 2bf72a6-2bf72aa 40->43 44 2bf7005-2bf7015 40->44 43->17 48 2bf72b0-2bf72b6 43->48 57 2bf7029-2bf702b 44->57 58 2bf7017-2bf7027 44->58 48->1 48->26 61 2bf702e-2bf7034 57->61 58->61 62 2bf6fa5-2bf6fa7 59->62 60->62 61->43 65 2bf703a-2bf7049 61->65 62->14 66 2bf6fa9 62->66 72 2bf704f 65->72 73 2bf70f7-2bf7122 call 2bf6ca0 * 2 65->73 66->14 76 2bf7052-2bf7063 72->76 91 2bf720c-2bf7226 73->91 92 2bf7128-2bf712c 73->92 76->30 80 2bf7069-2bf707b 76->80 80->30 82 2bf7081-2bf7099 80->82 145 2bf709b call 2bf7438 82->145 146 2bf709b call 2bf7428 82->146 85 2bf70a1-2bf70b1 85->43 88 2bf70b7-2bf70ba 85->88 93 2bf70bc-2bf70c2 88->93 94 2bf70c4-2bf70c7 88->94 89->12 90->89 91->1 114 2bf722c-2bf7230 91->114 92->43 96 2bf7132-2bf7136 92->96 93->94 97 2bf70cd-2bf70d0 93->97 94->17 94->97 99 2bf715e-2bf7164 96->99 100 2bf7138-2bf7145 96->100 101 2bf70d8-2bf70db 97->101 102 2bf70d2-2bf70d6 97->102 103 2bf719f-2bf71a5 99->103 104 2bf7166-2bf716a 99->104 117 2bf7147-2bf7152 100->117 118 2bf7154 100->118 101->17 105 2bf70e1-2bf70e5 101->105 102->101 102->105 107 2bf71a7-2bf71ab 103->107 108 2bf71b1-2bf71b7 103->108 104->103 106 2bf716c-2bf7175 104->106 105->17 111 2bf70eb-2bf70f1 105->111 112 2bf7177-2bf717c 106->112 113 2bf7184-2bf719a 106->113 107->78 107->108 115 2bf71b9-2bf71bd 108->115 116 2bf71c3-2bf71c5 108->116 111->73 111->76 112->113 113->43 120 2bf726c-2bf7270 114->120 121 2bf7232-2bf723c call 2bf5b50 114->121 115->43 115->116 122 2bf71fa-2bf71fc 116->122 123 2bf71c7-2bf71d0 116->123 119 2bf7156-2bf7158 117->119 118->119 119->43 119->99 120->78 126 2bf7276-2bf727a 120->126 121->120 134 2bf723e-2bf7253 121->134 122->43 124 2bf7202-2bf7209 122->124 129 2bf71df-2bf71f5 123->129 130 2bf71d2-2bf71d7 123->130 126->78 131 2bf7280-2bf728d 126->131 129->43 130->129 137 2bf728f-2bf729a 131->137 138 2bf729c 131->138 134->120 142 2bf7255-2bf726a 134->142 139 2bf729e-2bf72a0 137->139 138->139 139->43 139->78 142->1 142->120 145->85 146->85
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q$(o_q$(o_q$(o_q$(o_q$(o_q$,cq$,cq
                                                            • API String ID: 0-3630396145
                                                            • Opcode ID: 98c9f086922cc400c498c8f24b7ca35b18ec451a2c7622a56c3b6e8a7f37ac28
                                                            • Instruction ID: 5c069095305bdcdbdebae63a5f74efb0116e82d35a647e7bdff44f131e006cf5
                                                            • Opcode Fuzzy Hash: 98c9f086922cc400c498c8f24b7ca35b18ec451a2c7622a56c3b6e8a7f37ac28
                                                            • Instruction Fuzzy Hash: F2127830A002099FCB54CF68C984A9EBBF2FF49318F1585E9E959DB265DB30ED49CB50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1489 2bf77f0-2bf7cde 1564 2bf7ce4-2bf7cf4 1489->1564 1565 2bf8230-2bf8265 1489->1565 1564->1565 1566 2bf7cfa-2bf7d0a 1564->1566 1569 2bf8267-2bf826c 1565->1569 1570 2bf8271-2bf828f 1565->1570 1566->1565 1568 2bf7d10-2bf7d20 1566->1568 1568->1565 1571 2bf7d26-2bf7d36 1568->1571 1573 2bf8356-2bf835b 1569->1573 1583 2bf8306-2bf8312 1570->1583 1584 2bf8291-2bf829b 1570->1584 1571->1565 1572 2bf7d3c-2bf7d4c 1571->1572 1572->1565 1575 2bf7d52-2bf7d62 1572->1575 1575->1565 1576 2bf7d68-2bf7d78 1575->1576 1576->1565 1577 2bf7d7e-2bf7d8e 1576->1577 1577->1565 1579 2bf7d94-2bf7da4 1577->1579 1579->1565 1580 2bf7daa-2bf7dba 1579->1580 1580->1565 1582 2bf7dc0-2bf822f 1580->1582 1589 2bf8329-2bf8335 1583->1589 1590 2bf8314-2bf8320 1583->1590 1584->1583 1588 2bf829d-2bf82a9 1584->1588 1595 2bf82ce-2bf82d1 1588->1595 1596 2bf82ab-2bf82b6 1588->1596 1599 2bf834c-2bf834e 1589->1599 1600 2bf8337-2bf8343 1589->1600 1590->1589 1598 2bf8322-2bf8327 1590->1598 1601 2bf82e8-2bf82f4 1595->1601 1602 2bf82d3-2bf82df 1595->1602 1596->1595 1610 2bf82b8-2bf82c2 1596->1610 1598->1573 1599->1573 1676 2bf8350 call 2bf87e9 1599->1676 1600->1599 1608 2bf8345-2bf834a 1600->1608 1604 2bf835c-2bf8373 1601->1604 1605 2bf82f6-2bf82fd 1601->1605 1602->1601 1612 2bf82e1-2bf82e6 1602->1612 1605->1604 1609 2bf82ff-2bf8304 1605->1609 1608->1573 1609->1573 1610->1595 1616 2bf82c4-2bf82c9 1610->1616 1612->1573 1616->1573 1676->1573
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $_q$$_q
                                                            • API String ID: 0-458585787
                                                            • Opcode ID: 03c760f49f4a4f961dc550357ed6e2ebb88cc78967c1c0a553574e2e603a77a1
                                                            • Instruction ID: 2a3c9558e8d182d9015001e3172d017216802d256591d17315220c913cefd76f
                                                            • Opcode Fuzzy Hash: 03c760f49f4a4f961dc550357ed6e2ebb88cc78967c1c0a553574e2e603a77a1
                                                            • Instruction Fuzzy Hash: A7522F74A00219CFEB55DBA8C860B9EBB72FF94304F1081A9D11A6B364CB356E45DF51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1922 2bf56a8-2bf56ca 1923 2bf56cc-2bf56d0 1922->1923 1924 2bf56e0-2bf56eb 1922->1924 1925 2bf56f8-2bf56ff 1923->1925 1926 2bf56d2-2bf56de 1923->1926 1927 2bf5793-2bf57bf 1924->1927 1928 2bf56f1-2bf56f3 1924->1928 1930 2bf571f-2bf5728 1925->1930 1931 2bf5701-2bf5708 1925->1931 1926->1924 1926->1925 1935 2bf57c6-2bf581e 1927->1935 1929 2bf578b-2bf5790 1928->1929 2023 2bf572a call 6a41bd0 1930->2023 2024 2bf572a call 6a41ca1 1930->2024 2025 2bf572a call 6a41bc1 1930->2025 2026 2bf572a call 2bf56a8 1930->2026 2027 2bf572a call 2bf5698 1930->2027 1931->1930 1932 2bf570a-2bf5715 1931->1932 1934 2bf571b-2bf571d 1932->1934 1932->1935 1934->1929 1954 2bf582d-2bf583f 1935->1954 1955 2bf5820-2bf5826 1935->1955 1936 2bf5730-2bf5732 1937 2bf573a-2bf5742 1936->1937 1938 2bf5734-2bf5738 1936->1938 1942 2bf5744-2bf5749 1937->1942 1943 2bf5751-2bf5753 1937->1943 1938->1937 1941 2bf5755-2bf5774 call 2bf6108 1938->1941 1948 2bf5789 1941->1948 1949 2bf5776-2bf577f 1941->1949 1942->1943 1943->1929 1948->1929 2028 2bf5781 call 2bfa70d 1949->2028 2029 2bf5781 call 2bfa650 1949->2029 1951 2bf5787 1951->1929 1957 2bf5845-2bf5849 1954->1957 1958 2bf58d3-2bf58d7 call 2bf5a70 1954->1958 1955->1954 1959 2bf584b-2bf5857 1957->1959 1960 2bf5859-2bf5866 1957->1960 1961 2bf58dd-2bf58e3 1958->1961 1968 2bf5868-2bf5872 1959->1968 1960->1968 1962 2bf58ef-2bf58f6 1961->1962 1963 2bf58e5-2bf58eb 1961->1963 1966 2bf58ed 1963->1966 1967 2bf5951-2bf599f 1963->1967 1966->1962 2031 2bf59a1 call 6a41f80 1967->2031 2032 2bf59a1 call 6a41f71 1967->2032 2033 2bf59a1 call 6a42188 1967->2033 1971 2bf589f-2bf58a3 1968->1971 1972 2bf5874-2bf5883 1968->1972 1973 2bf58af-2bf58b3 1971->1973 1974 2bf58a5-2bf58ab 1971->1974 1983 2bf5885-2bf588c 1972->1983 1984 2bf5893-2bf589d 1972->1984 1973->1962 1978 2bf58b5-2bf58b9 1973->1978 1976 2bf58ad 1974->1976 1977 2bf58f9-2bf594a 1974->1977 1976->1962 1977->1967 1980 2bf58bf-2bf58d1 1978->1980 1981 2bf59b7-2bf59db 1978->1981 1980->1962 1991 2bf59dd-2bf59df 1981->1991 1992 2bf59e1-2bf59e3 1981->1992 1983->1984 1984->1971 1993 2bf5a59-2bf5a5c 1991->1993 1994 2bf59e5-2bf59e9 1992->1994 1995 2bf59f4-2bf59f6 1992->1995 1999 2bf59ef-2bf59f2 1994->1999 2000 2bf59eb-2bf59ed 1994->2000 2001 2bf5a09-2bf5a0f 1995->2001 2002 2bf59f8-2bf59fc 1995->2002 1999->1993 2000->1993 2006 2bf5a3a-2bf5a3c 2001->2006 2007 2bf5a11-2bf5a38 2001->2007 2003 2bf59fe-2bf5a00 2002->2003 2004 2bf5a02-2bf5a07 2002->2004 2003->1993 2004->1993 2011 2bf5a43-2bf5a45 2006->2011 2007->2011 2009 2bf59a7-2bf59b0 2009->1981 2013 2bf5a4b-2bf5a4d 2011->2013 2014 2bf5a47-2bf5a49 2011->2014 2015 2bf5a4f-2bf5a54 2013->2015 2016 2bf5a56 2013->2016 2014->1993 2015->1993 2016->1993 2023->1936 2024->1936 2025->1936 2026->1936 2027->1936 2028->1951 2029->1951 2031->2009 2032->2009 2033->2009
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hcq$Hcq
                                                            • API String ID: 0-4088181183
                                                            • Opcode ID: fb718813f0ce017c68f775a2fc106f901ddbc802676f55e64545e81c5becd5cf
                                                            • Instruction ID: 17a729c266e3a7b3f0fd8c65669d8477960f55895b1cfa347ddc729f6c2b96da
                                                            • Opcode Fuzzy Hash: fb718813f0ce017c68f775a2fc106f901ddbc802676f55e64545e81c5becd5cf
                                                            • Instruction Fuzzy Hash: 50B1EE307042158FCB659F78C898B3E7BE2FB89314F5489A9E606CB391DB35D849CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2035 2bf87e9-2bf8805 2036 2bf8807-2bf880c 2035->2036 2037 2bf8811-2bf881d 2035->2037 2038 2bf8ba6-2bf8bab 2036->2038 2040 2bf881f-2bf8821 2037->2040 2041 2bf882d-2bf8832 2037->2041 2042 2bf8829-2bf882b 2040->2042 2041->2038 2042->2041 2043 2bf8837-2bf8843 2042->2043 2045 2bf8845-2bf8851 2043->2045 2046 2bf8853-2bf8858 2043->2046 2045->2046 2048 2bf885d-2bf8868 2045->2048 2046->2038 2050 2bf886e-2bf8879 2048->2050 2051 2bf8912-2bf891d 2048->2051 2056 2bf888f 2050->2056 2057 2bf887b-2bf888d 2050->2057 2054 2bf8923-2bf8932 2051->2054 2055 2bf89c0-2bf89cc 2051->2055 2066 2bf8934-2bf893e 2054->2066 2067 2bf8943-2bf8952 2054->2067 2064 2bf89ce-2bf89da 2055->2064 2065 2bf89dc-2bf89ee 2055->2065 2058 2bf8894-2bf8896 2056->2058 2057->2058 2059 2bf8898-2bf88a7 2058->2059 2060 2bf88b6-2bf88bb 2058->2060 2059->2060 2070 2bf88a9-2bf88b4 2059->2070 2060->2038 2064->2065 2076 2bf8a1c-2bf8a27 2064->2076 2083 2bf8a12-2bf8a17 2065->2083 2084 2bf89f0-2bf89fc 2065->2084 2066->2038 2074 2bf8976-2bf897f 2067->2074 2075 2bf8954-2bf8960 2067->2075 2070->2060 2081 2bf88c0-2bf88c9 2070->2081 2089 2bf8995 2074->2089 2090 2bf8981-2bf8993 2074->2090 2085 2bf896c-2bf8971 2075->2085 2086 2bf8962-2bf8967 2075->2086 2087 2bf8a2d-2bf8a36 2076->2087 2088 2bf8b09-2bf8b14 2076->2088 2098 2bf88cb-2bf88d0 2081->2098 2099 2bf88d5-2bf88e4 2081->2099 2083->2038 2095 2bf89fe-2bf8a03 2084->2095 2096 2bf8a08-2bf8a0d 2084->2096 2085->2038 2086->2038 2104 2bf8a4c 2087->2104 2105 2bf8a38-2bf8a4a 2087->2105 2102 2bf8b3e-2bf8b4d 2088->2102 2103 2bf8b16-2bf8b20 2088->2103 2093 2bf899a-2bf899c 2089->2093 2090->2093 2093->2055 2101 2bf899e-2bf89aa 2093->2101 2095->2038 2096->2038 2098->2038 2116 2bf8908-2bf890d 2099->2116 2117 2bf88e6-2bf88f2 2099->2117 2109 2bf89ac-2bf89b1 2101->2109 2110 2bf89b6-2bf89bb 2101->2110 2121 2bf8b4f-2bf8b5e 2102->2121 2122 2bf8ba1 2102->2122 2119 2bf8b37-2bf8b3c 2103->2119 2120 2bf8b22-2bf8b2e 2103->2120 2107 2bf8a51-2bf8a53 2104->2107 2105->2107 2114 2bf8a55-2bf8a61 2107->2114 2115 2bf8a63 2107->2115 2109->2038 2110->2038 2118 2bf8a68-2bf8a6a 2114->2118 2115->2118 2116->2038 2127 2bf88fe-2bf8903 2117->2127 2128 2bf88f4-2bf88f9 2117->2128 2125 2bf8a6c-2bf8a71 2118->2125 2126 2bf8a76-2bf8a89 2118->2126 2119->2038 2120->2119 2132 2bf8b30-2bf8b35 2120->2132 2121->2122 2133 2bf8b60-2bf8b78 2121->2133 2122->2038 2125->2038 2134 2bf8a8b 2126->2134 2135 2bf8ac1-2bf8acb 2126->2135 2127->2038 2128->2038 2132->2038 2144 2bf8b9a-2bf8b9f 2133->2144 2145 2bf8b7a-2bf8b98 2133->2145 2137 2bf8a8e-2bf8a9f call 2bf8258 2134->2137 2141 2bf8acd-2bf8ad9 call 2bf8258 2135->2141 2142 2bf8aea-2bf8af6 2135->2142 2147 2bf8aa6-2bf8aab 2137->2147 2148 2bf8aa1-2bf8aa4 2137->2148 2153 2bf8adb-2bf8ade 2141->2153 2154 2bf8ae0-2bf8ae5 2141->2154 2155 2bf8aff 2142->2155 2156 2bf8af8-2bf8afd 2142->2156 2144->2038 2145->2038 2147->2038 2148->2147 2151 2bf8ab0-2bf8ab3 2148->2151 2157 2bf8bac-2bf8bc0 2151->2157 2158 2bf8ab9-2bf8abf 2151->2158 2153->2142 2153->2154 2154->2038 2159 2bf8b04 2155->2159 2156->2159 2162 2bf8c12-2bf8c19 2157->2162 2163 2bf8bc2 2157->2163 2158->2135 2158->2137 2159->2038 2166 2bf8c4e-2bf8c60 2162->2166 2167 2bf8c1b-2bf8c2a 2162->2167 2170 2bf8d5f 2166->2170 2171 2bf8c66-2bf8c74 2166->2171 2167->2166 2172 2bf8c2c-2bf8c42 2167->2172 2173 2bf8d61-2bf8d65 2170->2173 2176 2bf8c76-2bf8c7b 2171->2176 2177 2bf8c80-2bf8c83 2171->2177 2172->2166 2181 2bf8c44-2bf8c49 2172->2181 2176->2173 2179 2bf8c89-2bf8c8c 2177->2179 2180 2bf8d66-2bf8d7e 2177->2180 2179->2171 2182 2bf8c8e 2179->2182 2181->2173 2182->2170
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'_q$4'_q
                                                            • API String ID: 0-531570531
                                                            • Opcode ID: 9d959000bb904e96439e8fcb0fa4a69eb850e0d3121528adedd7f6eaa7519ab6
                                                            • Instruction ID: ca38bb806c063fda39099c8b750b9ebb138b551e3aeacb8d0e99703a15147a5b
                                                            • Opcode Fuzzy Hash: 9d959000bb904e96439e8fcb0fa4a69eb850e0d3121528adedd7f6eaa7519ab6
                                                            • Instruction Fuzzy Hash: 21B1B3707106018FDB959B29C958B39779AEF85B04F1444EAEB12CF3B2EB25CC4AC742

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2184 2bf5c08-2bf5c15 2185 2bf5c1d-2bf5c1f 2184->2185 2186 2bf5c17-2bf5c1b 2184->2186 2188 2bf5e30-2bf5e37 2185->2188 2186->2185 2187 2bf5c24-2bf5c2f 2186->2187 2189 2bf5e38 2187->2189 2190 2bf5c35-2bf5c3c 2187->2190 2195 2bf5e3d-2bf5e75 2189->2195 2191 2bf5c42-2bf5c51 2190->2191 2192 2bf5dd1-2bf5dd7 2190->2192 2191->2195 2196 2bf5c57-2bf5c66 2191->2196 2193 2bf5ddd-2bf5de1 2192->2193 2194 2bf5dd9-2bf5ddb 2192->2194 2197 2bf5e2e 2193->2197 2198 2bf5de3-2bf5de9 2193->2198 2194->2188 2208 2bf5e7e-2bf5e82 2195->2208 2209 2bf5e77-2bf5e7c 2195->2209 2202 2bf5c7b-2bf5c7e 2196->2202 2203 2bf5c68-2bf5c6b 2196->2203 2197->2188 2198->2189 2200 2bf5deb-2bf5dee 2198->2200 2200->2189 2204 2bf5df0-2bf5e05 2200->2204 2207 2bf5c8a-2bf5c90 2202->2207 2210 2bf5c80-2bf5c83 2202->2210 2206 2bf5c6d-2bf5c70 2203->2206 2203->2207 2224 2bf5e29-2bf5e2c 2204->2224 2225 2bf5e07-2bf5e0d 2204->2225 2211 2bf5c76 2206->2211 2212 2bf5d71-2bf5d77 2206->2212 2217 2bf5ca8-2bf5cc5 2207->2217 2218 2bf5c92-2bf5c98 2207->2218 2213 2bf5e88-2bf5e8a 2208->2213 2209->2213 2214 2bf5cd6-2bf5cdc 2210->2214 2215 2bf5c85 2210->2215 2219 2bf5d9c-2bf5d9e 2211->2219 2228 2bf5d8f-2bf5d99 2212->2228 2229 2bf5d79-2bf5d7f 2212->2229 2220 2bf5e9f-2bf5ea6 2213->2220 2221 2bf5e8c-2bf5e9e 2213->2221 2222 2bf5cde-2bf5ce4 2214->2222 2223 2bf5cf4-2bf5d06 2214->2223 2215->2219 2254 2bf5cce-2bf5cd1 2217->2254 2226 2bf5c9c-2bf5ca6 2218->2226 2227 2bf5c9a 2218->2227 2239 2bf5da7-2bf5da9 2219->2239 2230 2bf5ce8-2bf5cf2 2222->2230 2231 2bf5ce6 2222->2231 2249 2bf5d08-2bf5d14 2223->2249 2250 2bf5d16-2bf5d39 2223->2250 2224->2188 2232 2bf5e1f-2bf5e22 2225->2232 2233 2bf5e0f-2bf5e1d 2225->2233 2226->2217 2227->2217 2228->2219 2234 2bf5d83-2bf5d8d 2229->2234 2235 2bf5d81 2229->2235 2230->2223 2231->2223 2232->2189 2240 2bf5e24-2bf5e27 2232->2240 2233->2189 2233->2232 2234->2228 2235->2228 2246 2bf5dbd-2bf5dbf 2239->2246 2247 2bf5dab-2bf5daf 2239->2247 2240->2224 2240->2225 2252 2bf5dc3-2bf5dc6 2246->2252 2247->2246 2251 2bf5db1-2bf5db5 2247->2251 2258 2bf5d61-2bf5d6f 2249->2258 2250->2189 2260 2bf5d3f-2bf5d42 2250->2260 2251->2189 2255 2bf5dbb 2251->2255 2252->2189 2256 2bf5dc8-2bf5dcb 2252->2256 2254->2219 2255->2252 2256->2191 2256->2192 2258->2219 2260->2189 2262 2bf5d48-2bf5d5a 2260->2262 2262->2258
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,cq$,cq
                                                            • API String ID: 0-2927840315
                                                            • Opcode ID: 8b2eadafe2c99d9e9aec0c8c96ec7c0efb6acd55cc2618af7003a368d179bedc
                                                            • Instruction ID: 4a32defe098db9d29bafbd1f2805f3bfdcaee34a2f220a20b34486eb29700ee9
                                                            • Opcode Fuzzy Hash: 8b2eadafe2c99d9e9aec0c8c96ec7c0efb6acd55cc2618af7003a368d179bedc
                                                            • Instruction Fuzzy Hash: F381D435B01105DFCB64CF69C888AAABBF2FF89304B9581A9D606DB364D731E845CB50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2264 6a41f80-6a41f93 2266 6a41f95-6a41f97 2264->2266 2267 6a41f9c-6a41fb0 2264->2267 2268 6a42020-6a42023 2266->2268 2270 6a41fb6 2267->2270 2271 6a41fb2-6a41fb4 2267->2271 2272 6a41fb9-6a41fbe 2270->2272 2271->2272 2273 6a41fc5-6a41fdf 2272->2273 2276 6a42024-6a42057 2273->2276 2277 6a41fe1-6a42017 2273->2277 2282 6a42060-6a42087 2276->2282 2283 6a42059-6a4205b 2276->2283 2277->2273 2291 6a42019 2277->2291 2292 6a420be-6a420c0 2282->2292 2293 6a42089-6a4209f 2282->2293 2284 6a42164-6a4216b 2283->2284 2291->2268 2294 6a420c2-6a420c4 2292->2294 2295 6a420c9-6a420dd 2292->2295 2293->2292 2302 6a420a1-6a420b8 2293->2302 2294->2284 2298 6a420e3 2295->2298 2299 6a420df-6a420e1 2295->2299 2301 6a420e6-6a42103 2298->2301 2299->2301 2307 6a4216c 2301->2307 2308 6a42105-6a42108 2301->2308 2302->2292 2302->2307 2312 6a42171-6a421a4 2307->2312 2308->2307 2309 6a4210a-6a4210e 2308->2309 2310 6a42150-6a4215d 2309->2310 2311 6a42110-6a42116 2309->2311 2310->2284 2313 6a42119-6a42121 2311->2313 2320 6a421ad-6a421fa 2312->2320 2333 6a421a7 call 6a42210 2312->2333 2313->2312 2314 6a42123-6a42139 call 6a41d30 2313->2314 2323 6a42147-6a4214a 2314->2323 2324 6a4213b-6a4213d 2314->2324 2330 6a42201 2320->2330 2331 6a421fc-6a421ff 2320->2331 2323->2307 2325 6a4214c-6a4214e 2323->2325 2324->2323 2325->2310 2325->2313 2332 6a42204-6a42209 2330->2332 2331->2332 2333->2320
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR_q$LR_q
                                                            • API String ID: 0-1289077650
                                                            • Opcode ID: bcdafe926b3cc718ec36dc9da5df80383cefbf3a403dab4a2955cfa2f1e0e2db
                                                            • Instruction ID: 6dd44ca67d5534de4140ff709bf90b9fc5229e258990bbaa20b594e69d0b3b18
                                                            • Opcode Fuzzy Hash: bcdafe926b3cc718ec36dc9da5df80383cefbf3a403dab4a2955cfa2f1e0e2db
                                                            • Instruction Fuzzy Hash: 7A818B35B101058FCB58FF78D854A6E7BF2AFC9604B1581AAE506DB3A1DB31DD02CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2334 6a487c0-6a487df 2335 6a487e5-6a487ee 2334->2335 2336 6a4899a-6a489bf 2334->2336 2339 6a487f4-6a48849 2335->2339 2340 6a489c6-6a48a60 call 6a484e8 2335->2340 2336->2340 2349 6a48873-6a4887c 2339->2349 2350 6a4884b-6a48870 2339->2350 2380 6a48a65-6a48a6a 2340->2380 2351 6a48881-6a48891 2349->2351 2352 6a4887e 2349->2352 2350->2349 2391 6a48893 call 6a487b0 2351->2391 2392 6a48893 call 6a487c0 2351->2392 2393 6a48893 call 6a48a10 2351->2393 2394 6a48893 call 6a489a3 2351->2394 2352->2351 2356 6a48899-6a4889b 2358 6a488f5-6a48942 2356->2358 2359 6a4889d-6a488a2 2356->2359 2371 6a48949-6a4894e 2358->2371 2361 6a488a4-6a488d9 2359->2361 2362 6a488db-6a488ee 2359->2362 2361->2371 2362->2358 2374 6a48950 2371->2374 2375 6a48958-6a4895d 2371->2375 2374->2375 2378 6a48967-6a4896c 2375->2378 2379 6a4895f 2375->2379 2381 6a48981-6a48982 2378->2381 2382 6a4896e-6a4897c call 6a427ec call 6a42804 2378->2382 2379->2378 2381->2336 2382->2381 2391->2356 2392->2356 2393->2356 2394->2356
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (&_q$(cq
                                                            • API String ID: 0-1128674267
                                                            • Opcode ID: 183ad3cd1de9dd5c94de3e83bf9af3319ef66238af81fc2b4cc0d4035a12487d
                                                            • Instruction ID: 9a3be26fb072111c1c8179a6853e9215123312009b761344b795678da910961a
                                                            • Opcode Fuzzy Hash: 183ad3cd1de9dd5c94de3e83bf9af3319ef66238af81fc2b4cc0d4035a12487d
                                                            • Instruction Fuzzy Hash: 21717F31F002199BDB55EFB8D8506AEBBF6AFC8710F148529E406AB380DF35AD06C791
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xcq$Xcq
                                                            • API String ID: 0-1149048318
                                                            • Opcode ID: e6f305ccd00b6164e029a10ecb449aa22a78860eccf0c8df07afa10b5687329d
                                                            • Instruction ID: bb15ffc30521796bc12c1fb19fedf93a2b436f41f4ad900559398123ed8975ff
                                                            • Opcode Fuzzy Hash: e6f305ccd00b6164e029a10ecb449aa22a78860eccf0c8df07afa10b5687329d
                                                            • Instruction Fuzzy Hash: 73310432B003658BDF999A6A899437EB5E6FBC0250F1805F9EA06C3384DB74CC4986A1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR_q
                                                            • API String ID: 0-2241839734
                                                            • Opcode ID: 0e9f602e96f063b3b17378a6e74a12539b2d917d2c906e0b1183200db73c63b2
                                                            • Instruction ID: 722904c616465bfe2f64cba6f484d63949979ec8ee80ed5b6012dcb9a3f6b7b9
                                                            • Opcode Fuzzy Hash: 0e9f602e96f063b3b17378a6e74a12539b2d917d2c906e0b1183200db73c63b2
                                                            • Instruction Fuzzy Hash: DE22B479D4021A8FCB55EF68E899A9DBBB1FF48300F108AA9E409A7359DB306D55CF40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR_q
                                                            • API String ID: 0-2241839734
                                                            • Opcode ID: 3e96fda2b23befc497ae77956e62c6de32831cd69e236695b0428ec09eb82f00
                                                            • Instruction ID: 541f16b62b1c8b59d59da20fa292be6ff7080ba796b9dfab47f1f9440919fc88
                                                            • Opcode Fuzzy Hash: 3e96fda2b23befc497ae77956e62c6de32831cd69e236695b0428ec09eb82f00
                                                            • Instruction Fuzzy Hash: 6A22C479D4021ACFCB55EF68E899A9DBBB1FF48300F108AA9E409A7319DB306D55CF40
                                                            APIs
                                                            • LdrInitializeThunk.NTDLL(00000000), ref: 05967CCE
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3766939727.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_5960000_file.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 9fe55e56d0ae14343a59d546998394651dbfb91dad99ca7e9587872c93d730ec
                                                            • Instruction ID: e59d6985bd1d0374460ff4820f1a995547e2175e687b0a35cc4216604946d0f8
                                                            • Opcode Fuzzy Hash: 9fe55e56d0ae14343a59d546998394651dbfb91dad99ca7e9587872c93d730ec
                                                            • Instruction Fuzzy Hash: E9116A74E011099FDB04DBE9D8A4EBDBBB6FB88308F14C665E804A7345D735A945CB20
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q
                                                            • API String ID: 0-493409505
                                                            • Opcode ID: c54909ffcfe47916dbd143691061e93aa59f604cd02fcbe6d2eba6fbe8b9b597
                                                            • Instruction ID: 11215e37a4133f44a4b67e77e73829d56a358984288cd77fb4820b51a93e6987
                                                            • Opcode Fuzzy Hash: c54909ffcfe47916dbd143691061e93aa59f604cd02fcbe6d2eba6fbe8b9b597
                                                            • Instruction Fuzzy Hash: A541E335B002449FCB199F78D854AAEBBF6FFC9610F2485A9E516DB390DE319C06CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1ea1ba195f258fdfa4cbe5c6726c9d8cc655000921254452e6eff99950dd2bf0
                                                            • Instruction ID: dbbd4417de8741205e65cd8b1974b57b5bada88c0f043228ca3f5d1cb114b54b
                                                            • Opcode Fuzzy Hash: 1ea1ba195f258fdfa4cbe5c6726c9d8cc655000921254452e6eff99950dd2bf0
                                                            • Instruction Fuzzy Hash: BCF14175A00215CFCB48DF6DC984A9DBBF2FF88314B1A81A9E519AB365C731EC45CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2a02856a200ea83085e95a632c2800d70166c887e81834b771192e669a0f452f
                                                            • Instruction ID: a8e124ba7337522224ee524cf7950345e367ee0c3cae46702e0ee9e7790c4233
                                                            • Opcode Fuzzy Hash: 2a02856a200ea83085e95a632c2800d70166c887e81834b771192e669a0f452f
                                                            • Instruction Fuzzy Hash: B171E7347002058FCB95DF28C898AA9BBE6EF49604F1940E9EA06CB3B1DF70DC55DB90
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ec8589e808b41de30cf4619eb085654b67670ed8ddf020977f0c5c84b3fb296
                                                            • Instruction ID: e7a198fc89045854f56ad082ebfee5ddfcb9441a5380d89ec60e7bc9ba5be694
                                                            • Opcode Fuzzy Hash: 3ec8589e808b41de30cf4619eb085654b67670ed8ddf020977f0c5c84b3fb296
                                                            • Instruction Fuzzy Hash: FE51C0708A13178FD3192F20A5EE22ABBB4FB1F367784AE44B51F82419CB346465CF25
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06ea20efa554f5b0f4db3712a69cd17a453b7d0369ce13d291a0ab3096db563b
                                                            • Instruction ID: 54c0a10d6a0dca8860df4d033224b6e137b2c6546ab437befa8d6c9d608adbaf
                                                            • Opcode Fuzzy Hash: 06ea20efa554f5b0f4db3712a69cd17a453b7d0369ce13d291a0ab3096db563b
                                                            • Instruction Fuzzy Hash: 0751BE708A13178FD2192F20A1EE22ABBB4FB1F363780AE40B51F82409CB346465CF24
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 545de4ad1bf321d5e8322b6198191a9997b4b923e7a41982ccc34809b469a65d
                                                            • Instruction ID: 5127bcaaaa90b01e17d48bf3744737b59d29a85bfb90b0a5b13c877f9d5687d9
                                                            • Opcode Fuzzy Hash: 545de4ad1bf321d5e8322b6198191a9997b4b923e7a41982ccc34809b469a65d
                                                            • Instruction Fuzzy Hash: 34512A35B01621CFDB98FB28D99497A77B2BF893547410865E806DB768CB30EC82CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 778448a152f13474b109df072c10be4b63e5f221449cafdf4d3da01b28003e09
                                                            • Instruction ID: 1066ca95af60ba423d401534065aa93c50f1eb0554bb4a215e2d967bfa928e33
                                                            • Opcode Fuzzy Hash: 778448a152f13474b109df072c10be4b63e5f221449cafdf4d3da01b28003e09
                                                            • Instruction Fuzzy Hash: DA614374D01319DFDB14DFA4D954AADBBB2FF89304F208529E809AB398DB355A4ACF40
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 81b0a91077da4070f2be2eab2bb5c24a8e7df4a3fcb377b86605402d7c1bed6b
                                                            • Instruction ID: 6cd782641c25dd6450bfc1d5226d387a1a2c9e15b4b63272e6a07be013c53a8a
                                                            • Opcode Fuzzy Hash: 81b0a91077da4070f2be2eab2bb5c24a8e7df4a3fcb377b86605402d7c1bed6b
                                                            • Instruction Fuzzy Hash: 33519574E012189FDB58DFA9D5849DDBBF2FF89300F24916AE819AB364DB30A941CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8a316d79d05d2b4170021f9c01b49d0ca2251f7db89a5ad0fc7b107357bacdaf
                                                            • Instruction ID: 8d7a18320a2255553ce8ccc8543fdb8e637cb67b8d48954ecc348729a0bb12f8
                                                            • Opcode Fuzzy Hash: 8a316d79d05d2b4170021f9c01b49d0ca2251f7db89a5ad0fc7b107357bacdaf
                                                            • Instruction Fuzzy Hash: A8418D36D41219CFD714AFA0D4AC7EE7BB1FB99316F504828D20667294CBB41A88CF91
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 421dd3421201f6f32ff8e35a7e0625fb173b483cf1740e6a2b3ee61a4b81df55
                                                            • Instruction ID: 6a7735a5c8cc7de2d15344618d758e84e520b173584ed4a49764426cf2203aa8
                                                            • Opcode Fuzzy Hash: 421dd3421201f6f32ff8e35a7e0625fb173b483cf1740e6a2b3ee61a4b81df55
                                                            • Instruction Fuzzy Hash: 4E51A579E11208CFCB48DFA9D49499DBBF2FF89310B208469E909BB364DB31A945CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7fe500f33752fa14f083714b9e0798af9b716964e31a6a951acdd372d37dd2af
                                                            • Instruction ID: ca08a8454635106a48aa0cf5813179f05a307f07f4bf7fa10456a1a2462ce570
                                                            • Opcode Fuzzy Hash: 7fe500f33752fa14f083714b9e0798af9b716964e31a6a951acdd372d37dd2af
                                                            • Instruction Fuzzy Hash: 6441E631A04649DFCF51CFA8C844B9DBFB2FF49314F048595EA25AB2A1D335E958CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c08f64249078200908b5153369f5926c0ecddd526d471b9b8ac6e74a3cb07950
                                                            • Instruction ID: dee7aaa2ee5bdbce440e904ed951c54e9b3285f952ce863b1d13cc680e8f927d
                                                            • Opcode Fuzzy Hash: c08f64249078200908b5153369f5926c0ecddd526d471b9b8ac6e74a3cb07950
                                                            • Instruction Fuzzy Hash: AF414231E006199BDB54EFA5DD80ADEFBF5AF88700F248129E515BB240DB70E946CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ab909411bdd4017579b976b74b75a650bc55d11f2659149c602caa98f3371e9
                                                            • Instruction ID: b246b14cb9cfd8b3acfcd2afff4c77f34a5dccdee576032487d005a60559e95e
                                                            • Opcode Fuzzy Hash: 3ab909411bdd4017579b976b74b75a650bc55d11f2659149c602caa98f3371e9
                                                            • Instruction Fuzzy Hash: A241BD31A00248DFCB14CF65C944BAABBFAFB44304F0484AEE9259B251D774ED58CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df67c34f224828e6f80e2aa9dd547714d779e7f2e7b2736bc7a71117df77a834
                                                            • Instruction ID: 0542d9866b01875c67ee15ffd340fdb3a4fea4f1f0304437eeafae0884ea5ce7
                                                            • Opcode Fuzzy Hash: df67c34f224828e6f80e2aa9dd547714d779e7f2e7b2736bc7a71117df77a834
                                                            • Instruction Fuzzy Hash: F531CF7170010A9FCB099F68D894AAF7BB2FF89314F008464FA168B350DB35DD65DBA0
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4a877c0d8e4bffcbc8726e0c2780031473fb16fa3c579faf1024ecc46b0fe0ea
                                                            • Instruction ID: ac8af3c953a5ce9d3e0e5566720fecd638b1c3ded6dc8dc477a974282635b37c
                                                            • Opcode Fuzzy Hash: 4a877c0d8e4bffcbc8726e0c2780031473fb16fa3c579faf1024ecc46b0fe0ea
                                                            • Instruction Fuzzy Hash: B731C231C45209DFD710AF74D4AC7EEBBB1FB49315F108868D60667284CB780658CF90
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cfbb5703d12bb9f0e7c646d39c4f1d3666e72cfd012b0b0cd0148c852fffa6e1
                                                            • Instruction ID: bc07587b4ea00a3e80a6a7ff14bb2f9be7e144307c2b774fed7b5d4a0865c2c6
                                                            • Opcode Fuzzy Hash: cfbb5703d12bb9f0e7c646d39c4f1d3666e72cfd012b0b0cd0148c852fffa6e1
                                                            • Instruction Fuzzy Hash: 7221B0383202014BEB545629C854B7EA69BEFC8618F1440F9D606CB798EF25CC4AE7C1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a49cbedb75fb6a69173d84b0988d37be0c345ae368332b0e024299d768308f5b
                                                            • Instruction ID: 1a77587f38b5eb89139d98d113336317c4d6abd5d171e27c3334079804ec1055
                                                            • Opcode Fuzzy Hash: a49cbedb75fb6a69173d84b0988d37be0c345ae368332b0e024299d768308f5b
                                                            • Instruction Fuzzy Hash: 31318671E001058FCB08DF6DC884A6EB7F6FF89354B15C269E619973A4C730AC46CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eab49d5085e61ed75bd885179dca2f642ebdcbc0693630ba951d42a94597d280
                                                            • Instruction ID: cee5e12cee1f8376a11046fe89577b03553413044c59debeb5427eec0158ed7d
                                                            • Opcode Fuzzy Hash: eab49d5085e61ed75bd885179dca2f642ebdcbc0693630ba951d42a94597d280
                                                            • Instruction Fuzzy Hash: B531EC35609624CFEB88FF18ED9497677B2BF852587404856F8068B758C731EC82CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf732530e9a55b6d578bbdb1d664fd4414f357d4f51747f3d65ad1b641c6d3d9
                                                            • Instruction ID: ca80c37eb596d10f6c303e3f3c5c4fe6a0bb1b1ca0b8d6ac56aec619ad9b570c
                                                            • Opcode Fuzzy Hash: bf732530e9a55b6d578bbdb1d664fd4414f357d4f51747f3d65ad1b641c6d3d9
                                                            • Instruction Fuzzy Hash: 3A213831E441528FCBA5BB688CE043EBBB2AFC22407154976E455DB252E734ACD1C791
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 96f52b4fbcf4d7abfa54227344b3528aee5a3cd03545a9cffa4e0f9ea6bd8aec
                                                            • Instruction ID: 1b88e0d89e961157fe0ffc96e32dda676c1602827ebbf22eed7837e445a62b74
                                                            • Opcode Fuzzy Hash: 96f52b4fbcf4d7abfa54227344b3528aee5a3cd03545a9cffa4e0f9ea6bd8aec
                                                            • Instruction Fuzzy Hash: 3F21E036A00205AFCB54DF34C450AAE77B6EF88764B50C459E94A8B344EB31EE46CBD2
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ac9781adb73f500d762190d519b4ccc1893e7b62976e04dad47b9bd031b583b4
                                                            • Instruction ID: eb792fa90acabb431c293db769ebd89d004da1416047a47771d3b5b97ed573d4
                                                            • Opcode Fuzzy Hash: ac9781adb73f500d762190d519b4ccc1893e7b62976e04dad47b9bd031b583b4
                                                            • Instruction Fuzzy Hash: 1221E435701A128FC7299E29C4A462FB7A2FFC975475485A8EA16DB350DF30DC1ACBC0
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3760207110.0000000002B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B0D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2b0d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 84b3f0b968ed5378326df0287d51b8d0a85241926bde4b3d5410193f715d8631
                                                            • Instruction ID: edb2a6ed146d860735f5ccf1791d563b315d8693c75fc5a39b96348e47fbbec3
                                                            • Opcode Fuzzy Hash: 84b3f0b968ed5378326df0287d51b8d0a85241926bde4b3d5410193f715d8631
                                                            • Instruction Fuzzy Hash: 9A2100755042059FDB12CF64C9D0F26BF65EB88314F20C5A9E84E4B2D6D73AD846CA61
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b67e46ef299a8a1689d10e86acc6e3e0cf99555c1b7c6f0c50f5df385fa0dc1
                                                            • Instruction ID: 8b9ad865e3366112b30cc518360f497f18aac565295d8f6eeb3e4b028f3f3de4
                                                            • Opcode Fuzzy Hash: 6b67e46ef299a8a1689d10e86acc6e3e0cf99555c1b7c6f0c50f5df385fa0dc1
                                                            • Instruction Fuzzy Hash: 82119E32E0425D9FCB019FB8DC105DEFB31FF89310B248796D666B7150EA316906C792
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3fba01ea6f32a7800d4c9f8e003e6403d7d5e2cfddba4161263662826bd481fc
                                                            • Instruction ID: 01c250591be03b3d28164c8b0a60ee851a239165e99ab0e3c3feb6fe9c024098
                                                            • Opcode Fuzzy Hash: 3fba01ea6f32a7800d4c9f8e003e6403d7d5e2cfddba4161263662826bd481fc
                                                            • Instruction Fuzzy Hash: E22121326401099FCB18AF68E444B6B3BF2FB48314F008468FA058B340DB38DC69CBE0
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7c17eabab9178d35b0357a62e54353e8205fc017372e404d9d3d4d75d2cbdac9
                                                            • Instruction ID: 7b52cbb1108799e6cf40de0e62e001887019129d3956d3310ebe0f05cf72d873
                                                            • Opcode Fuzzy Hash: 7c17eabab9178d35b0357a62e54353e8205fc017372e404d9d3d4d75d2cbdac9
                                                            • Instruction Fuzzy Hash: CB1108353083945FCF469F78582456E3FE3EFC5220B04446AE906C7381DE384D16C3A1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7b06ae8c89f39443f28e23a6f324710290dfc42432ffe7842af65d4654f57dcb
                                                            • Instruction ID: 18fd1f8d1bd4a7725a6a004725cecd1e45dc5c35a29482753ec78de1c19bd94c
                                                            • Opcode Fuzzy Hash: 7b06ae8c89f39443f28e23a6f324710290dfc42432ffe7842af65d4654f57dcb
                                                            • Instruction Fuzzy Hash: 11215C74E0020A9FDB45EFB9D98179EBBF1FB44304F0085BAD1149B329EB705A4ACB81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c238434adf2dea75626db781b94484c32c74e6dd19339734552d3617fb0b7042
                                                            • Instruction ID: e2c377b40c9697a3f47c9cfef5a58ae00d53de2582d45cacff9c72d619868657
                                                            • Opcode Fuzzy Hash: c238434adf2dea75626db781b94484c32c74e6dd19339734552d3617fb0b7042
                                                            • Instruction Fuzzy Hash: 82117CB03002068FD7A4AF6ED494A2AB3D5FF8964479444BDD60ACB3A1DB61EC09C791
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 65bee4942eff3999f93d822c0e2a428d0e3a55c2f81a7fa3657cf77880a08984
                                                            • Instruction ID: 0f658d32a04f5722e7c27e35c2a888cd18617fb4fee2ad88196eb4c7ca1ab8e4
                                                            • Opcode Fuzzy Hash: 65bee4942eff3999f93d822c0e2a428d0e3a55c2f81a7fa3657cf77880a08984
                                                            • Instruction Fuzzy Hash: 75110C31B092449FD7045B3958586BBBFA7BFCA210B14497BE547C729ACD354C0687A0
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 527c0dbfdcc452b1ed18e3e13fafd5fe9ce83af43578d9d4a77b0bf61cfe73e2
                                                            • Instruction ID: 9fa92f0c8bc5a40e3bafee4b6a08f0078a0b56a5e71ac47831848b34b8c572e9
                                                            • Opcode Fuzzy Hash: 527c0dbfdcc452b1ed18e3e13fafd5fe9ce83af43578d9d4a77b0bf61cfe73e2
                                                            • Instruction Fuzzy Hash: 671156B2800249DFCB10EF99D944BDEBFF4EB48320F148419E918A7210C339A954CFA4
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 929abcbf6ed2ae755141e84d065df5a384a92a9943f853e535abf4881847ae74
                                                            • Instruction ID: 8b4ded03018f6b818d5f9b0ca9c47757af31cf576860c191b7c2d5c926aedc99
                                                            • Opcode Fuzzy Hash: 929abcbf6ed2ae755141e84d065df5a384a92a9943f853e535abf4881847ae74
                                                            • Instruction Fuzzy Hash: CD114C74E0020A9FCB45EFBDD58179EBBF1FB44304F10C5AAD1149B328EB706A098B81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 816f6bfce891f1b17a2bb8be91ebbca6ad02c8099109592dc137e164bf5d8c68
                                                            • Instruction ID: b0179dd93a2717ad954e735aff124bfaf3fd88ae63623d1e449a95a539e6da26
                                                            • Opcode Fuzzy Hash: 816f6bfce891f1b17a2bb8be91ebbca6ad02c8099109592dc137e164bf5d8c68
                                                            • Instruction Fuzzy Hash: 5D21E2B5D056098FDB40EFA9D8866EEBFF0FB09300F10866AD805B3214EB305A55CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 43161312ce9c276d803cbcabc6fee26aa950cf0415112f0e428ec78531c554dd
                                                            • Instruction ID: 7fbdec5fb291c48d57e1296d661482c7107e4db20ea8f3e9439f598d5b4f0b92
                                                            • Opcode Fuzzy Hash: 43161312ce9c276d803cbcabc6fee26aa950cf0415112f0e428ec78531c554dd
                                                            • Instruction Fuzzy Hash: 08112E34F001498FEB40EBECEC50BAEBBB5AB88314F019061E918A7344EA349941CB61
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 85d14b9034d1587c7b194cfc29042df7e99c1c5e47f40a3b794c3b8e853199bf
                                                            • Instruction ID: ba06dc03284225420079322919d3ad4054d40395942b4abb235bd89b5fff14a9
                                                            • Opcode Fuzzy Hash: 85d14b9034d1587c7b194cfc29042df7e99c1c5e47f40a3b794c3b8e853199bf
                                                            • Instruction Fuzzy Hash: 1B213674C046098FCB00EFA8D8585EDBFB0FF4A310F1046AAD445B7264EB301A85CBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3760207110.0000000002B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B0D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2b0d000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                            • Instruction ID: 8d310fb2e68dff73a05f63b6681dc22ce3a795ed61c67fa3f675c27f86af332b
                                                            • Opcode Fuzzy Hash: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                            • Instruction Fuzzy Hash: 2611D075504244CFCB12CF50D9C4B15BF61FB44314F24C6ADE8494B692C33AD44ACF51
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4db935c2262a20c7c4aa407fb57ba674951a27603e4697f4e6f3ccacf5e10a1d
                                                            • Instruction ID: ff64689c4a70aa4a08457885fe992cba8cfba3436b9fe07e9d3e67a892d203a4
                                                            • Opcode Fuzzy Hash: 4db935c2262a20c7c4aa407fb57ba674951a27603e4697f4e6f3ccacf5e10a1d
                                                            • Instruction Fuzzy Hash: C61120B6800249DFCB10DF99D945BEEBBF4EB48320F14841AE928A7250C339A594DFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 26f29f2a7a21f2cc25dd1c421c7f5c702790cef75b4800ac0b36c4e41791a2f1
                                                            • Instruction ID: fe73943ce47175feef4d0f8addb88e48f13b30c012d35908d093a584387d3cf1
                                                            • Opcode Fuzzy Hash: 26f29f2a7a21f2cc25dd1c421c7f5c702790cef75b4800ac0b36c4e41791a2f1
                                                            • Instruction Fuzzy Hash: FE012472B001146FDB169E68D810BAF3BEBEBCA350F18802AF615C7240CE319812DBA0
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8cafef66486ce8a44eca5f255f55084a4d53c0e19a2fe113e000757879644919
                                                            • Instruction ID: 821f36b40a31c0401d04aebc469f4d8182e74e5263940453bafd0b87368743e7
                                                            • Opcode Fuzzy Hash: 8cafef66486ce8a44eca5f255f55084a4d53c0e19a2fe113e000757879644919
                                                            • Instruction Fuzzy Hash: 46118075F502118FC750EF78E91865ABBF5FF8961171005AAE809DB311EB71C905CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e50effa52074734d50c2d82cc8473e3505049d4f9991ac7531638ade4731da40
                                                            • Instruction ID: fef0fee1e856063b805f0593899640d34da807de5a9c8e5d7ac45229ce57e7b2
                                                            • Opcode Fuzzy Hash: e50effa52074734d50c2d82cc8473e3505049d4f9991ac7531638ade4731da40
                                                            • Instruction Fuzzy Hash: 2901E470E002199FCB84EFB988006EEBBB5BF88200F10856AD919F7250EB345A01CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f2c0609574b198bdeb305d65d2cd60446b84c31d1510af787435d707ea4b03d1
                                                            • Instruction ID: 29b05155cb956b9424fbab34a714eacdfbf02039242f450d8d0db383a34362f3
                                                            • Opcode Fuzzy Hash: f2c0609574b198bdeb305d65d2cd60446b84c31d1510af787435d707ea4b03d1
                                                            • Instruction Fuzzy Hash: D1F089363002196F8F05AE98AC509AF7FEBEBC8260B404429FA05C7350DE32982197A5
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6d57e1521506570236830531e374b32f989c21d9734ea9ceb6d1d46a95f2124
                                                            • Instruction ID: 1c795b1334eda0c7616bfb22f4ffea6d5178f1b23cf12c45d988c4c37dcff588
                                                            • Opcode Fuzzy Hash: b6d57e1521506570236830531e374b32f989c21d9734ea9ceb6d1d46a95f2124
                                                            • Instruction Fuzzy Hash: 37F054317041108FD754BF29D8189367BA6AFC6610B1544AAE909CF261DA60CC41CBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc74831165f468c5c6b70d697a3ac69cf63dc1891a78e189e414d5aebd8e532b
                                                            • Instruction ID: 999d67cdee73dcc4787750342053e38fce140ca875b48667a237b8c8c83a2521
                                                            • Opcode Fuzzy Hash: dc74831165f468c5c6b70d697a3ac69cf63dc1891a78e189e414d5aebd8e532b
                                                            • Instruction Fuzzy Hash: AFF01C357401148FD758BF2AE858A3A77EAEFC5661B1584A9E90ACB361DE70DC018BA0
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a995cf990efd648e32a779c8d06dad6763c12e9a0a62a422e5401abbc14059ee
                                                            • Instruction ID: fbad699083e5e13d12c1479e502fcdb391ff5b1e75246adf46b27b0e58c6e24d
                                                            • Opcode Fuzzy Hash: a995cf990efd648e32a779c8d06dad6763c12e9a0a62a422e5401abbc14059ee
                                                            • Instruction Fuzzy Hash: 39E0CD73D1022A53CB00D7A1DC056DFF738EFA2355F448621D42433140FBB1275A82E1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 575b7641f5de22e28a637054fc2367d963ee4d5522586762f30d20ed5e401514
                                                            • Instruction ID: 9881684e2ac1c203c46f0e201e92faa7cd433983539ecb409d52f3263c0f21e1
                                                            • Opcode Fuzzy Hash: 575b7641f5de22e28a637054fc2367d963ee4d5522586762f30d20ed5e401514
                                                            • Instruction Fuzzy Hash: 84D05B31D2022B57CB00E7A5DC044EFF738EED5265B908626D55437140FB702659C7E1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                            • Instruction ID: e2049fa48bc3c6e943cccb70727083a77e56c37d3f59a8d5d1a5112bfaf9a5a5
                                                            • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                            • Instruction Fuzzy Hash: 1EC08C3320C1382BA674108F7C40EB7BB8CC3C13F4A2501B7FA5CE7200A842AC8441F8
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 24720aeaffcc6cd27c60842a81dbe82c6f1253c1c397592e8f76ec7afe65be52
                                                            • Instruction ID: 3109bfe966ddfadcb9aaf2fd1eeb286ca1546f1ddb193177897028f0f173b52c
                                                            • Opcode Fuzzy Hash: 24720aeaffcc6cd27c60842a81dbe82c6f1253c1c397592e8f76ec7afe65be52
                                                            • Instruction Fuzzy Hash: 3BD0677BB410189FCB049F9CE880DDDB7B6FB9C221B048516E915A3261C6329921DB50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea804225903315bc1bdfcd6f1061a27ab3c7afa9b1407b229a2e7d90d6e8d8df
                                                            • Instruction ID: f3fa52b6506c5a2852be0518a370bc8ba6c0b162ed8a0ccf3acca23d82f27ae1
                                                            • Opcode Fuzzy Hash: ea804225903315bc1bdfcd6f1061a27ab3c7afa9b1407b229a2e7d90d6e8d8df
                                                            • Instruction Fuzzy Hash: 22D02E714083C38FC302FB30EA562083F31BA82308F8009A1E8094A52FEBB80A0987D1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 301b9f58ab64a1753770e7c26443fa2f3540611f9ac30898da43a84e6f0fee98
                                                            • Instruction ID: f8860573010860a7142ce7969609ecd3b499fb23b39c1058b94688fbb5951b5c
                                                            • Opcode Fuzzy Hash: 301b9f58ab64a1753770e7c26443fa2f3540611f9ac30898da43a84e6f0fee98
                                                            • Instruction Fuzzy Hash: B3C0123554574B4BC501FB75FA86619776AB6C1304F404A20B0090622DDF7429488690
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3df530a0ac2bebcaa62aed03706c8fa45e200ea47be2d398ba19a972832b6133
                                                            • Instruction ID: 443bb5227e726f7c5c7ca786ab56e6116a2e6a12e897390822cfd0dd7fe6e0dd
                                                            • Opcode Fuzzy Hash: 3df530a0ac2bebcaa62aed03706c8fa45e200ea47be2d398ba19a972832b6133
                                                            • Instruction Fuzzy Hash: E0C08C3040A6838FCF22EF6868682087FA0FB87200F6002D6C0528B0B2C221019ACB22
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xcq$Xcq$Xcq$Xcq
                                                            • API String ID: 0-2577476577
                                                            • Opcode ID: 2eef727ff268ab613108cc6563941648370862b120f2685a03f45788e09418a8
                                                            • Instruction ID: 9b78b727df965b90d6c40d07bb93abc2f9e5175d00b16934b41493fcb0499f54
                                                            • Opcode Fuzzy Hash: 2eef727ff268ab613108cc6563941648370862b120f2685a03f45788e09418a8
                                                            • Instruction Fuzzy Hash: 1E410835E4111A4BDB79BB68CC907BFA6A6AFC4320F1444B5C91FEB642EB308D419BD1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3768259493.0000000006A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_6a40000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xcq$Xcq$Xcq$Xcq
                                                            • API String ID: 0-2577476577
                                                            • Opcode ID: 1a0d76f8cb44a70474c82e9c8fbc84fbc30b69c9ca6b2993a3444c3bc338afc4
                                                            • Instruction ID: 3ca6ef164d633bebbe091f6c9aa6e7c4abccafdabc382b1588cad4f5f582dff0
                                                            • Opcode Fuzzy Hash: 1a0d76f8cb44a70474c82e9c8fbc84fbc30b69c9ca6b2993a3444c3bc338afc4
                                                            • Instruction Fuzzy Hash: 5E31C631E4122B4BDBB9BB68CD5037EA6B17BC4310F1045B5C81FEB646EB308D419B95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.3761051782.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2bf0000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \;_q$\;_q$\;_q$\;_q
                                                            • API String ID: 0-294077808
                                                            • Opcode ID: 0273149955bf6f455ed4e186266233da0e7ed645164420fb3b2b325a774fef06
                                                            • Instruction ID: b6e723332dba2f6b38f8d4db88825c79435317090401febb2a4e73ad4743c846
                                                            • Opcode Fuzzy Hash: 0273149955bf6f455ed4e186266233da0e7ed645164420fb3b2b325a774fef06
                                                            • Instruction Fuzzy Hash: 8F01B1317000198F8BE48E3CC494A2577EEEFC866433541BAEA11CB7B8DA71DC45C740

                                                            Execution Graph

                                                            Execution Coverage:10.5%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:345
                                                            Total number of Limit Nodes:24
                                                            execution_graph 51304 6f38e50 51305 6f38e9e DrawTextExW 51304->51305 51307 6f38ef6 51305->51307 51308 6f32640 51309 6f3267a 51308->51309 51310 6f326f6 51309->51310 51311 6f3270b 51309->51311 51316 6f303c8 51310->51316 51312 6f303c8 3 API calls 51311->51312 51314 6f3271a 51312->51314 51318 6f303d3 51316->51318 51317 6f32701 51318->51317 51321 6f330f0 51318->51321 51328 6f33100 51318->51328 51322 6f33100 51321->51322 51334 6f3041c 51322->51334 51325 6f33127 51325->51317 51326 6f33150 CreateIconFromResourceEx 51327 6f331ce 51326->51327 51327->51317 51329 6f3041c CreateIconFromResourceEx 51328->51329 51331 6f3311a 51329->51331 51330 6f33127 51330->51317 51331->51330 51332 6f33150 CreateIconFromResourceEx 51331->51332 51333 6f331ce 51332->51333 51333->51317 51335 6f33150 CreateIconFromResourceEx 51334->51335 51336 6f3311a 51335->51336 51336->51325 51336->51326 51337 50b76c8 51338 50b76e0 51337->51338 51350 50b740c 51338->51350 51340 50b7739 51356 50b741c 51340->51356 51342 50b775d 51361 50b742c 51342->51361 51344 50b777b 51346 50b7b18 51344->51346 51365 28f8741 51344->51365 51371 28f5c7c 51344->51371 51378 28f8430 51344->51378 51345 50b81e6 51351 50b7417 51350->51351 51353 28f5c7c CreateWindowExW 51351->51353 51354 28f8741 CreateWindowExW 51351->51354 51355 28f8430 CreateWindowExW 51351->51355 51352 50b81e6 51352->51340 51353->51352 51354->51352 51355->51352 51358 50b7427 51356->51358 51357 50b862e 51357->51342 51358->51357 51385 50b763c 51358->51385 51360 50b868e 51360->51342 51362 50b7437 51361->51362 51363 50b763c CreateWindowExW 51362->51363 51364 50b868e 51362->51364 51363->51364 51364->51344 51366 28f86c8 51365->51366 51368 28f8746 51365->51368 51367 28f8731 51366->51367 51398 28fce81 51366->51398 51403 28fce90 51366->51403 51367->51345 51368->51345 51372 28f5c87 51371->51372 51374 28f8498 51372->51374 51377 28f8741 CreateWindowExW 51372->51377 51373 28f8731 51373->51345 51374->51373 51375 28fce81 CreateWindowExW 51374->51375 51376 28fce90 CreateWindowExW 51374->51376 51375->51373 51376->51373 51377->51374 51379 28f846b 51378->51379 51381 28f8498 51379->51381 51384 28f8741 CreateWindowExW 51379->51384 51380 28f8731 51380->51345 51381->51380 51382 28fce81 CreateWindowExW 51381->51382 51383 28fce90 CreateWindowExW 51381->51383 51382->51380 51383->51380 51384->51381 51386 50b7647 51385->51386 51390 28f5c4c 51386->51390 51394 28f7250 51386->51394 51387 50b8c84 51387->51360 51391 28f5c57 51390->51391 51392 28f5c7c CreateWindowExW 51391->51392 51393 28f7305 51392->51393 51393->51387 51395 28f7293 51394->51395 51396 28f5c7c CreateWindowExW 51395->51396 51397 28f7305 51396->51397 51397->51387 51399 28fceb1 51398->51399 51400 28fced5 51399->51400 51408 28fd03f 51399->51408 51412 28fd040 51399->51412 51400->51367 51404 28fceb1 51403->51404 51405 28fced5 51404->51405 51406 28fd03f CreateWindowExW 51404->51406 51407 28fd040 CreateWindowExW 51404->51407 51405->51367 51406->51405 51407->51405 51409 28fd04d 51408->51409 51411 28fd087 51409->51411 51416 28fc978 51409->51416 51411->51400 51414 28fd04d 51412->51414 51413 28fd087 51413->51400 51414->51413 51415 28fc978 CreateWindowExW 51414->51415 51415->51413 51417 28fc983 51416->51417 51419 28fd998 51417->51419 51425 28fcaa4 51417->51425 51420 28f5c7c CreateWindowExW 51419->51420 51421 28fda07 51419->51421 51420->51421 51432 28ff768 51421->51432 51437 28ff780 51421->51437 51422 28fda41 51422->51411 51426 28fcaaf 51425->51426 51427 28f5c7c CreateWindowExW 51426->51427 51428 28fda07 51427->51428 51430 28ff768 CreateWindowExW 51428->51430 51431 28ff780 CreateWindowExW 51428->51431 51429 28fda41 51429->51419 51430->51429 51431->51429 51434 28ff745 51432->51434 51433 28ff7bd 51433->51422 51434->51432 51434->51433 51443 50b0db8 51434->51443 51448 50b0dc8 51434->51448 51439 28ff7b1 51437->51439 51440 28ff8b1 51437->51440 51438 28ff7bd 51438->51422 51439->51438 51441 50b0db8 CreateWindowExW 51439->51441 51442 50b0dc8 CreateWindowExW 51439->51442 51440->51422 51441->51440 51442->51440 51444 50b0df3 51443->51444 51445 50b0ea2 51444->51445 51453 50b1ca0 51444->51453 51456 50b1b90 51444->51456 51449 50b0df3 51448->51449 51450 50b0ea2 51449->51450 51451 50b1ca0 CreateWindowExW 51449->51451 51452 50b1b90 CreateWindowExW 51449->51452 51451->51450 51452->51450 51460 50b0aa8 51453->51460 51457 50b1bb5 51456->51457 51458 50b1cd5 51457->51458 51459 50b0aa8 CreateWindowExW 51457->51459 51458->51445 51459->51458 51461 50b1cf0 CreateWindowExW 51460->51461 51463 50b1e14 51461->51463 51222 b7d0ff8 51223 b7d1183 51222->51223 51224 b7d101e 51222->51224 51224->51223 51227 b7d1278 PostMessageW 51224->51227 51229 b7d1270 51224->51229 51228 b7d12e4 51227->51228 51228->51224 51230 b7d1278 PostMessageW 51229->51230 51231 b7d12e4 51230->51231 51231->51224 51596 28fadd8 51597 28fade7 51596->51597 51600 28faebf 51596->51600 51607 28faed0 51596->51607 51601 28faee1 51600->51601 51603 28faf04 51600->51603 51602 28faefc 51601->51602 51601->51603 51614 28fb159 51601->51614 51602->51603 51604 28fb108 GetModuleHandleW 51602->51604 51603->51597 51605 28fb135 51604->51605 51605->51597 51608 28faee1 51607->51608 51609 28faf04 51607->51609 51608->51609 51610 28faefc 51608->51610 51613 28fb159 GetModuleHandleW 51608->51613 51609->51597 51610->51609 51611 28fb108 GetModuleHandleW 51610->51611 51612 28fb135 51611->51612 51612->51597 51613->51610 51615 28fb102 GetModuleHandleW 51614->51615 51618 28fb162 51614->51618 51617 28fb135 51615->51617 51617->51602 51618->51602 51619 28fd158 51620 28fd19e 51619->51620 51624 28fd328 51620->51624 51627 28fd338 51620->51627 51621 28fd28b 51630 28fca40 51624->51630 51628 28fd366 51627->51628 51629 28fca40 DuplicateHandle 51627->51629 51628->51621 51629->51628 51631 28fd3a0 DuplicateHandle 51630->51631 51632 28fd366 51631->51632 51632->51621 51633 28f4668 51634 28f4672 51633->51634 51638 28f4758 51633->51638 51643 28f3e1c 51634->51643 51636 28f468d 51639 28f475d 51638->51639 51647 28f4858 51639->51647 51651 28f4868 51639->51651 51644 28f3e27 51643->51644 51659 28f5bfc 51644->51659 51646 28f6f90 51646->51636 51649 28f488f 51647->51649 51648 28f496c 51648->51648 51649->51648 51655 28f449c 51649->51655 51653 28f488f 51651->51653 51652 28f496c 51653->51652 51654 28f449c CreateActCtxA 51653->51654 51654->51652 51656 28f58f8 CreateActCtxA 51655->51656 51658 28f59bb 51656->51658 51658->51658 51660 28f5c07 51659->51660 51663 28f5c1c 51660->51663 51662 28f712d 51662->51646 51664 28f5c27 51663->51664 51665 28f5c4c CreateWindowExW 51664->51665 51666 28f7202 51665->51666 51666->51662 51232 107d01c 51233 107d034 51232->51233 51238 107d08e 51233->51238 51240 50b1e98 51233->51240 51244 50b0ad4 51233->51244 51253 50b2c08 51233->51253 51262 50b0ab8 51233->51262 51271 50b1ea8 51233->51271 51241 50b1ece 51240->51241 51242 50b0ad4 CallWindowProcW 51241->51242 51243 50b1eef 51242->51243 51243->51238 51245 50b0adf 51244->51245 51246 50b2c79 51245->51246 51248 50b2c69 51245->51248 51249 50b2c77 51246->51249 51291 50b0bfc 51246->51291 51275 50b2e6c 51248->51275 51281 50b2d91 51248->51281 51286 50b2da0 51248->51286 51256 50b2c45 51253->51256 51254 50b2c79 51255 50b0bfc CallWindowProcW 51254->51255 51258 50b2c77 51254->51258 51255->51258 51256->51254 51257 50b2c69 51256->51257 51259 50b2e6c CallWindowProcW 51257->51259 51260 50b2d91 CallWindowProcW 51257->51260 51261 50b2da0 CallWindowProcW 51257->51261 51259->51258 51260->51258 51261->51258 51265 50b0abd 51262->51265 51263 50b2c79 51264 50b0bfc CallWindowProcW 51263->51264 51267 50b2c77 51263->51267 51264->51267 51265->51263 51266 50b2c69 51265->51266 51268 50b2e6c CallWindowProcW 51266->51268 51269 50b2d91 CallWindowProcW 51266->51269 51270 50b2da0 CallWindowProcW 51266->51270 51268->51267 51269->51267 51270->51267 51272 50b1ece 51271->51272 51273 50b0ad4 CallWindowProcW 51272->51273 51274 50b1eef 51273->51274 51274->51238 51276 50b2e2a 51275->51276 51277 50b2e7a 51275->51277 51295 50b2e58 51276->51295 51298 50b2e48 51276->51298 51278 50b2e40 51278->51249 51282 50b2db4 51281->51282 51284 50b2e48 CallWindowProcW 51282->51284 51285 50b2e58 CallWindowProcW 51282->51285 51283 50b2e40 51283->51249 51284->51283 51285->51283 51288 50b2db4 51286->51288 51287 50b2e40 51287->51249 51289 50b2e48 CallWindowProcW 51288->51289 51290 50b2e58 CallWindowProcW 51288->51290 51289->51287 51290->51287 51292 50b0c07 51291->51292 51293 50b435a CallWindowProcW 51292->51293 51294 50b4309 51292->51294 51293->51294 51294->51249 51296 50b2e69 51295->51296 51301 50b429e 51295->51301 51296->51278 51299 50b2e69 51298->51299 51300 50b429e CallWindowProcW 51298->51300 51299->51278 51300->51299 51302 50b0bfc CallWindowProcW 51301->51302 51303 50b42aa 51302->51303 51303->51296 51464 6fff1b0 51465 6fff1ca 51464->51465 51474 6fff1d2 51465->51474 51477 b7d0404 51465->51477 51481 b7d0335 51465->51481 51486 b7d0725 51465->51486 51493 b7d085a 51465->51493 51500 b7d03c8 51465->51500 51505 b7d0359 51465->51505 51510 b7d052c 51465->51510 51515 b7d0451 51465->51515 51520 b7d0291 51465->51520 51527 b7d0137 51465->51527 51532 6ffc948 51477->51532 51536 6ffc950 51477->51536 51478 b7d0432 51478->51474 51482 b7d033a 51481->51482 51483 b7d01d1 51482->51483 51540 6ffc7b8 51482->51540 51544 6ffc7b1 51482->51544 51483->51474 51487 b7d02af 51486->51487 51487->51486 51488 b7d01d1 51487->51488 51489 6ffc7b8 Wow64SetThreadContext 51487->51489 51490 6ffc7b1 Wow64SetThreadContext 51487->51490 51548 b7d0f58 51487->51548 51554 b7d0f48 51487->51554 51488->51474 51489->51487 51490->51487 51494 b7d02af 51493->51494 51494->51493 51495 b7d01d1 51494->51495 51496 6ffc7b8 Wow64SetThreadContext 51494->51496 51497 6ffc7b1 Wow64SetThreadContext 51494->51497 51498 b7d0f58 3 API calls 51494->51498 51499 b7d0f48 3 API calls 51494->51499 51495->51474 51496->51494 51497->51494 51498->51494 51499->51494 51501 b7d0200 51500->51501 51501->51500 51502 b7d01d1 51501->51502 51503 6ffc948 WriteProcessMemory 51501->51503 51504 6ffc950 WriteProcessMemory 51501->51504 51502->51474 51503->51501 51504->51501 51506 b7d0362 51505->51506 51508 6ffc948 WriteProcessMemory 51506->51508 51509 6ffc950 WriteProcessMemory 51506->51509 51507 b7d059d 51508->51507 51509->51507 51511 b7d0532 51510->51511 51512 b7d01d1 51511->51512 51572 6ffc888 51511->51572 51576 6ffc890 51511->51576 51512->51474 51516 b7d0459 51515->51516 51580 6ffca38 51516->51580 51584 6ffca40 51516->51584 51517 b7d047b 51522 b7d0297 51520->51522 51521 b7d01d1 51521->51474 51522->51521 51523 6ffc7b8 Wow64SetThreadContext 51522->51523 51524 6ffc7b1 Wow64SetThreadContext 51522->51524 51525 b7d0f58 3 API calls 51522->51525 51526 b7d0f48 3 API calls 51522->51526 51523->51522 51524->51522 51525->51522 51526->51522 51528 b7d0142 51527->51528 51588 6ffcbcc 51528->51588 51592 6ffcbd8 51528->51592 51533 6ffc950 WriteProcessMemory 51532->51533 51535 6ffc9ef 51533->51535 51535->51478 51537 6ffc998 WriteProcessMemory 51536->51537 51539 6ffc9ef 51537->51539 51539->51478 51541 6ffc7fd Wow64SetThreadContext 51540->51541 51543 6ffc845 51541->51543 51543->51483 51545 6ffc7b8 Wow64SetThreadContext 51544->51545 51547 6ffc845 51545->51547 51547->51483 51549 b7d0f6d 51548->51549 51560 6ffc2d0 51549->51560 51564 6ffc2c8 51549->51564 51568 6ffc370 51549->51568 51550 b7d0f80 51550->51487 51555 b7d0f58 51554->51555 51557 6ffc2c8 ResumeThread 51555->51557 51558 6ffc2d0 ResumeThread 51555->51558 51559 6ffc370 ResumeThread 51555->51559 51556 b7d0f80 51556->51487 51557->51556 51558->51556 51559->51556 51561 6ffc310 ResumeThread 51560->51561 51563 6ffc341 51561->51563 51563->51550 51565 6ffc2d0 ResumeThread 51564->51565 51567 6ffc341 51565->51567 51567->51550 51569 6ffc320 ResumeThread 51568->51569 51571 6ffc37a 51568->51571 51570 6ffc341 51569->51570 51570->51550 51571->51550 51573 6ffc890 VirtualAllocEx 51572->51573 51575 6ffc90d 51573->51575 51575->51512 51577 6ffc8d0 VirtualAllocEx 51576->51577 51579 6ffc90d 51577->51579 51579->51512 51581 6ffca40 ReadProcessMemory 51580->51581 51583 6ffcacf 51581->51583 51583->51517 51585 6ffca8b ReadProcessMemory 51584->51585 51587 6ffcacf 51585->51587 51587->51517 51589 6ffcbd8 CreateProcessA 51588->51589 51591 6ffce23 51589->51591 51593 6ffcc61 CreateProcessA 51592->51593 51595 6ffce23 51593->51595
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06FFCE0E
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 8059c0c1c83f2f6ecff660875fccaf20c3a9e752c605521109b4b90aa2c5b61b
                                                            • Instruction ID: 826aca31b206d140320b91335818ab85df8fcfda97c818e1c5baec683030febc
                                                            • Opcode Fuzzy Hash: 8059c0c1c83f2f6ecff660875fccaf20c3a9e752c605521109b4b90aa2c5b61b
                                                            • Instruction Fuzzy Hash: D8A17871D1026DCFDB60CFA8C841BEEBBB2BF48310F0485A9D958A7250DB749985CF91
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06FFCE0E
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: e67a49affb3ba057a8a2f17d9c9aa0c69d26feeee99265aa1f55296fb5af4b12
                                                            • Instruction ID: bd954c1f4fd0786dd46f3928b85f8498f12f7437f871b5687d153875ce53abb4
                                                            • Opcode Fuzzy Hash: e67a49affb3ba057a8a2f17d9c9aa0c69d26feeee99265aa1f55296fb5af4b12
                                                            • Instruction Fuzzy Hash: C6917971D1026DCFDB60CF68C841BEEBBB2BF48314F0485A9D958A7290DB749985CF91
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 028FB126
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391594030.00000000028F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_28f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: d79348f10f6ba02b9c647f370ee7e699b1bca446a84b13ccd653c4aaa2ee4add
                                                            • Instruction ID: ab1e861cd481debc0adf89cae583f2e4ca759eda1af5bf4094fa9a652210027f
                                                            • Opcode Fuzzy Hash: d79348f10f6ba02b9c647f370ee7e699b1bca446a84b13ccd653c4aaa2ee4add
                                                            • Instruction Fuzzy Hash: E17146B8A00B058FD768DF29D45476ABBF1FF88314F008A2DD18ADBA50D775E845CB91
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 56d270b3ca93b5b3423feaf93557773a24413365f02aa1878575b5594b6cb837
                                                            • Instruction ID: c0f4d5f3c04a53e829a3fdce873fd9027bf98aa142ea42ba40a788fc73e5adc5
                                                            • Opcode Fuzzy Hash: 56d270b3ca93b5b3423feaf93557773a24413365f02aa1878575b5594b6cb837
                                                            • Instruction Fuzzy Hash: 58616971E102298FCB14DFA9C9806AEFBF2FF88304F248169D508A7325C7319942CFA0
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 050B1E02
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1394974198.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_50b0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 3431904050fd60d9f49d55fc73efe76ed4a4c00d311f8f612e34d0fd3280bed9
                                                            • Instruction ID: dd805f2f3f9469dbb39b619bc606b55fd39f80f2a850c23e3ad170714cfaf016
                                                            • Opcode Fuzzy Hash: 3431904050fd60d9f49d55fc73efe76ed4a4c00d311f8f612e34d0fd3280bed9
                                                            • Instruction Fuzzy Hash: E551B0B1D00349AFDB14CFA9D894ADEBBF5FF48310F64812AE419AB210D7B59945CF90
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 050B1E02
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1394974198.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_50b0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: a89dab9bce2787b1667ed042384011b80d8aadaac410a5e5d5e8c864d650f51a
                                                            • Instruction ID: de23d771e1e1d4b84d875a6f20f9916895b2db1dc32caa036fe63c42ea3e3df4
                                                            • Opcode Fuzzy Hash: a89dab9bce2787b1667ed042384011b80d8aadaac410a5e5d5e8c864d650f51a
                                                            • Instruction Fuzzy Hash: 0D51B0B1D003499FDB14CF99D894ADEBBF6BF48310F64812AE819AB210D7B5A845CF90
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 050B4381
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1394974198.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_50b0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: b07e9735aca1b1297bb7564a7b4fbd245fe5d8076e55a6487245a54e84d08f4f
                                                            • Instruction ID: f49afe56da1d280b61770b8f83a728cc1c5abc2e49823119fa50608278925d31
                                                            • Opcode Fuzzy Hash: b07e9735aca1b1297bb7564a7b4fbd245fe5d8076e55a6487245a54e84d08f4f
                                                            • Instruction Fuzzy Hash: 9C414AB49003099FDB14CF99D488AAEBBF6FF88314F18C559D419AB321D374A941CFA0
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 028F59A9
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391594030.00000000028F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_28f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 4491e721a800e7f58988a6c1b885bafe5c47507a1baa430e637dfeff1e5ca258
                                                            • Instruction ID: 30a074b06db7c849dc641fc110ced4d4a719b28fbf94e7314eef6d9855aef97c
                                                            • Opcode Fuzzy Hash: 4491e721a800e7f58988a6c1b885bafe5c47507a1baa430e637dfeff1e5ca258
                                                            • Instruction Fuzzy Hash: 3341F3B4C0071DCBDB24DFA9C844B9DBBF5BF48304F60806AD508AB255DB75694ACF90
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 028F59A9
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391594030.00000000028F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_28f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 420e542a83701fbefd60c8b57ba26c908076c8fe5a6bc52c44c25e45f948c7d9
                                                            • Instruction ID: 30054275ffd3f6ca9a52ab91df5f8fd3529cd54afe98364b894482adcadb7f9c
                                                            • Opcode Fuzzy Hash: 420e542a83701fbefd60c8b57ba26c908076c8fe5a6bc52c44c25e45f948c7d9
                                                            • Instruction Fuzzy Hash: 0C41E2B4D00719CFDB24DFA9C984B9DBBB1BF48304F20806AD408BB255DB75694ACFA0
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396493284.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6f30000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateFromIconResource
                                                            • String ID:
                                                            • API String ID: 3668623891-0
                                                            • Opcode ID: 3aa423318a3cf9ae5b31d05a0cb65315d8de83b9d2c27595b627efd43cf41d77
                                                            • Instruction ID: 91a62916f1e03abfc5c0389743a762be518a975677c540f4c7a3369fef63c3c0
                                                            • Opcode Fuzzy Hash: 3aa423318a3cf9ae5b31d05a0cb65315d8de83b9d2c27595b627efd43cf41d77
                                                            • Instruction Fuzzy Hash: 1F319A7290439D9FCB11DFA9C804AEEBFF8EF49320F14805AE954A7261C3359855CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391594030.00000000028F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_28f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0fccc7fdc1fdc023172c8bbd6ef9bb9e139a1900f7d325a475a3618cdcc1a8e
                                                            • Instruction ID: 74ad7d1396f13021433509a2c6b9e213d6e8b1f331053f317022d87123507094
                                                            • Opcode Fuzzy Hash: a0fccc7fdc1fdc023172c8bbd6ef9bb9e139a1900f7d325a475a3618cdcc1a8e
                                                            • Instruction Fuzzy Hash: 0431EDB9C0434DCFEB00DFA8C854B9DBBF1AF46308F50419AC405EB265D779A94ACB51
                                                            APIs
                                                            • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,06F3311A,?,?,?,?,?), ref: 06F331BF
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396493284.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6f30000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateFromIconResource
                                                            • String ID:
                                                            • API String ID: 3668623891-0
                                                            • Opcode ID: db0bab0fe18496c1b0b6ca9898a2569c394fe25ccab91cd50286e38139ba74d4
                                                            • Instruction ID: df45f05fa1dc56b7139f51831547f22a4c08037636c27fa76db95e77c8d43fbe
                                                            • Opcode Fuzzy Hash: db0bab0fe18496c1b0b6ca9898a2569c394fe25ccab91cd50286e38139ba74d4
                                                            • Instruction Fuzzy Hash: 573188B6900359AFDB50DFA9C844BEEBFF8EF48320F14801AE549A7260D7349940CFA5
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06FFC9E0
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: a6e7c7327688954f2d4cd9b495defeaf02cc7b484990be8fb6c7b95077920e48
                                                            • Instruction ID: 057f8b9885622d1f44486615de25b9d3ddb8035aa4a5d7dca46eb3354233169d
                                                            • Opcode Fuzzy Hash: a6e7c7327688954f2d4cd9b495defeaf02cc7b484990be8fb6c7b95077920e48
                                                            • Instruction Fuzzy Hash: A62146B1D003199FCB10DFA9C885BDEBBF4FF48314F10842AEA59A7250D7799945CBA1
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06F38EE7
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396493284.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6f30000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: 587fc10a5b1da45ea0bcf50ea9acc700a898d018b2cff51dad6e8332201eec2b
                                                            • Instruction ID: 610eef5304411610ffb42686a3af3fa4686fbf575c817b98f12bc6b6d2d307ce
                                                            • Opcode Fuzzy Hash: 587fc10a5b1da45ea0bcf50ea9acc700a898d018b2cff51dad6e8332201eec2b
                                                            • Instruction Fuzzy Hash: A431E2B5D003499FCB10CF9AD880ADEFBF4AB48310F14842AE819A7210D774A545CFA5
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06FFC9E0
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: bc4bd1eb3fc0cd38481788537e6bad0b8aae94ad65e559f6dc0c53c5a067f9d2
                                                            • Instruction ID: b7bfdd2591d7fe588ae0fb6953c50c9f94759c50f728a322418f099fe5218ea6
                                                            • Opcode Fuzzy Hash: bc4bd1eb3fc0cd38481788537e6bad0b8aae94ad65e559f6dc0c53c5a067f9d2
                                                            • Instruction Fuzzy Hash: 162144B1D003199FCB10DFA9C881BEEBBF4FF48314F10842AE919A7250C7789944CBA0
                                                            APIs
                                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06F38EE7
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396493284.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6f30000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: DrawText
                                                            • String ID:
                                                            • API String ID: 2175133113-0
                                                            • Opcode ID: 4a1ec2e5cf4b36d536f223b3fce86288a24b530d2ebe7aafce1d7b6443f4b920
                                                            • Instruction ID: cf77d2fdd24dfd0934df9b3e352b5a219103c9c6c579d412ffc3738f3d46a584
                                                            • Opcode Fuzzy Hash: 4a1ec2e5cf4b36d536f223b3fce86288a24b530d2ebe7aafce1d7b6443f4b920
                                                            • Instruction Fuzzy Hash: 4321CEB5D003499FDB10CF9AD884AAEFBF5FB48320F14842AE819A7210D775A944CFA4
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06FFC836
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: b3c5301e2bccf7ec397dc27fca008f518de7d023b6a394834dac9ddac6c95830
                                                            • Instruction ID: 631ca2785222548482f768600feb36d70912ba28110f58426b5c72aa86d851ef
                                                            • Opcode Fuzzy Hash: b3c5301e2bccf7ec397dc27fca008f518de7d023b6a394834dac9ddac6c95830
                                                            • Instruction Fuzzy Hash: 572168B1D042089FCB10DFAAC4857EEBBF4EF48324F54842AD519B7241D7789945CFA0
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06FFCAC0
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: f23fb494fa6aed4785e104093e2f4e3e3de87c86841531ec20d76c3c3a997463
                                                            • Instruction ID: b90499d752b868a72b918ed238f81c97803821f373aad03f238b9a39e0544cc9
                                                            • Opcode Fuzzy Hash: f23fb494fa6aed4785e104093e2f4e3e3de87c86841531ec20d76c3c3a997463
                                                            • Instruction Fuzzy Hash: 11214AB1D003599FCB10DFA9C841ADEFBF4FF48310F108429E519A3250D7359545CBA0
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,028FD366,?,?,?,?,?), ref: 028FD427
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391594030.00000000028F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_28f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 2ce158100aa2fd5b611d67dd7dd52b965c531cbdad96e3ad0694fc74c27c8f2c
                                                            • Instruction ID: a8bb9a22a8f0c828fbad7294b071d99d2e24cc37982a1794083cb597041b5e8c
                                                            • Opcode Fuzzy Hash: 2ce158100aa2fd5b611d67dd7dd52b965c531cbdad96e3ad0694fc74c27c8f2c
                                                            • Instruction Fuzzy Hash: 2321E5B9900248DFDB50DFAAD584ADEFBF4EB48314F14801AEA18B7310D374A944CFA4
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,028FD366,?,?,?,?,?), ref: 028FD427
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391594030.00000000028F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_28f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 12f0c26442ad50cf2be654d92574d1085fd25f8db1a4e0fbeac3db79b1faeefa
                                                            • Instruction ID: 49b904e164f513e79db9b7daa74481abc3a1140ff42982e40cffed42c02a49ec
                                                            • Opcode Fuzzy Hash: 12f0c26442ad50cf2be654d92574d1085fd25f8db1a4e0fbeac3db79b1faeefa
                                                            • Instruction Fuzzy Hash: 6F21E3B59002499FDB10CFAAD585ADEBFF4EB48314F14801AE918B7350D378A945CFA5
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06FFC836
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 15b287ac359e0fea631ce0402296d8a23c3b716698aa8c1c576d2a11abd10fe7
                                                            • Instruction ID: b341375cd825f4de2bbfda4c33730464e7c9fe6696aca32f107a6a09c493c4d4
                                                            • Opcode Fuzzy Hash: 15b287ac359e0fea631ce0402296d8a23c3b716698aa8c1c576d2a11abd10fe7
                                                            • Instruction Fuzzy Hash: 2F213571D042098FDB50DFAAC485BEEBBF4EF88324F54842AD519A7240D778A945CFA0
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06FFCAC0
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 322a02ce38947c8cd86202289868caa7c422cb9e45bd753c00e374a0ad9c6318
                                                            • Instruction ID: e414c332ce940fa4d836e1adf37c670aa0f6a3942897037ce262f283d2d86f6b
                                                            • Opcode Fuzzy Hash: 322a02ce38947c8cd86202289868caa7c422cb9e45bd753c00e374a0ad9c6318
                                                            • Instruction Fuzzy Hash: EA2128B1D002599FCB10DFAAC881AEEFBF5FF48310F50842AE519A7250D779A945CBA4
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 028FB126
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391594030.00000000028F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_28f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 088a49c9fc4ba3a86d41bb55913ac943cd96e7c4391611fa96e5ea1ac668263d
                                                            • Instruction ID: b86238eb7e482e6fc07d0e9db7265c845aa8eaed84e738ea2e58e08cca1ee6e4
                                                            • Opcode Fuzzy Hash: 088a49c9fc4ba3a86d41bb55913ac943cd96e7c4391611fa96e5ea1ac668263d
                                                            • Instruction Fuzzy Hash: 3411E77DA043048FE754EF5AD8007ABBBF5EFC9318F15846AD608E7251C7749845CBA1
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06FFC8FE
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: a4c8da0cf305ff564b3b4bb86773cebb6089a36a856740beb47db52efdc5656d
                                                            • Instruction ID: c013d3fb7995517525dd4b3edab87b12fcdf859f25123dd6d9a6e00c0ae1e741
                                                            • Opcode Fuzzy Hash: a4c8da0cf305ff564b3b4bb86773cebb6089a36a856740beb47db52efdc5656d
                                                            • Instruction Fuzzy Hash: F21156B2D002499FCB20DFAAC845AEFBFF5EF48324F108419E519A7250CB75A945CFA0
                                                            APIs
                                                            • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,06F3311A,?,?,?,?,?), ref: 06F331BF
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396493284.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6f30000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateFromIconResource
                                                            • String ID:
                                                            • API String ID: 3668623891-0
                                                            • Opcode ID: 41b770f1eb827e13be8458aeabab9958c3b3ddeb9923c9c59cc3f096ea9bac47
                                                            • Instruction ID: 334ee930deab848dc90086e05b892b155cea556b4315fbabf7546eb863871d53
                                                            • Opcode Fuzzy Hash: 41b770f1eb827e13be8458aeabab9958c3b3ddeb9923c9c59cc3f096ea9bac47
                                                            • Instruction Fuzzy Hash: 48116AB2C002499FDB10DFAAC844BEEBFF8EB48320F14841AE915A3210C375A950CFA4
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06FFC8FE
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 8687b6e5f797b7418651a71fc524bedc719cb478d12034ab4080493fd1c46c3c
                                                            • Instruction ID: 20814e278e310c89c5956dcc5fa44f35e3effb7f0c15550c758b6b947d3c5cd5
                                                            • Opcode Fuzzy Hash: 8687b6e5f797b7418651a71fc524bedc719cb478d12034ab4080493fd1c46c3c
                                                            • Instruction Fuzzy Hash: F81126719002499FCB20DFAAC845AEFBFF5EF48324F108419E519A7250C775A944CFA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: fe499a51a0f4d6a397c4f78da468baffac266e07290a67c875189f674cb0ace9
                                                            • Instruction ID: 111845ea30bbca439544e339e4eb09977d3cbc2df84ecc47bf593383eb324ab2
                                                            • Opcode Fuzzy Hash: fe499a51a0f4d6a397c4f78da468baffac266e07290a67c875189f674cb0ace9
                                                            • Instruction Fuzzy Hash: 4F1146B1D002488BCB20DFAAC8457EEFBF4AB88324F10841AD519A7650C675A945CFA5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1396554480.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_6ff0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 5a01d5b476f72feff07df1207c81a5bc3d5749ad708f1678d738c09f5a31c9e6
                                                            • Instruction ID: c825b3d2b52661f3c54b52986d91c423c6ed3503a55e994d48046b9e4ea603d9
                                                            • Opcode Fuzzy Hash: 5a01d5b476f72feff07df1207c81a5bc3d5749ad708f1678d738c09f5a31c9e6
                                                            • Instruction Fuzzy Hash: E31125B1D002488BCB20DFAAC8457EEFBF4AF88324F20841AD519A7250C679A945CFA5
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 028FB126
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391594030.00000000028F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_28f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: c2368eff4d95caaaf8fc1d4b1062a4ce16e53ec757a16479f0fc26fa5cc7819c
                                                            • Instruction ID: 5dcc6fc0d424067aa29b484b4619d873d0a08bc495cfbd28289d473dd6064df2
                                                            • Opcode Fuzzy Hash: c2368eff4d95caaaf8fc1d4b1062a4ce16e53ec757a16479f0fc26fa5cc7819c
                                                            • Instruction Fuzzy Hash: 2A110FB9C002498FCB10DF9AD844A9EFBF4AB88324F10841AD519B7610D379A545CFA1
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 0B7D12D5
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1397815671.000000000B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B7D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_b7d0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 9f47857fc93cd9d611268186800dc89345bf23209935c47b5f6a7335e7a3266f
                                                            • Instruction ID: 6ff45c53ba4f6a8797749da964f539629c591ccd49a8b0087df3db0101e23582
                                                            • Opcode Fuzzy Hash: 9f47857fc93cd9d611268186800dc89345bf23209935c47b5f6a7335e7a3266f
                                                            • Instruction Fuzzy Hash: EF1103B58003499FCB10DF9AD885BDEFBF8EB48324F108459E518B3600C379A644CFA5
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 0B7D12D5
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1397815671.000000000B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B7D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_b7d0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 617ecabf4be299ad97cf6eab1fd641eee225972c6d84c124e09ccdd55944e465
                                                            • Instruction ID: 1944e23c07d45ca4aa4af4887db3e9b7a669caecdd773c8ed642ce333c90bc26
                                                            • Opcode Fuzzy Hash: 617ecabf4be299ad97cf6eab1fd641eee225972c6d84c124e09ccdd55944e465
                                                            • Instruction Fuzzy Hash: 0211D0B58003499FDB10DF9AD885BDEFBF8EB48324F10845AE518B7610D379A944CFA5
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391239736.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_106d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b806a2175970f3e69b863aaf4687e0fbfbd9d173ef2783c9c6f012a2f1fcf764
                                                            • Instruction ID: 210e598a511f861055ffbf2f4f3752aafeefedc4395c73d85df13c99eb210447
                                                            • Opcode Fuzzy Hash: b806a2175970f3e69b863aaf4687e0fbfbd9d173ef2783c9c6f012a2f1fcf764
                                                            • Instruction Fuzzy Hash: BB213771604240DFDB05DF58D9C0F2ABFA9FB88318F24C5A9E9C90B656C336D456CBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391239736.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_106d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6dafeacb310361d9d9a938326357c6edabf1299f84f7c311eff0cd040e368efa
                                                            • Instruction ID: 337b40a09292a3ac68e6d84e2d5f0c0402c5ffa6194704c32acd3299059850d8
                                                            • Opcode Fuzzy Hash: 6dafeacb310361d9d9a938326357c6edabf1299f84f7c311eff0cd040e368efa
                                                            • Instruction Fuzzy Hash: 4D214871600244DFDB01DF48C9C0F5ABFA9FB88314F20C1A9E9890B25AC736E806C7A1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391285640.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_107d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c1ebcaa8526dc91caa577b86b82e111efde06d504e94c19ba5914658ce29c7c1
                                                            • Instruction ID: 233e6b39a244e2a5fe8bb915403fd2df57fcd96e57fc7df7f9ec658ecf4d0025
                                                            • Opcode Fuzzy Hash: c1ebcaa8526dc91caa577b86b82e111efde06d504e94c19ba5914658ce29c7c1
                                                            • Instruction Fuzzy Hash: 66213471A04200EFDB01DF98D9C0B26BBA5FF98324F20C5ADE9894B256C336D407CB65
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391285640.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_107d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dd96f58c23e6d744b0aa4eef16dcf503bc8cf31611bab34d8fc2b12f1d08ed5b
                                                            • Instruction ID: 5ae67954145a01b4a0b30faf6833910ae66f0e5605f6813cf39b6a773b2a5968
                                                            • Opcode Fuzzy Hash: dd96f58c23e6d744b0aa4eef16dcf503bc8cf31611bab34d8fc2b12f1d08ed5b
                                                            • Instruction Fuzzy Hash: E8212575A04200DFCB16DF58D980B16BFA5EF84314F20C5ADF9890B256C336D407CBA5
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391285640.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_107d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b3d9d360434546b7dff180bca7fd7ab5175cbaac332b26b27f878f4d300740c0
                                                            • Instruction ID: 4183e62a629f74c0c02fe76063ae709178e227daa29d552b430ff8102e14b2d2
                                                            • Opcode Fuzzy Hash: b3d9d360434546b7dff180bca7fd7ab5175cbaac332b26b27f878f4d300740c0
                                                            • Instruction Fuzzy Hash: 792195755093808FDB13CF64D594715BFB1EF46214F29C5DAD8898F267C33A980ACBA2
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391239736.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_106d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                            • Instruction ID: 27f0f8a616c9962eca4e94d7ea196aa45fad981fb0b9ad681e28c52bf9f38f59
                                                            • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                            • Instruction Fuzzy Hash: D5110372504240CFDB02CF44D5C4B56BFB1FB84324F24C2A9D9890B257C33AE85ACBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391239736.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_106d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                            • Instruction ID: f73bf098614314ec85466455c28d484e6c8ead339a4e92cee7886eb7e91b5b42
                                                            • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                            • Instruction Fuzzy Hash: 4811D376504280CFDB16CF54D5C4B16BFB1FB84314F24C6A9D9890B657C336D45ACBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000F.00000002.1391285640.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_15_2_107d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                            • Instruction ID: e2b6858d148718e87b5c470a17f6fa4299b030598192b3c3e192e4eef75b738e
                                                            • Opcode Fuzzy Hash: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                            • Instruction Fuzzy Hash: EA11BB75904280DFDB02CF54C5C4B15BFA1FF84224F28C6A9D8894B296C33AD40BCB61

                                                            Execution Graph

                                                            Execution Coverage:15.5%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:116
                                                            Total number of Limit Nodes:15
                                                            execution_graph 36525 55ffc9f 36526 55ffca3 36525->36526 36527 55ffd9c 36526->36527 36528 55ffcf2 36526->36528 36532 55fa954 36527->36532 36530 55ffd4a CallWindowProcW 36528->36530 36531 55ffcf9 36528->36531 36530->36531 36533 55fa95f 36532->36533 36535 55fe8d9 36533->36535 36536 55fe484 CallWindowProcW 36533->36536 36536->36535 36537 d7d044 36538 d7d05c 36537->36538 36539 d7d0b6 36538->36539 36543 55fa954 CallWindowProcW 36538->36543 36544 55fd728 36538->36544 36548 55fd717 36538->36548 36552 55fe878 36538->36552 36543->36539 36545 55fd74e 36544->36545 36546 55fa954 CallWindowProcW 36545->36546 36547 55fd76f 36546->36547 36547->36539 36549 55fd728 36548->36549 36550 55fa954 CallWindowProcW 36549->36550 36551 55fd76f 36550->36551 36551->36539 36554 55fe8b5 36552->36554 36555 55fe8d9 36554->36555 36556 55fe484 CallWindowProcW 36554->36556 36556->36555 36557 55fb0c8 36559 55fb1f9 36557->36559 36560 55fb0f9 36557->36560 36558 55fb105 36560->36558 36566 55fb340 36560->36566 36570 55fb330 36560->36570 36561 55fb145 36575 55fc640 36561->36575 36585 55fc630 36561->36585 36595 55fb390 36566->36595 36605 55fb380 36566->36605 36567 55fb34a 36567->36561 36571 55fb340 36570->36571 36573 55fb390 2 API calls 36571->36573 36574 55fb380 2 API calls 36571->36574 36572 55fb34a 36572->36561 36573->36572 36574->36572 36576 55fc66b 36575->36576 36625 55fcb90 36576->36625 36630 55fcba0 36576->36630 36577 55fc6ee 36578 55fc71a 36577->36578 36579 55fa770 GetModuleHandleW 36577->36579 36578->36578 36580 55fc75e 36579->36580 36581 55fd471 CreateWindowExW 36580->36581 36582 55fd520 CreateWindowExW 36580->36582 36581->36578 36582->36578 36586 55fc640 36585->36586 36591 55fcb90 GetModuleHandleW 36586->36591 36592 55fcba0 GetModuleHandleW 36586->36592 36587 55fc6ee 36588 55fa770 GetModuleHandleW 36587->36588 36590 55fc71a 36587->36590 36589 55fc75e 36588->36589 36655 55fd520 36589->36655 36658 55fd471 36589->36658 36591->36587 36592->36587 36596 55fb3a1 36595->36596 36599 55fb3c4 36595->36599 36615 55fa770 36596->36615 36599->36567 36600 55fb5c8 GetModuleHandleW 36602 55fb5f5 36600->36602 36601 55fb3bc 36601->36599 36601->36600 36602->36567 36606 55fb390 36605->36606 36607 55fa770 GetModuleHandleW 36606->36607 36609 55fb3c4 36606->36609 36608 55fb3ac 36607->36608 36608->36609 36613 55fb618 GetModuleHandleW 36608->36613 36614 55fb628 GetModuleHandleW 36608->36614 36609->36567 36610 55fb5c8 GetModuleHandleW 36612 55fb5f5 36610->36612 36611 55fb3bc 36611->36609 36611->36610 36612->36567 36613->36611 36614->36611 36616 55fb580 GetModuleHandleW 36615->36616 36618 55fb3ac 36616->36618 36618->36599 36619 55fb628 36618->36619 36622 55fb618 36618->36622 36620 55fa770 GetModuleHandleW 36619->36620 36621 55fb63c 36619->36621 36620->36621 36621->36601 36623 55fa770 GetModuleHandleW 36622->36623 36624 55fb63c 36623->36624 36624->36601 36626 55fcba0 36625->36626 36627 55fcc4e 36626->36627 36635 55fcd10 36626->36635 36645 55fcd00 36626->36645 36631 55fcbcd 36630->36631 36632 55fcc4e 36631->36632 36633 55fcd10 GetModuleHandleW 36631->36633 36634 55fcd00 GetModuleHandleW 36631->36634 36633->36632 36634->36632 36636 55fcd25 36635->36636 36637 55fa770 GetModuleHandleW 36636->36637 36638 55fcd49 36636->36638 36637->36638 36639 55fa770 GetModuleHandleW 36638->36639 36644 55fcf05 36638->36644 36640 55fce8b 36639->36640 36641 55fa770 GetModuleHandleW 36640->36641 36640->36644 36642 55fced9 36641->36642 36643 55fa770 GetModuleHandleW 36642->36643 36642->36644 36643->36644 36644->36627 36646 55fcd10 36645->36646 36647 55fa770 GetModuleHandleW 36646->36647 36648 55fcd49 36646->36648 36647->36648 36649 55fa770 GetModuleHandleW 36648->36649 36654 55fcf05 36648->36654 36650 55fce8b 36649->36650 36651 55fa770 GetModuleHandleW 36650->36651 36650->36654 36652 55fced9 36651->36652 36653 55fa770 GetModuleHandleW 36652->36653 36652->36654 36653->36654 36654->36627 36663 55fa92c 36655->36663 36659 55fd47f 36658->36659 36660 55fd4e7 36658->36660 36659->36590 36661 55fa92c CreateWindowExW 36660->36661 36662 55fd555 36661->36662 36662->36590 36664 55fd570 CreateWindowExW 36663->36664 36666 55fd694 36664->36666

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 673 e46730-e46766 801 e46768 call e46730 673->801 802 e46768 call e46880 673->802 803 e46768 call e46108 673->803 674 e4676e-e46774 675 e467c4-e467c8 674->675 676 e46776-e4677a 674->676 677 e467df-e467f3 675->677 678 e467ca-e467d9 675->678 679 e4677c-e46781 676->679 680 e46789-e46790 676->680 683 e467fb-e46802 677->683 797 e467f5 call e49530 677->797 798 e467f5 call e497e8 677->798 799 e467f5 call e49848 677->799 681 e46805-e4680f 678->681 682 e467db-e467dd 678->682 679->680 684 e46866-e468a3 680->684 685 e46796-e4679d 680->685 686 e46811-e46817 681->686 687 e46819-e4681d 681->687 682->683 695 e468a5-e468ab 684->695 696 e468ae-e468ce 684->696 685->675 688 e4679f-e467a3 685->688 691 e46825-e4685f 686->691 687->691 693 e4681f 687->693 689 e467a5-e467aa 688->689 690 e467b2-e467b9 688->690 689->690 690->684 694 e467bf-e467c2 690->694 691->684 693->691 694->683 695->696 701 e468d5-e468dc 696->701 702 e468d0 696->702 705 e468de-e468e9 701->705 704 e46c64-e46c6d 702->704 706 e46c75-e46c82 705->706 707 e468ef-e46902 705->707 712 e46904-e46912 707->712 713 e46918-e46933 707->713 712->713 718 e46bec-e46bf3 712->718 716 e46935-e4693b 713->716 717 e46957-e4695a 713->717 719 e46944-e46947 716->719 720 e4693d 716->720 722 e46ab4-e46aba 717->722 723 e46960-e46963 717->723 718->704 721 e46bf5-e46bf7 718->721 725 e4697a-e46980 719->725 726 e46949-e4694c 719->726 720->719 720->722 724 e46ba6-e46ba9 720->724 720->725 727 e46c06-e46c0c 721->727 728 e46bf9-e46bfe 721->728 722->724 729 e46ac0-e46ac5 722->729 723->722 730 e46969-e4696f 723->730 735 e46c70 724->735 736 e46baf-e46bb5 724->736 737 e46986-e46988 725->737 738 e46982-e46984 725->738 731 e469e6-e469ec 726->731 732 e46952 726->732 727->706 733 e46c0e-e46c13 727->733 728->727 729->724 730->722 734 e46975 730->734 731->724 741 e469f2-e469f8 731->741 732->724 739 e46c15-e46c1a 733->739 740 e46c58-e46c5b 733->740 734->724 735->706 742 e46bb7-e46bbf 736->742 743 e46bda-e46bde 736->743 744 e46992-e4699b 737->744 738->744 739->735 747 e46c1c 739->747 740->735 746 e46c5d-e46c62 740->746 748 e469fe-e46a00 741->748 749 e469fa-e469fc 741->749 742->706 750 e46bc5-e46bd4 742->750 743->718 745 e46be0-e46be6 743->745 751 e4699d-e469a8 744->751 752 e469ae-e469d6 744->752 745->705 745->718 746->704 746->721 753 e46c23-e46c28 747->753 754 e46a0a-e46a21 748->754 749->754 750->713 750->743 751->724 751->752 772 e469dc-e469e1 752->772 773 e46aca-e46b00 752->773 757 e46c4a-e46c4c 753->757 758 e46c2a-e46c2c 753->758 764 e46a23-e46a3c 754->764 765 e46a4c-e46a73 754->765 757->735 761 e46c4e-e46c51 757->761 762 e46c2e-e46c33 758->762 763 e46c3b-e46c41 758->763 761->740 762->763 763->706 767 e46c43-e46c48 763->767 764->773 776 e46a42-e46a47 764->776 765->735 778 e46a79-e46a7c 765->778 767->757 768 e46c1e-e46c21 767->768 768->735 768->753 772->773 779 e46b02-e46b06 773->779 780 e46b0d-e46b15 773->780 776->773 778->735 781 e46a82-e46aab 778->781 782 e46b25-e46b29 779->782 783 e46b08-e46b0b 779->783 780->735 784 e46b1b-e46b20 780->784 781->773 796 e46aad-e46ab2 781->796 785 e46b48-e46b4c 782->785 786 e46b2b-e46b31 782->786 783->780 783->782 784->724 789 e46b56-e46b75 call e46e58 785->789 790 e46b4e-e46b54 785->790 786->785 788 e46b33-e46b3b 786->788 788->735 791 e46b41-e46b46 788->791 793 e46b7b-e46b7f 789->793 790->789 790->793 791->724 793->724 794 e46b81-e46b9d 793->794 794->724 796->773 797->683 798->683 799->683 801->674 802->674 803->674
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q$(o_q$,cq$,cq
                                                            • API String ID: 0-196421762
                                                            • Opcode ID: c1a7f73272f6ce9815517dc0af36e705557e7710fdfc4d7f598acd2560bdf385
                                                            • Instruction ID: 242847018388dff25b78169109a935fcee5a33f5021bd7db85f4ac93938e74c1
                                                            • Opcode Fuzzy Hash: c1a7f73272f6ce9815517dc0af36e705557e7710fdfc4d7f598acd2560bdf385
                                                            • Instruction Fuzzy Hash: D2024C70A00219DFCB14CFA9D984AADBBB2FF8A304F15946AE445FB261D734DD41CB52

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 804 e4beb0-e4beb1 805 e4beb3-e4beb5 804->805 806 e4be3b-e4be3c 804->806 809 e4beb7-e4bee0 805->809 810 e4be3f-e4be42 805->810 807 e4be26-e4be33 806->807 808 e4be3d-e4be3e 806->808 814 e4be35-e4be42 807->814 815 e4be4b-e4be4c 807->815 808->810 812 e4bee7-e4bf2f 809->812 813 e4bee2 809->813 811 e4be4a 810->811 811->815 820 e4bf37-e4bf46 call e43908 812->820 813->812 814->811 815->804 822 e4bf4b-e4bfc4 call e43428 820->822 828 e4bfc6 822->828 829 e4bfcb-e4bfec call e44dc8 822->829 828->829 831 e4bff1-e4bffc 829->831 832 e4c003-e4c007 831->832 833 e4bffe 831->833 834 e4c00c-e4c013 832->834 835 e4c009-e4c00a 832->835 833->832 837 e4c015 834->837 838 e4c01a-e4c028 834->838 836 e4c02b-e4c06f 835->836 842 e4c0d5-e4c0ec 836->842 837->838 838->836 844 e4c071-e4c087 842->844 845 e4c0ee-e4c113 842->845 849 e4c0b1 844->849 850 e4c089-e4c095 844->850 851 e4c115-e4c122 845->851 852 e4c12b-e4c195 845->852 855 e4c0b7-e4c0d4 849->855 853 e4c097-e4c09d 850->853 854 e4c09f-e4c0a5 850->854 862 e4c12a 851->862 860 e4c197-e4c1c0 852->860 861 e4c11f-e4c120 852->861 856 e4c0af 853->856 854->856 855->842 856->855 863 e4c1c7-e4c20f 860->863 864 e4c1c2 860->864 861->862 862->852 866 e4c217-e4c226 call e43908 863->866 864->863 868 e4c22b-e4c2a4 call e43428 866->868 874 e4c2a6 868->874 875 e4c2ab-e4c2cc call e44dc8 868->875 874->875 877 e4c2d1-e4c2dc 875->877 878 e4c2e3-e4c2e7 877->878 879 e4c2de 877->879 880 e4c2ec-e4c2f3 878->880 881 e4c2e9-e4c2ea 878->881 879->878 883 e4c2f5 880->883 884 e4c2fa-e4c308 880->884 882 e4c30b-e4c34f 881->882 888 e4c3b5-e4c3cc 882->888 883->884 884->882 890 e4c351-e4c367 888->890 891 e4c3ce-e4c3f3 888->891 895 e4c391 890->895 896 e4c369-e4c375 890->896 897 e4c3f5-e4c402 891->897 898 e4c40b-e4c474 891->898 901 e4c397-e4c3b4 895->901 899 e4c377-e4c37d 896->899 900 e4c37f-e4c385 896->900 907 e4c40a 897->907 908 e4c3f6-e4c400 898->908 909 e4c476-e4c4a0 898->909 902 e4c38f 899->902 900->902 901->888 902->901 907->898 908->907 910 e4c4a7-e4c4ef 909->910 911 e4c4a2 909->911 913 e4c4f7-e4c506 call e43908 910->913 911->910 915 e4c50b-e4c584 call e43428 913->915 921 e4c586 915->921 922 e4c58b-e4c5ac call e44dc8 915->922 921->922 924 e4c5b1-e4c5bc 922->924 925 e4c5c3-e4c5c7 924->925 926 e4c5be 924->926 927 e4c5cc-e4c5d3 925->927 928 e4c5c9-e4c5ca 925->928 926->925 930 e4c5d5 927->930 931 e4c5da-e4c5e8 927->931 929 e4c5eb-e4c62f 928->929 935 e4c695-e4c6ac 929->935 930->931 931->929 937 e4c631-e4c647 935->937 938 e4c6ae-e4c6d3 935->938 942 e4c671 937->942 943 e4c649-e4c655 937->943 944 e4c6d5-e4c6d8 938->944 945 e4c6eb-e4c758 938->945 948 e4c677-e4c694 942->948 946 e4c657-e4c65d 943->946 947 e4c65f-e4c665 943->947 949 e4c6dd-e4c6ea 944->949 945->949 956 e4c75a-e4c780 945->956 950 e4c66f 946->950 947->950 948->935 949->945 950->948 957 e4c787-e4c7cf 956->957 958 e4c782 956->958 960 e4c7d7-e4c7e6 call e43908 957->960 958->957 962 e4c7eb-e4c864 call e43428 960->962 968 e4c866 962->968 969 e4c86b-e4c88c call e44dc8 962->969 968->969 971 e4c891-e4c89c 969->971 972 e4c8a3-e4c8a7 971->972 973 e4c89e 971->973 974 e4c8ac-e4c8b3 972->974 975 e4c8a9-e4c8aa 972->975 973->972 977 e4c8b5 974->977 978 e4c8ba-e4c8c8 974->978 976 e4c8cb-e4c90f 975->976 982 e4c975-e4c98c 976->982 977->978 978->976 984 e4c911-e4c927 982->984 985 e4c98e-e4c9b3 982->985 989 e4c951 984->989 990 e4c929-e4c935 984->990 991 e4c9b5-e4c9ca 985->991 992 e4c9cb 985->992 995 e4c957-e4c974 989->995 993 e4c937-e4c93d 990->993 994 e4c93f-e4c945 990->994 991->992 996 e4c94f 993->996 994->996 995->982 996->995
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q$PH_q
                                                            • API String ID: 0-551984707
                                                            • Opcode ID: 1319f634c8c7945add037c3ae268e77df01e155807d7a3e45a53a3791b80d9b8
                                                            • Instruction ID: 0c3781728de201e7bed9aa646b3fea2f8bdccc9ccc74423fea6e553837292cbe
                                                            • Opcode Fuzzy Hash: 1319f634c8c7945add037c3ae268e77df01e155807d7a3e45a53a3791b80d9b8
                                                            • Instruction Fuzzy Hash: 7291F774E01208DFDB54DFAAD894A9DBBF2BF89314F249069E409BB365DB305942CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q$4'_q
                                                            • API String ID: 0-2938337118
                                                            • Opcode ID: c4f0b8d5777f8d89cd577ca39083d408dc7f41d2907c2a58313f768ae3740c8b
                                                            • Instruction ID: 46064ebea27318dfe1668e4723ac6227038d3422e74ed6ea00deb8c9f6419318
                                                            • Opcode Fuzzy Hash: c4f0b8d5777f8d89cd577ca39083d408dc7f41d2907c2a58313f768ae3740c8b
                                                            • Instruction Fuzzy Hash: F4829074A40209DFCB15CF68D884AAEBBF2FF88314F159569E805AB3A2D730ED41CB51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q$Hcq
                                                            • API String ID: 0-689770731
                                                            • Opcode ID: 0f4879f4b1ce8a2f3423db3319f75ff12eda89bfe2d654b82f33100282507e4e
                                                            • Instruction ID: 745cf3393579c6955d6ecf02ae77775847c663719f05ad5923eb849356c3a5a5
                                                            • Opcode Fuzzy Hash: 0f4879f4b1ce8a2f3423db3319f75ff12eda89bfe2d654b82f33100282507e4e
                                                            • Instruction Fuzzy Hash: D812C070A002189FCB14DF69D884AAEBBF6FFC9304F208569E415EB391DB349D46CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1698 e4b328-e4b33b 1699 e4b341-e4b34a 1698->1699 1700 e4b47a-e4b481 1698->1700 1701 e4b484-e4b487 1699->1701 1702 e4b350-e4b354 1699->1702 1708 e4b489-e4b491 1701->1708 1703 e4b356 1702->1703 1704 e4b36e-e4b375 1702->1704 1706 e4b359-e4b364 1703->1706 1704->1700 1707 e4b37b-e4b388 1704->1707 1706->1701 1709 e4b36a-e4b36c 1706->1709 1707->1700 1712 e4b38e-e4b3a1 1707->1712 1713 e4b493-e4b4b0 1708->1713 1714 e4b41b-e4b41d 1708->1714 1709->1704 1709->1706 1715 e4b3a6-e4b3ae 1712->1715 1716 e4b3a3 1712->1716 1719 e4b4b2-e4b4ca 1713->1719 1720 e4b4dc 1713->1720 1714->1700 1717 e4b41f-e4b425 1714->1717 1715->1714 1718 e4b3b0-e4b3b6 1715->1718 1716->1715 1717->1700 1722 e4b427-e4b431 1717->1722 1718->1714 1723 e4b3b8-e4b3be 1718->1723 1730 e4b4d3-e4b4d6 1719->1730 1731 e4b4cc-e4b4d1 1719->1731 1721 e4b4de-e4b4e2 1720->1721 1722->1708 1724 e4b433-e4b44b 1722->1724 1723->1708 1725 e4b3c4-e4b3dc 1723->1725 1736 e4b470-e4b473 1724->1736 1737 e4b44d-e4b453 1724->1737 1738 e4b3de-e4b3e4 1725->1738 1739 e4b409-e4b40c 1725->1739 1734 e4b4e3-e4b4f9 1730->1734 1735 e4b4d8-e4b4da 1730->1735 1731->1721 1745 e4b483 1734->1745 1746 e4b4fb-e4b520 1734->1746 1735->1719 1735->1720 1736->1701 1743 e4b475-e4b478 1736->1743 1737->1708 1741 e4b455-e4b469 1737->1741 1738->1708 1742 e4b3ea-e4b3fe 1738->1742 1739->1701 1744 e4b40e-e4b411 1739->1744 1741->1708 1752 e4b46b 1741->1752 1742->1708 1753 e4b404 1742->1753 1743->1700 1743->1722 1744->1701 1747 e4b413-e4b419 1744->1747 1745->1701 1748 e4b527-e4b604 call e43908 call e43428 1746->1748 1749 e4b522 1746->1749 1747->1714 1747->1718 1763 e4b606 1748->1763 1764 e4b60b-e4b62c call e44dc8 1748->1764 1749->1748 1752->1736 1753->1739 1763->1764 1766 e4b631-e4b63c 1764->1766 1767 e4b643-e4b647 1766->1767 1768 e4b63e 1766->1768 1769 e4b64c-e4b653 1767->1769 1770 e4b649-e4b64a 1767->1770 1768->1767 1772 e4b655 1769->1772 1773 e4b65a-e4b668 1769->1773 1771 e4b66b-e4b6af 1770->1771 1777 e4b715-e4b72c 1771->1777 1772->1773 1773->1771 1779 e4b6b1-e4b6c7 1777->1779 1780 e4b72e-e4b753 1777->1780 1784 e4b6f1 1779->1784 1785 e4b6c9-e4b6d5 1779->1785 1787 e4b755-e4b76a 1780->1787 1788 e4b76b 1780->1788 1786 e4b6f7-e4b714 1784->1786 1789 e4b6d7-e4b6dd 1785->1789 1790 e4b6df-e4b6e5 1785->1790 1786->1777 1787->1788 1793 e4b76c 1788->1793 1791 e4b6ef 1789->1791 1790->1791 1791->1786 1793->1793
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 88f80baeedb1ed1810e17bad971ee930983a20621dbaa8926f317b2ca4378809
                                                            • Instruction ID: 9377ebfcfdf9f81ffd910ff5f4cd721b4f6ba4b0a548dba50c5177fce8449941
                                                            • Opcode Fuzzy Hash: 88f80baeedb1ed1810e17bad971ee930983a20621dbaa8926f317b2ca4378809
                                                            • Instruction Fuzzy Hash: 49E1F674E00618DFDB14DFA9D884A9DBBB1BF89314F1590A9E819AB362DB30ED41CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2036 5037e08-5037e14 2037 5037e16 2036->2037 2038 5037e8b-5037e99 2036->2038 2037->2038 2039 5037e9b 2038->2039 2040 5037e9e-5037ea1 2038->2040 2039->2040 2041 5037ea3-5037ea4 2040->2041 2042 5037ea6-5037ea8 2040->2042 2041->2042 2043 5037eab-5037eac 2042->2043 2044 5037eae-5037eb1 2042->2044 2043->2044 2045 5037eb3-5037eb4 2044->2045 2046 5037eb6-5037eb9 2044->2046 2045->2046 2047 5037f30-5037fe3 2045->2047 2048 5037ebb-5037ebc 2046->2048 2049 5037ebe-5037ec9 2046->2049 2064 5037ff1-5038042 2047->2064 2065 5037fe5-5037fec 2047->2065 2048->2049 2051 5037ecb-5037ecc 2049->2051 2052 5037ece-5037ed5 2049->2052 2051->2052 2053 5037ed7 2052->2053 2054 5037eda-5037edd 2052->2054 2053->2054 2056 5037ee2-5037ee4 2054->2056 2057 5037edf-5037ee1 2054->2057 2058 5037ee6-5037ee9 2056->2058 2057->2056 2057->2058 2060 5037eeb-5037eed 2058->2060 2061 5037eee-5037ef0 2058->2061 2060->2061 2062 5037ef2-5037ef7 2060->2062 2061->2062 2062->2047 2073 5038114 2064->2073 2066 503824c-503826a 2065->2066 2074 503811d-503812b 2073->2074 2075 5038131-5038156 2074->2075 2076 5038047-5038074 2074->2076 2081 5038158-503816d 2075->2081 2082 503816e 2075->2082 2083 5038076-503807f 2076->2083 2084 5038095 2076->2084 2081->2082 2082->2066 2085 5038081-5038084 2083->2085 2086 5038086-5038089 2083->2086 2087 5038098-50380b9 2084->2087 2089 5038093 2085->2089 2086->2089 2092 5038112-5038113 2087->2092 2093 50380bb-5038111 2087->2093 2089->2087 2092->2073 2093->2092
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: c9eb7ce9f6320ce0317e8964c71148d623b6874e38dac73a372925869667ce00
                                                            • Instruction ID: def06a827d90dc1b251019e85c5997407b6d85a7f7ccf16f3632d4fd14bce67f
                                                            • Opcode Fuzzy Hash: c9eb7ce9f6320ce0317e8964c71148d623b6874e38dac73a372925869667ce00
                                                            • Instruction Fuzzy Hash: 29A119B2D052088FDB54CFA9E986BADBBF6FF49300F1480A9D409AB355DB349A45CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 869bbf597067955db91430671979c1b5a6088076477b3123aea152b6fd81df49
                                                            • Instruction ID: b79a774bb1cd8dc536137ec1c5b1e85bfe320f2285c98f32cce612704d6400e0
                                                            • Opcode Fuzzy Hash: 869bbf597067955db91430671979c1b5a6088076477b3123aea152b6fd81df49
                                                            • Instruction Fuzzy Hash: 5691E474E002589FDB14DFA9D894A9DBBF2FF89314F1490AAE409AB365DB309946CF10

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2553 e4c470-e4c474 2554 e4c3f6-e4c40c 2553->2554 2555 e4c476-e4c4a0 2553->2555 2554->2553 2557 e4c4a7-e4c4ef 2555->2557 2558 e4c4a2 2555->2558 2562 e4c4f7-e4c506 call e43908 2557->2562 2558->2557 2564 e4c50b-e4c584 call e43428 2562->2564 2570 e4c586 2564->2570 2571 e4c58b-e4c5ac call e44dc8 2564->2571 2570->2571 2573 e4c5b1-e4c5bc 2571->2573 2574 e4c5c3-e4c5c7 2573->2574 2575 e4c5be 2573->2575 2576 e4c5cc-e4c5d3 2574->2576 2577 e4c5c9-e4c5ca 2574->2577 2575->2574 2579 e4c5d5 2576->2579 2580 e4c5da-e4c5e8 2576->2580 2578 e4c5eb-e4c62f 2577->2578 2584 e4c695-e4c6ac 2578->2584 2579->2580 2580->2578 2586 e4c631-e4c647 2584->2586 2587 e4c6ae-e4c6d3 2584->2587 2591 e4c671 2586->2591 2592 e4c649-e4c655 2586->2592 2593 e4c6d5-e4c6d8 2587->2593 2594 e4c6eb-e4c758 2587->2594 2597 e4c677-e4c694 2591->2597 2595 e4c657-e4c65d 2592->2595 2596 e4c65f-e4c665 2592->2596 2598 e4c6dd-e4c6ea 2593->2598 2594->2598 2605 e4c75a-e4c780 2594->2605 2599 e4c66f 2595->2599 2596->2599 2597->2584 2598->2594 2599->2597 2606 e4c787-e4c7cf 2605->2606 2607 e4c782 2605->2607 2609 e4c7d7-e4c7e6 call e43908 2606->2609 2607->2606 2611 e4c7eb-e4c864 call e43428 2609->2611 2617 e4c866 2611->2617 2618 e4c86b-e4c88c call e44dc8 2611->2618 2617->2618 2620 e4c891-e4c89c 2618->2620 2621 e4c8a3-e4c8a7 2620->2621 2622 e4c89e 2620->2622 2623 e4c8ac-e4c8b3 2621->2623 2624 e4c8a9-e4c8aa 2621->2624 2622->2621 2626 e4c8b5 2623->2626 2627 e4c8ba-e4c8c8 2623->2627 2625 e4c8cb-e4c90f 2624->2625 2631 e4c975-e4c98c 2625->2631 2626->2627 2627->2625 2633 e4c911-e4c927 2631->2633 2634 e4c98e-e4c9b3 2631->2634 2638 e4c951 2633->2638 2639 e4c929-e4c935 2633->2639 2640 e4c9b5-e4c9ca 2634->2640 2641 e4c9cb 2634->2641 2644 e4c957-e4c974 2638->2644 2642 e4c937-e4c93d 2639->2642 2643 e4c93f-e4c945 2639->2643 2640->2641 2645 e4c94f 2642->2645 2643->2645 2644->2631 2645->2644
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 4fe851ff5e3b4e58e861783f0b13bb319ca38ccd2469fae1c923ac7eaebf7d07
                                                            • Instruction ID: 24aa518a59c9ed7fec9cf26beb3e491a3261096dce4d90a1f4fcc57fd2e1ba61
                                                            • Opcode Fuzzy Hash: 4fe851ff5e3b4e58e861783f0b13bb319ca38ccd2469fae1c923ac7eaebf7d07
                                                            • Instruction Fuzzy Hash: 1291D274E01208DFDB54DFAAD884A9DBBF2BF89314F24D0A9E419AB365DB305985CF10

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2649 e4c753-e4c758 2650 e4c6dd-e4c6ec 2649->2650 2651 e4c75a-e4c780 2649->2651 2650->2649 2652 e4c787-e4c7cf 2651->2652 2653 e4c782 2651->2653 2657 e4c7d7-e4c7e6 call e43908 2652->2657 2653->2652 2660 e4c7eb-e4c864 call e43428 2657->2660 2667 e4c866 2660->2667 2668 e4c86b-e4c88c call e44dc8 2660->2668 2667->2668 2670 e4c891-e4c89c 2668->2670 2671 e4c8a3-e4c8a7 2670->2671 2672 e4c89e 2670->2672 2673 e4c8ac-e4c8b3 2671->2673 2674 e4c8a9-e4c8aa 2671->2674 2672->2671 2676 e4c8b5 2673->2676 2677 e4c8ba-e4c8c8 2673->2677 2675 e4c8cb-e4c90f 2674->2675 2681 e4c975-e4c98c 2675->2681 2676->2677 2677->2675 2683 e4c911-e4c927 2681->2683 2684 e4c98e-e4c9b3 2681->2684 2688 e4c951 2683->2688 2689 e4c929-e4c935 2683->2689 2690 e4c9b5-e4c9ca 2684->2690 2691 e4c9cb 2684->2691 2694 e4c957-e4c974 2688->2694 2692 e4c937-e4c93d 2689->2692 2693 e4c93f-e4c945 2689->2693 2690->2691 2695 e4c94f 2692->2695 2693->2695 2694->2681 2695->2694
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 6f5c6ee6c782ea9d8086f30d5992097bcc20c86235562909ebcea9068d1328fa
                                                            • Instruction ID: 970d1c31fc7698e12090ba04a39eeb9f48db444c530fdeddc16790287e0ded07
                                                            • Opcode Fuzzy Hash: 6f5c6ee6c782ea9d8086f30d5992097bcc20c86235562909ebcea9068d1328fa
                                                            • Instruction Fuzzy Hash: 4281D474E01218DFDB58DFAAD884A9DBBF2BF89304F249069E409BB365DB305945CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: a193c383002ff76934cbf4b572d962844ee571618ece8b42e2113c101858ca0a
                                                            • Instruction ID: 0569ba5c428986e9a5d1ac686e95336430616c879400919806bd8a1122c6b3b7
                                                            • Opcode Fuzzy Hash: a193c383002ff76934cbf4b572d962844ee571618ece8b42e2113c101858ca0a
                                                            • Instruction Fuzzy Hash: 7181D074E012089FDB54DFAAD884A9DBBF2BF89304F20D069E419BB365DB709981CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: a6cdbd639ffdc150fa13bbd223b908ca5d9f3de7cd8389a502a7a55d6d5ff137
                                                            • Instruction ID: 956b2530f7add3532dcf87e32482cb904c9badba4bb25246aff409e90e3189f1
                                                            • Opcode Fuzzy Hash: a6cdbd639ffdc150fa13bbd223b908ca5d9f3de7cd8389a502a7a55d6d5ff137
                                                            • Instruction Fuzzy Hash: 9781B1B4E01218DFEB18DFAAD984B9DBBF2BF88304F149069E419AB265DB305945CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 12c17cdb084ffdb94dba91152bcef354e5b1a8ee4a7d29ba99391642b1803943
                                                            • Instruction ID: 79c54c0ab548c64ffcad33d9ca2425d66d5a7447b4d6250d8b0a68ea742ede01
                                                            • Opcode Fuzzy Hash: 12c17cdb084ffdb94dba91152bcef354e5b1a8ee4a7d29ba99391642b1803943
                                                            • Instruction Fuzzy Hash: 0C81C074E01218DFDB54DFAAD984A9DBBF2BF88304F249069E809BB365DB305946CF10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH_q$PH_q
                                                            • API String ID: 0-3760492949
                                                            • Opcode ID: 3ded6abdc4815959101f6fc8a96a2fe229b6d22986017549831a6235ea7e9242
                                                            • Instruction ID: dd6c8f497c7d10545d48803d1cbb8c06c615fe16e50b52875a12ce91ae813eb0
                                                            • Opcode Fuzzy Hash: 3ded6abdc4815959101f6fc8a96a2fe229b6d22986017549831a6235ea7e9242
                                                            • Instruction Fuzzy Hash: 1961D474E006489FDB18DFAAD984A9DBBF2BF89300F14D16AE418BB365DB349945CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 33a089e12527a16760288e1aa29c876fbc93d33b1d560449ba391beba551693f
                                                            • Instruction ID: ece8bf16387c6d21edec46b387db04bfad623a36f1d724f6a3616444408158fc
                                                            • Opcode Fuzzy Hash: 33a089e12527a16760288e1aa29c876fbc93d33b1d560449ba391beba551693f
                                                            • Instruction Fuzzy Hash: E1828F74E012299FDB64DF69D998BDDBBB2BF48300F1081EAA40DA7265DB345E85CF40
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ebc3fef1aa642da47c488774794ad2af52ca299afad782321623fcec652f1171
                                                            • Instruction ID: 69aebc1a5dac193261db6a4d6222db034a744a70107a9cc0fa30c063baac8315
                                                            • Opcode Fuzzy Hash: ebc3fef1aa642da47c488774794ad2af52ca299afad782321623fcec652f1171
                                                            • Instruction Fuzzy Hash: A472DE74E012288FDB64DF69D890BEDBBB2BB49304F1495EAD409A7355DB30AE81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bedb3095a387a204db461bdda43ef821126b5f0076e167bf6180183bb81451ce
                                                            • Instruction ID: 126e367050e16fbd36bbe3cfc34e1fbe0e0d517e783ccea3d2c54a539f1cf486
                                                            • Opcode Fuzzy Hash: bedb3095a387a204db461bdda43ef821126b5f0076e167bf6180183bb81451ce
                                                            • Instruction Fuzzy Hash: E4E1AD74E01218CFEB64DFA5D944B9DBBB2FF89304F2081AAD409B7295DB355A85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 99f72d7e47aee30f553441335ad49818e1a5bdfe1ef160d0ba658abc1bc49174
                                                            • Instruction ID: d4a53ab36a7846b34c9ad368ad115498d0b0bc6d4fcbc9a8728f7437e366725a
                                                            • Opcode Fuzzy Hash: 99f72d7e47aee30f553441335ad49818e1a5bdfe1ef160d0ba658abc1bc49174
                                                            • Instruction Fuzzy Hash: 26D1C174E00218CFDB15DFA9D954B9DBBB2FF89300F2084AAD809AB359DB345A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8a069ab32781db39a85b6ac13eed724cb2741efb73281730b013bcb957d3dda0
                                                            • Instruction ID: 7bccfc2051e0a37dc73778377970ba6b49692c68af62ce7f9b08689243611cec
                                                            • Opcode Fuzzy Hash: 8a069ab32781db39a85b6ac13eed724cb2741efb73281730b013bcb957d3dda0
                                                            • Instruction Fuzzy Hash: E8A1A274E01228CFEB68CF6AD945B9DBBF2BF89300F14D1AAD409A7255DB345A85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 59cb1c59c60e90672604f9df84fdcb2caa861855d7c23a1b4cfc8e306d206f2d
                                                            • Instruction ID: 4e6938668ca68940de6dff024d44646f33f7bf36a520868a7a1a8c45b9680024
                                                            • Opcode Fuzzy Hash: 59cb1c59c60e90672604f9df84fdcb2caa861855d7c23a1b4cfc8e306d206f2d
                                                            • Instruction Fuzzy Hash: 1DA1A0B4E016188FEB68CF6AD945B9DBBF2BF89300F14C0AAD409A7255DB745A85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 651d8df815d3c688582ac328a677b2154e14b8bb2ff7275ac3e6c02a635baaef
                                                            • Instruction ID: a88373a9406be0032865d5f79680a03ea053a28179b4835b5a40d2c9b5650b35
                                                            • Opcode Fuzzy Hash: 651d8df815d3c688582ac328a677b2154e14b8bb2ff7275ac3e6c02a635baaef
                                                            • Instruction Fuzzy Hash: E1A1A074E012188FEB68CF6AD945B9DBAF2BF89300F14D0AAD40DB7255DB345A85CF11
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7069f7606b96e42d26b5d1c0fe36a7e0fe2742a12ce4348698a8d96d66b3ac30
                                                            • Instruction ID: 8b8c9bc5e69c9d05a97612f04331ba33ddf9712272e5d32ad377ac7588c9ed9a
                                                            • Opcode Fuzzy Hash: 7069f7606b96e42d26b5d1c0fe36a7e0fe2742a12ce4348698a8d96d66b3ac30
                                                            • Instruction Fuzzy Hash: B1A1AF74E012288FEB68CF6AD944B9DBAF2BF89300F14C1AAD40DB7255DB345A85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aecd4d452a8876a08c5bc503d6359adbf8893491752294580040a1e8c29c2fe5
                                                            • Instruction ID: d24492b6d05810a1376ecfa81a8f8b7bed24c8a1d7691b0b76232e4d0fa4e58c
                                                            • Opcode Fuzzy Hash: aecd4d452a8876a08c5bc503d6359adbf8893491752294580040a1e8c29c2fe5
                                                            • Instruction Fuzzy Hash: BCA1AF71E012288FEB68CF6AD945B9DBBF6BF89300F14C0AAD40DA7255DB345A85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 63d2387578f3fddebac56bd9cf0c87958f9108a35bcd2afd38c4a0382d83f43a
                                                            • Instruction ID: 46f45995de2ab47f53b83019a4bda91abfc175644bbcc396258822ac14262218
                                                            • Opcode Fuzzy Hash: 63d2387578f3fddebac56bd9cf0c87958f9108a35bcd2afd38c4a0382d83f43a
                                                            • Instruction Fuzzy Hash: 16A1AF70E012288FEB68CF6AD945B9DBBF2BF89304F14C0AAD409A7255DB745A85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a9c850b22dc04591348b452fb0bfd8a4d4120eddc0eec5cd717d0fdc630999bc
                                                            • Instruction ID: bbe5e2a07dbf2583c07175aa997c49391268797c09598fda8bcfb0910102f9c0
                                                            • Opcode Fuzzy Hash: a9c850b22dc04591348b452fb0bfd8a4d4120eddc0eec5cd717d0fdc630999bc
                                                            • Instruction Fuzzy Hash: EE819274E412299FDB65DF65DC55BEDBBB2BB89300F1080EAE909A7294DB305E81CF40
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 346d05d750f51339cc4467a0f89ff107e5c7667e0b6151710aff8b1bc266a175
                                                            • Instruction ID: d5c0704cbe325b4b0aac07af17a9cf704e2a40c911a98d51280df37b227e48bd
                                                            • Opcode Fuzzy Hash: 346d05d750f51339cc4467a0f89ff107e5c7667e0b6151710aff8b1bc266a175
                                                            • Instruction Fuzzy Hash: EB718270E006188FEB68DF6AD945B9EBBF2AF89304F14C1AAD40DA7255DB345A85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ccf5625dabd3ac976c0258e7ea11525d82c0a127b8bd3ef6cbee1a35d89de3b
                                                            • Instruction ID: f48c6411a2dbf47a520257298827e4bb6ba456d589b72390af00b4b5409de48a
                                                            • Opcode Fuzzy Hash: 0ccf5625dabd3ac976c0258e7ea11525d82c0a127b8bd3ef6cbee1a35d89de3b
                                                            • Instruction Fuzzy Hash: 8A719470E00618CFEB68CF6AD945B9DFAF2AF89304F14C0AAD50DA7255DB345A85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4e2b2b3eb0c8ff46b6f83933738b11fe80107ed685c7296c2e431b0fce27d42b
                                                            • Instruction ID: 5c9f9b07745f7d75d72964898c1b60f88de35155f7af5146341c5b77dd52ee76
                                                            • Opcode Fuzzy Hash: 4e2b2b3eb0c8ff46b6f83933738b11fe80107ed685c7296c2e431b0fce27d42b
                                                            • Instruction Fuzzy Hash: A541D2B0D006088BEB18DFAAD94479EBBF6FF89304F10D16AD418BB254EB355A46CF14
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 802c3b803431f45b7e6f8e5d851ce9031255ab3de856b5648b68fceaf5faee58
                                                            • Instruction ID: 21bfa4233751dd4f7bf11aab417c57425a9e4062caf53976426b3b61e81072d5
                                                            • Opcode Fuzzy Hash: 802c3b803431f45b7e6f8e5d851ce9031255ab3de856b5648b68fceaf5faee58
                                                            • Instruction Fuzzy Hash: 32419CB1E016188BEB58CF6BD94579EFAF3AFC8200F04C1AAC50CA6265EB7409858F50
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5bdcbda02b1e632e46fdf899be38d94d9ec6d16b242ff29c93b4a2514ecd5244
                                                            • Instruction ID: 83eb14338e5b198ff83b2fcc48aa579bbcaa0619655f63e93f785342d908dcd0
                                                            • Opcode Fuzzy Hash: 5bdcbda02b1e632e46fdf899be38d94d9ec6d16b242ff29c93b4a2514ecd5244
                                                            • Instruction Fuzzy Hash: 6E4169B1E016188BEB58CF6BDD4578EFAF7AFC9300F04C1AAD50CA6264DB740A858F51
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f58b58275148f7bb27b53059e24024f58f3f521d09617bec0892261dc380502e
                                                            • Instruction ID: d333f4f0d70960fb2d3297f0d1cc56286bda7eb34cc147e73651ed992db920a0
                                                            • Opcode Fuzzy Hash: f58b58275148f7bb27b53059e24024f58f3f521d09617bec0892261dc380502e
                                                            • Instruction Fuzzy Hash: C1415871D016188BEB58CF6BD9457DEFAF3AFC9300F04C1AAC50CA6265EB740A868F51
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7a71fa1be056600ccf224d417defe2a69d131b71627f9c074b6ead8d54a7137c
                                                            • Instruction ID: 3d1ff08f3fab41fbf026197487bf0914cf3b667026e5a3a0ee8ea98e4ec266ec
                                                            • Opcode Fuzzy Hash: 7a71fa1be056600ccf224d417defe2a69d131b71627f9c074b6ead8d54a7137c
                                                            • Instruction Fuzzy Hash: CA4169B1D016188BEB58CF6BD94579EFBF3AFC8300F14C1AAD50CA6265EB740A858F51
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1b9d2cdc9541ef97ece5aae1c114dcb5b4f2ca4ea6523b52bcc49891a96b6c3e
                                                            • Instruction ID: 86384736cc8234926fbf17dce1d96299ec96a3ea8b57bfa3b5e12b2410a60de0
                                                            • Opcode Fuzzy Hash: 1b9d2cdc9541ef97ece5aae1c114dcb5b4f2ca4ea6523b52bcc49891a96b6c3e
                                                            • Instruction Fuzzy Hash: 84416C71E016188BEB58CF6BDD4578EFAF3AFC9300F14C1AAC50CA6265DB740A868F50
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eacb621f88f153eef007878a985cd18f2ad9c3b59f39a0c028a6a9e1d9e8f43f
                                                            • Instruction ID: 14ea09e90fc78d06b8646b60d5c8f9dd2ea06540d53aa30a14cde9f55e2ca6d4
                                                            • Opcode Fuzzy Hash: eacb621f88f153eef007878a985cd18f2ad9c3b59f39a0c028a6a9e1d9e8f43f
                                                            • Instruction Fuzzy Hash: D6416AB1D016188BEB58CF6BD9457DDFAF3AFC9300F04C1AAC50CA6265EB740A868F51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 527 e46e58-e46e8d 528 e46e93-e46eb6 527->528 529 e472bc-e472c0 527->529 538 e46f64-e46f68 528->538 539 e46ebc-e46ec9 528->539 530 e472c2-e472d6 529->530 531 e472d9-e472e7 529->531 535 e47358-e4736d 531->535 536 e472e9-e472fe 531->536 545 e47374-e47381 535->545 546 e4736f-e47372 535->546 547 e47305-e47312 536->547 548 e47300-e47303 536->548 542 e46fb0-e46fb9 538->542 543 e46f6a-e46f78 538->543 551 e46ed8 539->551 552 e46ecb-e46ed6 539->552 549 e473cf 542->549 550 e46fbf-e46fc9 542->550 543->542 563 e46f7a-e46f95 543->563 553 e47383-e473be 545->553 546->553 554 e47314-e47355 547->554 548->554 557 e473d4-e47404 549->557 550->529 555 e46fcf-e46fd8 550->555 558 e46eda-e46edc 551->558 552->558 602 e473c5-e473cc 553->602 561 e46fe7-e46ff3 555->561 562 e46fda-e46fdf 555->562 584 e47406-e4741c 557->584 585 e4741d-e47424 557->585 558->538 565 e46ee2-e46f44 558->565 561->557 568 e46ff9-e46fff 561->568 562->561 582 e46f97-e46fa1 563->582 583 e46fa3 563->583 613 e46f46 565->613 614 e46f4a-e46f61 565->614 570 e47005-e47015 568->570 571 e472a6-e472aa 568->571 580 e47017-e47027 570->580 581 e47029-e4702b 570->581 571->549 574 e472b0-e472b6 571->574 574->529 574->555 589 e4702e-e47034 580->589 581->589 590 e46fa5-e46fa7 582->590 583->590 589->571 595 e4703a-e47049 589->595 590->542 596 e46fa9 590->596 599 e470f7-e47122 call e46ca0 * 2 595->599 600 e4704f 595->600 596->542 617 e4720c-e47226 599->617 618 e47128-e4712c 599->618 604 e47052-e47063 600->604 604->557 606 e47069-e4707b 604->606 606->557 609 e47081-e47099 606->609 671 e4709b call e47428 609->671 672 e4709b call e47438 609->672 612 e470a1-e470b1 612->571 616 e470b7-e470ba 612->616 613->614 614->538 619 e470c4-e470c7 616->619 620 e470bc-e470c2 616->620 617->529 638 e4722c-e47230 617->638 618->571 623 e47132-e47136 618->623 619->549 621 e470cd-e470d0 619->621 620->619 620->621 624 e470d2-e470d6 621->624 625 e470d8-e470db 621->625 627 e4715e-e47164 623->627 628 e47138-e47145 623->628 624->625 629 e470e1-e470e5 624->629 625->549 625->629 630 e47166-e4716a 627->630 631 e4719f-e471a5 627->631 641 e47154 628->641 642 e47147-e47152 628->642 629->549 636 e470eb-e470f1 629->636 630->631 637 e4716c-e47175 630->637 632 e471a7-e471ab 631->632 633 e471b1-e471b7 631->633 632->602 632->633 639 e471c3-e471c5 633->639 640 e471b9-e471bd 633->640 636->599 636->604 643 e47184-e4719a 637->643 644 e47177-e4717c 637->644 645 e47232-e4723c call e45b50 638->645 646 e4726c-e47270 638->646 647 e471c7-e471d0 639->647 648 e471fa-e471fc 639->648 640->571 640->639 649 e47156-e47158 641->649 642->649 643->571 644->643 645->646 659 e4723e-e47253 645->659 646->602 650 e47276-e4727a 646->650 653 e471d2-e471d7 647->653 654 e471df-e471f5 647->654 648->571 655 e47202-e47209 648->655 649->571 649->627 650->602 657 e47280-e4728d 650->657 653->654 654->571 662 e4729c 657->662 663 e4728f-e4729a 657->663 659->646 668 e47255-e4726a 659->668 665 e4729e-e472a0 662->665 663->665 665->571 665->602 668->529 668->646 671->612 672->612
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q$(o_q$(o_q$(o_q$(o_q$(o_q$,cq$,cq
                                                            • API String ID: 0-3630396145
                                                            • Opcode ID: fdc28d36539812d5d7c8ca3a05902014d2a444d8d1356c617a8b9d4391affc05
                                                            • Instruction ID: e3272f5725eb35503d74f9c9e3c3a9b485c3d3b9aecba053b9c799db2431bb98
                                                            • Opcode Fuzzy Hash: fdc28d36539812d5d7c8ca3a05902014d2a444d8d1356c617a8b9d4391affc05
                                                            • Instruction Fuzzy Hash: 51126C30A042099FCB14CF69E984A9EBBF1FF89314F159599E885EB361D730ED45CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1256 e477f0-e47cde 1331 e47ce4-e47cf4 1256->1331 1332 e48230-e48265 1256->1332 1331->1332 1333 e47cfa-e47d0a 1331->1333 1337 e48267-e4826c 1332->1337 1338 e48271-e4828f 1332->1338 1333->1332 1334 e47d10-e47d20 1333->1334 1334->1332 1336 e47d26-e47d36 1334->1336 1336->1332 1340 e47d3c-e47d4c 1336->1340 1339 e48356-e4835b 1337->1339 1349 e48306-e48312 1338->1349 1350 e48291-e4829b 1338->1350 1340->1332 1341 e47d52-e47d62 1340->1341 1341->1332 1343 e47d68-e47d78 1341->1343 1343->1332 1345 e47d7e-e47d8e 1343->1345 1345->1332 1346 e47d94-e47da4 1345->1346 1346->1332 1348 e47daa-e47dba 1346->1348 1348->1332 1351 e47dc0-e4822f 1348->1351 1356 e48314-e48320 1349->1356 1357 e48329-e48335 1349->1357 1350->1349 1355 e4829d-e482a9 1350->1355 1365 e482ce-e482d1 1355->1365 1366 e482ab-e482b6 1355->1366 1356->1357 1367 e48322-e48327 1356->1367 1362 e48337-e48343 1357->1362 1363 e4834c-e4834e 1357->1363 1362->1363 1376 e48345-e4834a 1362->1376 1363->1339 1447 e48350 call e487e9 1363->1447 1368 e482d3-e482df 1365->1368 1369 e482e8-e482f4 1365->1369 1366->1365 1378 e482b8-e482c2 1366->1378 1367->1339 1368->1369 1379 e482e1-e482e6 1368->1379 1371 e482f6-e482fd 1369->1371 1372 e4835c-e4837e 1369->1372 1371->1372 1377 e482ff-e48304 1371->1377 1382 e48380 1372->1382 1383 e4838e 1372->1383 1376->1339 1377->1339 1378->1365 1385 e482c4-e482c9 1378->1385 1379->1339 1382->1383 1386 e48387-e4838c 1382->1386 1387 e48390-e48391 1383->1387 1385->1339 1386->1387 1447->1339
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $_q$$_q
                                                            • API String ID: 0-458585787
                                                            • Opcode ID: c4e233073b2c0dfb3465a9193762134477c271b994814f1f65b2fac0a495c57f
                                                            • Instruction ID: c4a319ac3e90cae2fe38f5b7427fd96c04a181353b470bcc952a598ff5d8bc33
                                                            • Opcode Fuzzy Hash: c4e233073b2c0dfb3465a9193762134477c271b994814f1f65b2fac0a495c57f
                                                            • Instruction Fuzzy Hash: E7524378A00259CFEB15EBA4C960B9FBB72EF44300F1080AAD50AAB365CF355E49DF55

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1796 e487e9-e48805 1797 e48807-e4880c 1796->1797 1798 e48811-e4881d 1796->1798 1799 e48ba6-e48bab 1797->1799 1801 e4882d-e48832 1798->1801 1802 e4881f-e48821 1798->1802 1801->1799 1803 e48829-e4882b 1802->1803 1803->1801 1804 e48837-e48843 1803->1804 1806 e48845-e48851 1804->1806 1807 e48853-e48858 1804->1807 1806->1807 1809 e4885d-e48868 1806->1809 1807->1799 1811 e48912-e4891d 1809->1811 1812 e4886e-e48879 1809->1812 1815 e489c0-e489cc 1811->1815 1816 e48923-e48932 1811->1816 1817 e4888f 1812->1817 1818 e4887b-e4888d 1812->1818 1825 e489dc-e489ee 1815->1825 1826 e489ce-e489da 1815->1826 1827 e48934-e4893e 1816->1827 1828 e48943-e48952 1816->1828 1819 e48894-e48896 1817->1819 1818->1819 1822 e488b6-e488bb 1819->1822 1823 e48898-e488a7 1819->1823 1822->1799 1823->1822 1834 e488a9-e488b4 1823->1834 1843 e489f0-e489fc 1825->1843 1844 e48a12-e48a17 1825->1844 1826->1825 1835 e48a1c-e48a27 1826->1835 1827->1799 1836 e48954-e48960 1828->1836 1837 e48976-e4897f 1828->1837 1834->1822 1841 e488c0-e488c9 1834->1841 1846 e48a2d-e48a36 1835->1846 1847 e48b09-e48b14 1835->1847 1850 e48962-e48967 1836->1850 1851 e4896c-e48971 1836->1851 1848 e48995 1837->1848 1849 e48981-e48993 1837->1849 1856 e488d5-e488e4 1841->1856 1857 e488cb-e488d0 1841->1857 1861 e489fe-e48a03 1843->1861 1862 e48a08-e48a0d 1843->1862 1844->1799 1863 e48a4c 1846->1863 1864 e48a38-e48a4a 1846->1864 1865 e48b16-e48b20 1847->1865 1866 e48b3e-e48b4d 1847->1866 1853 e4899a-e4899c 1848->1853 1849->1853 1850->1799 1851->1799 1853->1815 1859 e4899e-e489aa 1853->1859 1874 e488e6-e488f2 1856->1874 1875 e48908-e4890d 1856->1875 1857->1799 1876 e489b6-e489bb 1859->1876 1877 e489ac-e489b1 1859->1877 1861->1799 1862->1799 1867 e48a51-e48a53 1863->1867 1864->1867 1882 e48b37-e48b3c 1865->1882 1883 e48b22-e48b2e 1865->1883 1879 e48ba1 1866->1879 1880 e48b4f-e48b5e 1866->1880 1872 e48a55-e48a61 1867->1872 1873 e48a63 1867->1873 1881 e48a68-e48a6a 1872->1881 1873->1881 1890 e488f4-e488f9 1874->1890 1891 e488fe-e48903 1874->1891 1875->1799 1876->1799 1877->1799 1879->1799 1880->1879 1894 e48b60-e48b78 1880->1894 1886 e48a76-e48a89 1881->1886 1887 e48a6c-e48a71 1881->1887 1882->1799 1883->1882 1893 e48b30-e48b35 1883->1893 1895 e48ac1-e48acb 1886->1895 1896 e48a8b 1886->1896 1887->1799 1890->1799 1891->1799 1893->1799 1908 e48b9a-e48b9f 1894->1908 1909 e48b7a-e48b98 1894->1909 1902 e48acd-e48ad9 call e48258 1895->1902 1903 e48aea-e48af6 1895->1903 1897 e48a8e-e48a9f call e48258 1896->1897 1905 e48aa6-e48aab 1897->1905 1906 e48aa1-e48aa4 1897->1906 1913 e48ae0-e48ae5 1902->1913 1914 e48adb-e48ade 1902->1914 1916 e48aff 1903->1916 1917 e48af8-e48afd 1903->1917 1905->1799 1906->1905 1911 e48ab0-e48ab3 1906->1911 1908->1799 1909->1799 1918 e48bac-e48bc0 1911->1918 1919 e48ab9-e48abf 1911->1919 1913->1799 1914->1903 1914->1913 1920 e48b04 1916->1920 1917->1920 1923 e48c12-e48c19 1918->1923 1924 e48bc2-e48bc6 1918->1924 1919->1895 1919->1897 1920->1799 1927 e48c4e-e48c60 1923->1927 1928 e48c1b-e48c2a 1923->1928 1931 e48c66-e48c74 1927->1931 1932 e48d5f 1927->1932 1928->1927 1933 e48c2c-e48c42 1928->1933 1937 e48c76-e48c7b 1931->1937 1938 e48c80-e48c83 1931->1938 1934 e48d61-e48d65 1932->1934 1933->1927 1943 e48c44-e48c49 1933->1943 1937->1934 1939 e48d66-e48d7e 1938->1939 1940 e48c89-e48c8c 1938->1940 1940->1931 1942 e48c8e 1940->1942 1942->1932 1943->1934
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'_q$4'_q
                                                            • API String ID: 0-531570531
                                                            • Opcode ID: 236cff1cbc196f09bb32fd64cc48a0f3ea3c94edea2e5b36c7979cfe38725199
                                                            • Instruction ID: bed5968c8a10479c9dbb4fb7e0b27f3d78691bbaf539938d959ecc5633a0f4ed
                                                            • Opcode Fuzzy Hash: 236cff1cbc196f09bb32fd64cc48a0f3ea3c94edea2e5b36c7979cfe38725199
                                                            • Instruction Fuzzy Hash: 64B1B4747506018FDB199B28EB58B3D37A6EF85708F1814A6E106EF3B1EE28CC42D742

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1945 e456a8-e456ca 1946 e456e0-e456eb 1945->1946 1947 e456cc-e456d0 1945->1947 1950 e456f1-e456f3 1946->1950 1951 e45793-e457bf 1946->1951 1948 e456d2-e456de 1947->1948 1949 e456f8-e456ff 1947->1949 1948->1946 1948->1949 1953 e45701-e45708 1949->1953 1954 e4571f-e45728 1949->1954 1952 e4578b-e45790 1950->1952 1957 e457c6-e4581e 1951->1957 1953->1954 1955 e4570a-e45715 1953->1955 2028 e4572a call 5031ca1 1954->2028 2029 e4572a call 5031bd0 1954->2029 2030 e4572a call e456a8 1954->2030 2031 e4572a call e45698 1954->2031 1955->1957 1958 e4571b-e4571d 1955->1958 1977 e45820-e45826 1957->1977 1978 e4582d-e4583f 1957->1978 1958->1952 1959 e45730-e45732 1960 e45734-e45738 1959->1960 1961 e4573a-e45742 1959->1961 1960->1961 1963 e45755-e45774 call e46108 1960->1963 1964 e45744-e45749 1961->1964 1965 e45751-e45753 1961->1965 1971 e45776-e4577f 1963->1971 1972 e45789 1963->1972 1964->1965 1965->1952 2026 e45781 call e4a650 1971->2026 2027 e45781 call e4a70d 1971->2027 1972->1952 1974 e45787 1974->1952 1977->1978 1980 e45845-e45849 1978->1980 1981 e458d3-e458d5 1978->1981 1982 e45859-e45866 1980->1982 1983 e4584b-e45857 1980->1983 2024 e458d7 call e45a70 1981->2024 2025 e458d7 call e45a63 1981->2025 1991 e45868-e45872 1982->1991 1983->1991 1984 e458dd-e458e3 1985 e458e5-e458eb 1984->1985 1986 e458ef-e458f6 1984->1986 1989 e45951-e4599f 1985->1989 1990 e458ed 1985->1990 2033 e459a1 call 5031f71 1989->2033 2034 e459a1 call 5031f80 1989->2034 2035 e459a1 call 5032188 1989->2035 1990->1986 1994 e45874-e45883 1991->1994 1995 e4589f-e458a3 1991->1995 2003 e45885-e4588c 1994->2003 2004 e45893-e4589d 1994->2004 1996 e458a5-e458ab 1995->1996 1997 e458af-e458b3 1995->1997 2000 e458ad 1996->2000 2001 e458f9-e4594a 1996->2001 1997->1986 2002 e458b5-e458b9 1997->2002 2000->1986 2001->1989 2005 e459b7-e459ce 2002->2005 2006 e458bf-e458d1 2002->2006 2003->2004 2004->1995 2006->1986 2019 e459a7-e459b0 2019->2005 2024->1984 2025->1984 2026->1974 2027->1974 2028->1959 2029->1959 2030->1959 2031->1959 2033->2019 2034->2019 2035->2019
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hcq$Hcq
                                                            • API String ID: 0-4088181183
                                                            • Opcode ID: 929f4ee0c8abdb6abc896b2c058b287ab72d2d0e261311b3c12bf2f8b36221e3
                                                            • Instruction ID: ac6548b19250d589e68a8b5b50cc7bff9dc6aea4a1940be2a6e86bc8e39a6553
                                                            • Opcode Fuzzy Hash: 929f4ee0c8abdb6abc896b2c058b287ab72d2d0e261311b3c12bf2f8b36221e3
                                                            • Instruction Fuzzy Hash: D091B036704254CFDB199F38D898A6E7BA2BFC8304F14896AE406DB392DF389C01D791

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2098 e45c08-e45c15 2099 e45c17-e45c1b 2098->2099 2100 e45c1d-e45c1f 2098->2100 2099->2100 2101 e45c24-e45c2f 2099->2101 2102 e45e30-e45e37 2100->2102 2103 e45c35-e45c3c 2101->2103 2104 e45e38 2101->2104 2105 e45dd1-e45dd7 2103->2105 2106 e45c42-e45c51 2103->2106 2108 e45e3d-e45e75 2104->2108 2109 e45ddd-e45de1 2105->2109 2110 e45dd9-e45ddb 2105->2110 2107 e45c57-e45c66 2106->2107 2106->2108 2116 e45c68-e45c6b 2107->2116 2117 e45c7b-e45c7e 2107->2117 2128 e45e77-e45e7c 2108->2128 2129 e45e7e-e45e82 2108->2129 2111 e45de3-e45de9 2109->2111 2112 e45e2e 2109->2112 2110->2102 2111->2104 2114 e45deb-e45dee 2111->2114 2112->2102 2114->2104 2118 e45df0-e45e05 2114->2118 2119 e45c6d-e45c70 2116->2119 2120 e45c8a-e45c90 2116->2120 2117->2120 2121 e45c80-e45c83 2117->2121 2137 e45e07-e45e0d 2118->2137 2138 e45e29-e45e2c 2118->2138 2123 e45c76 2119->2123 2124 e45d71-e45d77 2119->2124 2130 e45c92-e45c98 2120->2130 2131 e45ca8-e45cc5 2120->2131 2125 e45c85 2121->2125 2126 e45cd6-e45cdc 2121->2126 2134 e45d9c-e45d9e 2123->2134 2132 e45d8f-e45d99 2124->2132 2133 e45d79-e45d7f 2124->2133 2125->2134 2135 e45cf4-e45d06 2126->2135 2136 e45cde-e45ce4 2126->2136 2139 e45e88-e45e8a 2128->2139 2129->2139 2140 e45c9c-e45ca6 2130->2140 2141 e45c9a 2130->2141 2170 e45cce-e45cd1 2131->2170 2132->2134 2142 e45d81 2133->2142 2143 e45d83-e45d8d 2133->2143 2154 e45da7-e45da9 2134->2154 2156 e45d16-e45d39 2135->2156 2157 e45d08-e45d14 2135->2157 2145 e45ce6 2136->2145 2146 e45ce8-e45cf2 2136->2146 2147 e45e1f-e45e22 2137->2147 2148 e45e0f-e45e1d 2137->2148 2138->2102 2149 e45e8c-e45e9e 2139->2149 2150 e45e9f-e45ea6 2139->2150 2140->2131 2141->2131 2142->2132 2143->2132 2145->2135 2146->2135 2147->2104 2151 e45e24-e45e27 2147->2151 2148->2104 2148->2147 2151->2137 2151->2138 2162 e45dbd-e45dbf 2154->2162 2163 e45dab-e45daf 2154->2163 2156->2104 2174 e45d3f-e45d42 2156->2174 2172 e45d61-e45d6f 2157->2172 2165 e45dc3-e45dc6 2162->2165 2163->2162 2166 e45db1-e45db5 2163->2166 2165->2104 2167 e45dc8-e45dcb 2165->2167 2166->2104 2171 e45dbb 2166->2171 2167->2105 2167->2106 2170->2134 2171->2165 2172->2134 2174->2104 2176 e45d48-e45d5a 2174->2176 2176->2172
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,cq$,cq
                                                            • API String ID: 0-2927840315
                                                            • Opcode ID: 3447f777f4c5ff28a019fe036a7a62965b1ba8ece5f036330587da69dddd2abe
                                                            • Instruction ID: 773df97a7e971f340037761a8700391a0a4f93602e380cbf42f831b1316530e0
                                                            • Opcode Fuzzy Hash: 3447f777f4c5ff28a019fe036a7a62965b1ba8ece5f036330587da69dddd2abe
                                                            • Instruction Fuzzy Hash: 01819136A00A05DFCB14DF69D888AAAB7F2FF89304B249169D405FB366D731ED41CB60

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2178 5031f80-5031f93 2180 5031f95-5031f97 2178->2180 2181 5031f9c-5031fb0 2178->2181 2182 5032020-5032023 2180->2182 2184 5031fb2-5031fb4 2181->2184 2185 5031fb6 2181->2185 2186 5031fb9-5031fbe 2184->2186 2185->2186 2187 5031fc5-5031fdf 2186->2187 2190 5031fe1-5032017 2187->2190 2191 5032024-5032057 2187->2191 2190->2187 2205 5032019 2190->2205 2196 5032060-5032087 2191->2196 2197 5032059-503205b 2191->2197 2206 5032089-503209f 2196->2206 2207 50320be-50320c0 2196->2207 2198 5032164-503216b 2197->2198 2205->2182 2206->2207 2215 50320a1-50320b8 2206->2215 2208 50320c2-50320c4 2207->2208 2209 50320c9-50320dd 2207->2209 2208->2198 2213 50320e3 2209->2213 2214 50320df-50320e1 2209->2214 2216 50320e6-5032103 2213->2216 2214->2216 2215->2207 2222 503216c 2215->2222 2221 5032105-5032108 2216->2221 2216->2222 2221->2222 2223 503210a-503210e 2221->2223 2226 5032171-50321a7 call 5032210 2222->2226 2224 5032150-503215d 2223->2224 2225 5032110-5032116 2223->2225 2224->2198 2227 5032119-5032121 2225->2227 2235 50321ad-50321fa 2226->2235 2227->2226 2229 5032123-5032139 call 5031d30 2227->2229 2236 5032147-503214a 2229->2236 2237 503213b-503213d 2229->2237 2244 5032201 2235->2244 2245 50321fc-50321ff 2235->2245 2236->2222 2238 503214c-503214e 2236->2238 2237->2236 2238->2224 2238->2227 2246 5032204-5032209 2244->2246 2245->2246
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR_q$LR_q
                                                            • API String ID: 0-1289077650
                                                            • Opcode ID: c30a188caeb8c18246bfb1f9ad05b7e6c06bad567a12e1d5a142962f48c93ef7
                                                            • Instruction ID: a45aea44ec78790d7e960ff857cd4b19757c5b097c467a3f2a5dfd004fb5f001
                                                            • Opcode Fuzzy Hash: c30a188caeb8c18246bfb1f9ad05b7e6c06bad567a12e1d5a142962f48c93ef7
                                                            • Instruction Fuzzy Hash: 0E81A2387001068FCB48EF78E955A6E77FAFF89604B1585A9E506DB361DB30DC02CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2248 50387c0-50387df 2249 50387e5-50387ee 2248->2249 2250 503899a-50389bf 2248->2250 2253 50389c6-5038a60 call 50384e8 2249->2253 2254 50387f4-5038849 2249->2254 2250->2253 2294 5038a65-5038a6a 2253->2294 2263 5038873-503887c 2254->2263 2264 503884b-5038870 2254->2264 2266 5038881-5038891 2263->2266 2267 503887e 2263->2267 2264->2263 2305 5038893 call 50387b0 2266->2305 2306 5038893 call 50387c0 2266->2306 2307 5038893 call 50389a0 2266->2307 2267->2266 2270 5038899-503889b 2272 50388f5-5038942 2270->2272 2273 503889d-50388a2 2270->2273 2286 5038949-503894e 2272->2286 2275 50388a4-50388d9 2273->2275 2276 50388db-50388ee 2273->2276 2275->2286 2276->2272 2287 5038950 2286->2287 2288 5038958-503895d 2286->2288 2287->2288 2290 5038967-503896c 2288->2290 2291 503895f 2288->2291 2295 5038981-5038982 2290->2295 2296 503896e-503897c call 50327ec call 5032804 2290->2296 2291->2290 2295->2250 2296->2295 2305->2270 2306->2270 2307->2270
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (&_q$(cq
                                                            • API String ID: 0-1128674267
                                                            • Opcode ID: 8da496bc79c497969eb51c1c2b70a0441c04f287f77c7657513ee0d55415de1d
                                                            • Instruction ID: 9cfd3554865a4683dc7da5665870d23cfe6b46adcfbe5b96a7f79d3b81f5e0ef
                                                            • Opcode Fuzzy Hash: 8da496bc79c497969eb51c1c2b70a0441c04f287f77c7657513ee0d55415de1d
                                                            • Instruction Fuzzy Hash: 4671AF31F002199BDB15DFA8D850AAEBBF6BFC8700F148569E506A7380EF34AD06C791
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xcq$Xcq
                                                            • API String ID: 0-1149048318
                                                            • Opcode ID: 405410d04f23d245c776cd545afc38ecfa73940552948d5aaf5ef3650f4b8dba
                                                            • Instruction ID: 35660f9940f5ebd81bbbcee0b6f97c7f6e49da14411bcf9666a72509a9b758be
                                                            • Opcode Fuzzy Hash: 405410d04f23d245c776cd545afc38ecfa73940552948d5aaf5ef3650f4b8dba
                                                            • Instruction Fuzzy Hash: 51314875B003248BDF1D9A7AA9842BE65DABBC4314F24143ED817E3384DF78CE058761
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3767143605.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_55f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 5f0c37453f1a0dea3c4eac0ddd2f04059296352778261a7cc7edfa8dce1a8e32
                                                            • Instruction ID: e936515e57d3b701af783f6bd1702eb4dd17431b1443534da20ce50e5c46b6c3
                                                            • Opcode Fuzzy Hash: 5f0c37453f1a0dea3c4eac0ddd2f04059296352778261a7cc7edfa8dce1a8e32
                                                            • Instruction Fuzzy Hash: 4B712370A00B058FD724DF29D144B6ABBF2FF88314F10892ED58AD7A50EB75E949CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR_q
                                                            • API String ID: 0-2241839734
                                                            • Opcode ID: a2a5fefdc21d2858b7a95638733008aeb1e41cbfe1acc3fa3fae719493c9a8d3
                                                            • Instruction ID: 8f16d73f3e3f3c18def11609b0286c7e48e76d73d2dcd1e6f424a459b82df9fa
                                                            • Opcode Fuzzy Hash: a2a5fefdc21d2858b7a95638733008aeb1e41cbfe1acc3fa3fae719493c9a8d3
                                                            • Instruction Fuzzy Hash: B122CB7890021ADFCB54EF64E995B9DBBB2FF48301F1086A6D809A7359DB306D86CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR_q
                                                            • API String ID: 0-2241839734
                                                            • Opcode ID: 46a9fd8b77ed654d4b4dac5ee9d957caa9f2919de41aec911a879df295e2f052
                                                            • Instruction ID: 43d9dd262bd8b7f1237005871cd0a9474721e00debb6626b07ab845d0031f836
                                                            • Opcode Fuzzy Hash: 46a9fd8b77ed654d4b4dac5ee9d957caa9f2919de41aec911a879df295e2f052
                                                            • Instruction Fuzzy Hash: 7222CB7890021ADFCB54EF64E995B9DBBB2FF48301F1086A6D809A7359DB306D86CF50
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 055FD682
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3767143605.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_55f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 8f3ca3a81a8ef74a9bf9c92a3f7ec63e465d1d49f8b4a51f4dd76df0dfc0efb9
                                                            • Instruction ID: 0cde9e19e4c95973b76f58d99ba802ad0bef3bc2d637093b7ba6094a87c56ba5
                                                            • Opcode Fuzzy Hash: 8f3ca3a81a8ef74a9bf9c92a3f7ec63e465d1d49f8b4a51f4dd76df0dfc0efb9
                                                            • Instruction Fuzzy Hash: AE51C0B1C00349AFDB14CFA9C984ADEBFB5BF48314F24812AE919AB250D7749985CF91
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 055FD682
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3767143605.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_55f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: c00d7d2fe5f1e74a66c25e212ac1d43da7bce7246a7534b911623c6446ad121f
                                                            • Instruction ID: c47b4c63d38750b6e4471e29bedc3ec802d2add9c347922a9cde1e5e8dbd0f1f
                                                            • Opcode Fuzzy Hash: c00d7d2fe5f1e74a66c25e212ac1d43da7bce7246a7534b911623c6446ad121f
                                                            • Instruction Fuzzy Hash: EA51CFB1D003499FDB14DFA9C984ADEBBB5FF48314F24812AE919AB210D774A845CF91
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 055FFD71
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3767143605.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_55f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: 7943665f1b1e6d6b024e0e1180a6ac2e71b50797603db5e2b1b338f78682fd29
                                                            • Instruction ID: cae5e2c0ffc4eb905f760d29f93fd68bc42b8af2a4d97bc07c5e0eaeabfb98d7
                                                            • Opcode Fuzzy Hash: 7943665f1b1e6d6b024e0e1180a6ac2e71b50797603db5e2b1b338f78682fd29
                                                            • Instruction Fuzzy Hash: 5A4149B5900309DFCB54DF99C488AAABBF5FF88314F25C859D619AB321D734A841CFA0
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,055FB3AC), ref: 055FB5E6
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3767143605.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_55f0000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: f4af29f66c576e1fcfed4b1c7c5316464c7ea0411273cdb5905dee25c9754b91
                                                            • Instruction ID: 3b8b12320b60a7943ff82393ba71709bb3d2c268b02178f23f2291cda80d49c3
                                                            • Opcode Fuzzy Hash: f4af29f66c576e1fcfed4b1c7c5316464c7ea0411273cdb5905dee25c9754b91
                                                            • Instruction Fuzzy Hash: 33113FB1C00249CFCB20DFAAD444A9EFBF4FB88320F10846AD919B7210E379A545CFA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (o_q
                                                            • API String ID: 0-493409505
                                                            • Opcode ID: 1eee0db894edaea9e65e9394bf657e98b03aff33ee28dc4da0808b5bbef5ca56
                                                            • Instruction ID: 5dbfa19149550e121efc744e945dce00812999b813f972d2e766705264c9d8a3
                                                            • Opcode Fuzzy Hash: 1eee0db894edaea9e65e9394bf657e98b03aff33ee28dc4da0808b5bbef5ca56
                                                            • Instruction Fuzzy Hash: BA41E239B003549FC715AF68D848AAE7BF6AFC9710F144469E506D7391DE359C01C7A1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74cc0d2db611797d8e6acae47f2f308158059ece590a0b954fe3a291c230dd8f
                                                            • Instruction ID: bf6d75b38ea9dd4a45ec6419321be7b9a4b8c95f836ff0c4ba3a05f1672fbad1
                                                            • Opcode Fuzzy Hash: 74cc0d2db611797d8e6acae47f2f308158059ece590a0b954fe3a291c230dd8f
                                                            • Instruction Fuzzy Hash: 86F11C75A402158FCB04CF6DE9849ADBBF2FF88324B1A9069E515EB361CB35EC41CB61
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7dbc930f0ce47f6d8e136715a6f23ef3c2b9c2ef12c66485fb7d76916db74aa5
                                                            • Instruction ID: da6cb4fbc0f9354278d63a19b91e3e91236d219aca21f6cb7b46f2797d06ebcd
                                                            • Opcode Fuzzy Hash: 7dbc930f0ce47f6d8e136715a6f23ef3c2b9c2ef12c66485fb7d76916db74aa5
                                                            • Instruction Fuzzy Hash: D57139347086158FCB14DF28E488AAA7BE6AF49304F1550A9E856EB3B1DB74EC41CBD1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9dc9f12965ceffb36a5938c399413dac7de9c79994eb53b5946ca250000f857c
                                                            • Instruction ID: 57500a3a1a0390871040dff3a7f0d3fb586b747040f3c90c54c04b8e43baab0f
                                                            • Opcode Fuzzy Hash: 9dc9f12965ceffb36a5938c399413dac7de9c79994eb53b5946ca250000f857c
                                                            • Instruction Fuzzy Hash: 8D51A4388A1723CFD7043F60B5AC16E7BA1FB0F317748AD44A81EC51A5AB7850A5CE62
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c3bc11c7b53e62084ee7702867d24032dcbfd50720a86451e7b56f78aa257e96
                                                            • Instruction ID: 8f000127c45f0ff3a157fadcbdc77b24a7196389d3f7dc92401831987a72521c
                                                            • Opcode Fuzzy Hash: c3bc11c7b53e62084ee7702867d24032dcbfd50720a86451e7b56f78aa257e96
                                                            • Instruction Fuzzy Hash: 4A51B7388A1723CFD6043F60B5AC07E7BA5FB0F317748AC44A91EC51A5AB7850A5CA62
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d32849b8f21bea2bb3c1789c257a7d0e5defd6bfad1a7ef66545cb002eec4f51
                                                            • Instruction ID: a3e8c58b21ed8f009e7976cf5276c48b6506dd3d4207b4bbb1917ecf6aa6f58b
                                                            • Opcode Fuzzy Hash: d32849b8f21bea2bb3c1789c257a7d0e5defd6bfad1a7ef66545cb002eec4f51
                                                            • Instruction Fuzzy Hash: 87612438D01319DFDB15DFA4D954AADBBB2FF88304F208529E805AB399DB34594ACF40
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c27518b0c9d11e4b2952af19c65263a7e5003e678fec8cb9dfb140401c049649
                                                            • Instruction ID: 34f55a2b6a1d9fa65ee5032c17a74f31de48afac3024441fb2136853e8a37f02
                                                            • Opcode Fuzzy Hash: c27518b0c9d11e4b2952af19c65263a7e5003e678fec8cb9dfb140401c049649
                                                            • Instruction Fuzzy Hash: A9510374744215DFC758EF69E89697E77BAFB483587010864E806DB3A8DB31EC06CB90
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60e5f56add1c8aa6d25ec16c65389b51fbd2fd2ad0e867ca8ac92091b64b69bb
                                                            • Instruction ID: ae743c4b2f1761d2f6340a7b758be8b730320d95fc6a427aa1aad38393119df9
                                                            • Opcode Fuzzy Hash: 60e5f56add1c8aa6d25ec16c65389b51fbd2fd2ad0e867ca8ac92091b64b69bb
                                                            • Instruction Fuzzy Hash: 8F519474E01208DFDB44DFA9D5849DDBBF2BF89300F20916AE819AB365DB309901CF50
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 115e562becb62857a9d936009af93379731446051c41e834dedd5685a491344f
                                                            • Instruction ID: 4a794d272f951f279f9cf9a69bd1197561cf8a1dd979ef6e4c92aa1c8cfcdfa9
                                                            • Opcode Fuzzy Hash: 115e562becb62857a9d936009af93379731446051c41e834dedd5685a491344f
                                                            • Instruction Fuzzy Hash: 1D519575E01208DFCB48DFA9D59499DBBF2FF89300B209569E805BB365DB31A946CF40
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3a9c0c4392684549c5b98b6c2a3388422c3501447f3bfa79433d740b90e41873
                                                            • Instruction ID: 4c87a5516e7831fbff1982f692b09ca0c483f33da9fe4e7166f6326804c5bff5
                                                            • Opcode Fuzzy Hash: 3a9c0c4392684549c5b98b6c2a3388422c3501447f3bfa79433d740b90e41873
                                                            • Instruction Fuzzy Hash: F4415E31901319DFDB44AFA0E45D7EE7BB1FB4A315F105825D206A62D4DBB80A89CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ebf9dab4da3e9f32874a32d15f0d48689f7e0f3a09ee0520212ecc34dc4c6278
                                                            • Instruction ID: 3f17ab0cfb559bc09a3bb20a9def1dec1455b75f74c086eb8c77323842d17669
                                                            • Opcode Fuzzy Hash: ebf9dab4da3e9f32874a32d15f0d48689f7e0f3a09ee0520212ecc34dc4c6278
                                                            • Instruction Fuzzy Hash: 88517375E01208DFCB48DFA9D59499DBBF2FF89310B209469E809BB364DB31A946CF50
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 879e9242f7cd0376560f4a714b63050da0007e1da45793bb6ac33db20fd4c65a
                                                            • Instruction ID: f9ca70b95af380b8106b04c8285c337184c5ae209c5e424757d441ca1ca5cb56
                                                            • Opcode Fuzzy Hash: 879e9242f7cd0376560f4a714b63050da0007e1da45793bb6ac33db20fd4c65a
                                                            • Instruction Fuzzy Hash: E351BB74E01228CFCB25DF68E984BEDBBB2BB49305F1055AAE409A7350D735AE85CF10
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 755d2969fa73989372f0c86bbd21e6a95c42b94db4e9ecbf15189892f06566f9
                                                            • Instruction ID: 1e81796122a2889c44346e6de81638e781b8a79246c443d2a324d45136729602
                                                            • Opcode Fuzzy Hash: 755d2969fa73989372f0c86bbd21e6a95c42b94db4e9ecbf15189892f06566f9
                                                            • Instruction Fuzzy Hash: C451A131A04249DFCF11CFA8E884A9EBFB2FF89314F149556E811BB292D334E914DB60
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: debe66802287f55bcfb97c1187e360e84869dd2bf9406f500c0087de3f9a78be
                                                            • Instruction ID: 5ab668cf858d7fc716b8a3380374024fdf0e1d0524fec940cdf755d57363b491
                                                            • Opcode Fuzzy Hash: debe66802287f55bcfb97c1187e360e84869dd2bf9406f500c0087de3f9a78be
                                                            • Instruction Fuzzy Hash: 11414431E012199BDB14DFA5D891ADEFBF5BF88700F28C169E505B7240EB70AD46CB91
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37781777c18833d2195585becdcd0c569594da4fe90c1532a1a00599d2f9b535
                                                            • Instruction ID: 4d3fdd0e06cc9a4f68e2804aa5ab8a4634341128f4383f0a9a7635727cacb33c
                                                            • Opcode Fuzzy Hash: 37781777c18833d2195585becdcd0c569594da4fe90c1532a1a00599d2f9b535
                                                            • Instruction Fuzzy Hash: D131C37570025A9FCF05AF64E484AAF3BA2FF88704F105415FA159B281CB79DD26DBE0
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 449320885b8e2fa7394b680ecce98af5e2fe3e8b32e7b4df29b5b27348efce99
                                                            • Instruction ID: 452f1e63a0438321898e42dc5e32bdf354337cbef08d20bd442c1ac7df879f31
                                                            • Opcode Fuzzy Hash: 449320885b8e2fa7394b680ecce98af5e2fe3e8b32e7b4df29b5b27348efce99
                                                            • Instruction Fuzzy Hash: 1031A035801319DFDB00AFA0E85D7EE7BB1FB4A315F104815D216A22D4DBB80A8ACFA1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 745178eda63f933562951a4dd9e3f56ddf7804a03c61eadd073963cf8777d78e
                                                            • Instruction ID: 3144e65999de143c71cd4d157dea9f47cd289034463405008ddbfe7c6087785b
                                                            • Opcode Fuzzy Hash: 745178eda63f933562951a4dd9e3f56ddf7804a03c61eadd073963cf8777d78e
                                                            • Instruction Fuzzy Hash: 2821243830C3104BEB151739A89863E6B9B9FD471EB5844BBD582DB795EF288C42E3C1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dce65c917777425ffffc975e79ccf7fecea43c4223f2c3f521c3bc83f18c1193
                                                            • Instruction ID: 53df1ad052b70846b34d4d10d35d6351029180639903d578e4cd6180ac79d1e5
                                                            • Opcode Fuzzy Hash: dce65c917777425ffffc975e79ccf7fecea43c4223f2c3f521c3bc83f18c1193
                                                            • Instruction Fuzzy Hash: 8631B771E402158FCB04CF6DD8889AEBBF2FF85760B198165E555EB3A1C7349C42CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f580910061504d1d46f64f2d3366a93abb6f6c00ce348beed53305eca6b1fd2e
                                                            • Instruction ID: 2868096c5127b5d539eafce6007024c3d3b94ca4fcbcce63ce3ebffb8c5585a8
                                                            • Opcode Fuzzy Hash: f580910061504d1d46f64f2d3366a93abb6f6c00ce348beed53305eca6b1fd2e
                                                            • Instruction Fuzzy Hash: AE21F5383082104BEB141735E858A7E369B9FC4B1EF64547AD546DB798EF29CC42E3C1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3759972346.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_d7d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f1752d4afd3c3868af33197db95b0a1918dc29b126bcf0fc41a467084eda326
                                                            • Instruction ID: ad9047fd5b6cf4a906d18008abd5267f46e75d71dc1aed2af9dacf89a478b592
                                                            • Opcode Fuzzy Hash: 0f1752d4afd3c3868af33197db95b0a1918dc29b126bcf0fc41a467084eda326
                                                            • Instruction Fuzzy Hash: AD311C7550E3C08FD7038B24C9A4711BF71AF47214F1DC5DBD8898F1A7D22A980ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a8dca4b9e466f7dd6138ddd33c2c97c9d583d9df1f7eface2d64dd77aca3f36b
                                                            • Instruction ID: abe203a4ce211430f68bb1db4a63e854a582d0fc6e7d94b8b0831df468c2049f
                                                            • Opcode Fuzzy Hash: a8dca4b9e466f7dd6138ddd33c2c97c9d583d9df1f7eface2d64dd77aca3f36b
                                                            • Instruction Fuzzy Hash: 70219F35A00205AFCB14DF74D450AAE77A5EF98754B90C41DE949AB340DA31EE42CBD2
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e4968b40fc95e15f99428d5f6509b1bbfc49739b2519ac4502d316a2ce932662
                                                            • Instruction ID: 070624e0f8e5a1d3aeb898cff9db7c7e9864eac2b33fb30e00ca2421bfbec661
                                                            • Opcode Fuzzy Hash: e4968b40fc95e15f99428d5f6509b1bbfc49739b2519ac4502d316a2ce932662
                                                            • Instruction Fuzzy Hash: A1210735704B218FD7199B24D4A452FBBA2EF857547158669E906DB392CE34DC02C7D0
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3759684417.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_c8d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a104291c2b2f543ad194fff40d24f0ce226bd829f86dbcb70d286030c09544fd
                                                            • Instruction ID: 1ec41654033263bb6fd168fea847732c77dfcb2c693c98859d4c39fa101d27d4
                                                            • Opcode Fuzzy Hash: a104291c2b2f543ad194fff40d24f0ce226bd829f86dbcb70d286030c09544fd
                                                            • Instruction Fuzzy Hash: 49212571504244EFDB05EF54D9C0F26BF65FBD8328F20C5A9E90A0B296C336E856C7A5
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3759972346.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_d7d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7116e2484820f4f308edcb8663cc8015a10bbb02631b710b6e7742be9daa6632
                                                            • Instruction ID: 53fa052659d5daae752b0d6946f538323a0b0bbb845c74c6c8020c179d0fb195
                                                            • Opcode Fuzzy Hash: 7116e2484820f4f308edcb8663cc8015a10bbb02631b710b6e7742be9daa6632
                                                            • Instruction Fuzzy Hash: BA21D0715042049FCB14DF24C984B26BB76FF84314F24C5A9E84D4B296D77AD846CA71
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db0428680c33cac631af5339d9d184f1a42beee52a0a95dca9e86c2697efb585
                                                            • Instruction ID: d5c188ed56d822daf0b593c11c4917bc45bfec6581c918fe93c2ecd46b72f783
                                                            • Opcode Fuzzy Hash: db0428680c33cac631af5339d9d184f1a42beee52a0a95dca9e86c2697efb585
                                                            • Instruction Fuzzy Hash: 7E31A878E11308DFCB44DFA8E59499DBBB2FF49305B20946AE809AB364DB31AD05CF40
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f9126c9b26c02e5aeceec83b1fb475db9a11ee3331bd63bea6aa63348055677
                                                            • Instruction ID: cb318e5f1aaac203eff0077fb58628cb948f8a3e0d9c0ded3187ce4c62a13fbc
                                                            • Opcode Fuzzy Hash: 0f9126c9b26c02e5aeceec83b1fb475db9a11ee3331bd63bea6aa63348055677
                                                            • Instruction Fuzzy Hash: 892104757042548FDB16AF64E49476B3FA2FF84718F104469F9459F282CB38CC16DBA0
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0b3c2a313d56b5fbe04460198ac29b25ba9c85c0aa613e1a40e23456a4acf412
                                                            • Instruction ID: 4598ceb35fa5569ca7398694c7f18d2715ffd5cdf5c33ff9c4de847700c023db
                                                            • Opcode Fuzzy Hash: 0b3c2a313d56b5fbe04460198ac29b25ba9c85c0aa613e1a40e23456a4acf412
                                                            • Instruction Fuzzy Hash: 53112B323042941FDB066F7CA8105AE3F97EFC9354B154469EA05DB392DE399D0783A1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c68c1c794cbfc79f574a5bf0049b81236cfc75c7bed4ee5072f1904e2b5e95d1
                                                            • Instruction ID: fb379ff37bab681d3c356a3b5d4dfc5619257b52cd497f33d4f83ec782b09350
                                                            • Opcode Fuzzy Hash: c68c1c794cbfc79f574a5bf0049b81236cfc75c7bed4ee5072f1904e2b5e95d1
                                                            • Instruction Fuzzy Hash: DA217F70D0124A9FDB06EFB9D94179EBFF1FB45304F0085AAD014EB369EB741A4A8B91
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 031c8dbb38077ea079849a0a1944ff4414afca85c8bf848f1d557aae01f49ef2
                                                            • Instruction ID: 50f362a4a4399501cace9d92f5d72f2a4306a622e47b49157afc4fde7fc92872
                                                            • Opcode Fuzzy Hash: 031c8dbb38077ea079849a0a1944ff4414afca85c8bf848f1d557aae01f49ef2
                                                            • Instruction Fuzzy Hash: C8112536700A228FC7199A29E89852EB7A6FFC47513154268E906DB351DF24DC0287D0
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3759684417.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_c8d000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                            • Instruction ID: 064b0b94e4ba71dcd30c9718b5d38c1ae9a25d905fad155ec762bdfeebabf1e5
                                                            • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                            • Instruction Fuzzy Hash: A3110372404280DFCB12DF00D5C4B16BF71FB94328F24C1A9E80A0B656C33AE95ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6df95db9621ad48c1a19f0aed9b94b224ce32c275989e379329580f112a19253
                                                            • Instruction ID: 40ca5fd9942c83f20adebcaf988aa7daf790eb211755af20ee51ea70afb37cc3
                                                            • Opcode Fuzzy Hash: 6df95db9621ad48c1a19f0aed9b94b224ce32c275989e379329580f112a19253
                                                            • Instruction Fuzzy Hash: 1121E078C052598FCB41EFA8D8445EEBFF1BF49300F1051AAD809B7261EB341A95CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc64f2689f69cf9aa1073c1cb14d74f2238c11d400482b528cff55f56313cb48
                                                            • Instruction ID: ff085e2c361336382991b0256f3580eeedb887ff585cc196855fc5b013aa3f83
                                                            • Opcode Fuzzy Hash: fc64f2689f69cf9aa1073c1cb14d74f2238c11d400482b528cff55f56313cb48
                                                            • Instruction Fuzzy Hash: AD1167B2800249DFDB10DF99D945BDEBFF8EF48320F148459EA18A7210C339A550CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a1c666a4154a0375b63d635ecc467968008fb4938262b1a84f28a1d8638e826c
                                                            • Instruction ID: dc85bbd6c61d6a6351dfa87491ed02433beaee31920f1151bae12263a2e9fcb2
                                                            • Opcode Fuzzy Hash: a1c666a4154a0375b63d635ecc467968008fb4938262b1a84f28a1d8638e826c
                                                            • Instruction Fuzzy Hash: 9B116A70D002099FCB45EFB9D94179EBBF2FB44304F0095AAD018AB369EB745A4A8B91
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 500f8df40d870af8f23f1acf84a6e6bab25a8e59dfbf2048654581ac240e4433
                                                            • Instruction ID: f34fa0acd1ec56221ad2d76a56f57c0e3fc5daafb896be1202088902a244edec
                                                            • Opcode Fuzzy Hash: 500f8df40d870af8f23f1acf84a6e6bab25a8e59dfbf2048654581ac240e4433
                                                            • Instruction Fuzzy Hash: B71164B68002499FCB10CF99D945BDEBFF8EF48320F148459EA18A3210C339A551DFA1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1a61f4b7dbc47b3d92f3a66153bc793523a61254ce25764db0abfe8e47ae82f5
                                                            • Instruction ID: ddb5f51953f92eb38d56fe28944e8a848697b13301f69d360112c0965bd5f523
                                                            • Opcode Fuzzy Hash: 1a61f4b7dbc47b3d92f3a66153bc793523a61254ce25764db0abfe8e47ae82f5
                                                            • Instruction Fuzzy Hash: 85115234F011498FDB04DFE9E861BEEBBB9EF48314F04D0A1E908B7345E63099418B61
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 01b98e583dca048abdd62101ebf571b1fc6a14222b7deff217e47eca7f84c641
                                                            • Instruction ID: f2ce7f73908e2ece2820221d60b177d3e75c2e1ce933422dbf1df57143d2d96e
                                                            • Opcode Fuzzy Hash: 01b98e583dca048abdd62101ebf571b1fc6a14222b7deff217e47eca7f84c641
                                                            • Instruction Fuzzy Hash: 06212478C017198FCB10EFA8D8485EEBFB1BF49310F10516AD405B72A4EB301A85CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c041c8cec3181f0ec8a2ab8015525a4183c6714254e9c32390862b6f62f041fe
                                                            • Instruction ID: 0c64ebf239ff7c110281c4cacbc3b3b9d3bab2da679443ce24fec87dfc023817
                                                            • Opcode Fuzzy Hash: c041c8cec3181f0ec8a2ab8015525a4183c6714254e9c32390862b6f62f041fe
                                                            • Instruction Fuzzy Hash: D5012472B001246FDB059E64A800BFF3BE7DFC8751F19806AFA05DB291CE758C129790
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a7f8968c17b6e01ff28aa9ff8ba1a31e70edb8e37e5592ffdd5a65ce17014ba
                                                            • Instruction ID: 6166c5d5cb8b65b3eafec6e116a3cd969d8e270cab2616ecf10c6cedbb0de7b7
                                                            • Opcode Fuzzy Hash: 0a7f8968c17b6e01ff28aa9ff8ba1a31e70edb8e37e5592ffdd5a65ce17014ba
                                                            • Instruction Fuzzy Hash: 6401A475E0021AABCB44EFB9D9016AEBBF5BF48200F10856AD919F7254EB345901CB91
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 537575bb9aaddd27add06a1c102035c9da6f02253d8d0e380a1e5a2f3a8df171
                                                            • Instruction ID: 9b9baeda40681c13bc77ae7caee812bf5b53663cc8edab5b624d68243c2f9c5e
                                                            • Opcode Fuzzy Hash: 537575bb9aaddd27add06a1c102035c9da6f02253d8d0e380a1e5a2f3a8df171
                                                            • Instruction Fuzzy Hash: EDF05431304A009FC744AB2AE85593A77EAAFC671171544BAF905CB261EA60DC01CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9f8fb8c9f7096b59bc0ca2a74209f466b16d0ecda25709fc18b252c31c9e9ed
                                                            • Instruction ID: fd84e4da77c61757cf6ca3f4b5d75286deed9c1a9a61c88e37c0f45172e34c15
                                                            • Opcode Fuzzy Hash: b9f8fb8c9f7096b59bc0ca2a74209f466b16d0ecda25709fc18b252c31c9e9ed
                                                            • Instruction Fuzzy Hash: B5F08235300A109FD748AF2AF854A2A77EEEFC96117158479E506CB3A1DE30DC01C790
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 99bbbf7efd110df8b17f9e1807933ec6b19e781cab77a0a6f397cb63f31cacb7
                                                            • Instruction ID: 4830e9f39323b85f338e929a29a976a99ec3026efb5d8c29d3c689afeddc1ac8
                                                            • Opcode Fuzzy Hash: 99bbbf7efd110df8b17f9e1807933ec6b19e781cab77a0a6f397cb63f31cacb7
                                                            • Instruction Fuzzy Hash: 9BE09232C193AB5FCB03AB7498005EEFF34EE93210B8445D7D465AB042EB60295AC7A2
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 167ca138bd54a72cb0621f607530b141a9e40a450550c5c4554824e77259018b
                                                            • Instruction ID: 9881684e2ac1c203c46f0e201e92faa7cd433983539ecb409d52f3263c0f21e1
                                                            • Opcode Fuzzy Hash: 167ca138bd54a72cb0621f607530b141a9e40a450550c5c4554824e77259018b
                                                            • Instruction Fuzzy Hash: 84D05B31D2022B57CB00E7A5DC044EFF738EED5265B908626D55437140FB702659C7E1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                            • Instruction ID: 46e42d2d2737b89350f3c982f3d6078eae93e84a9855d21360853ecbf0fd135c
                                                            • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                            • Instruction Fuzzy Hash: 03C0123320C1282AA624108E7C40AABAB8CC2C17F8E250137F95CB3200A8829C8001A8
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e8a7cf0db6c42181d704d59a6dd2c750e060cee45dab42738b3c1c57cfa8432
                                                            • Instruction ID: bd857a65114ceaa444be21c7ff135136aae45d7e9f79879255d074e1887fdcbd
                                                            • Opcode Fuzzy Hash: 8e8a7cf0db6c42181d704d59a6dd2c750e060cee45dab42738b3c1c57cfa8432
                                                            • Instruction Fuzzy Hash: 38D0677BB410189FCB049F9CE880CDDB7B6FB9C221B048516EA15A3261C6319921DB50
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64524fca203e51e0ff0353d35c4aaa64a13b3d8c6da852f262dfae82e97e2b81
                                                            • Instruction ID: e7e97dab027f24f5e5405e133d3a8d3c82bd4012a18ad3acd113485e43039f30
                                                            • Opcode Fuzzy Hash: 64524fca203e51e0ff0353d35c4aaa64a13b3d8c6da852f262dfae82e97e2b81
                                                            • Instruction Fuzzy Hash: 8CD02E745283860FD306F730EA462283B65FE81B08F9041E2B8040E02EEF7A0C4AC7A1
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 07db3bea67e916e28dfc3810b7b5f385d4ffe9702af95e5a2bdf33087fe75d3c
                                                            • Instruction ID: 329d509469ac7e43714dbfa5388a833097da457161fe73f79ce86adcaf462ea8
                                                            • Opcode Fuzzy Hash: 07db3bea67e916e28dfc3810b7b5f385d4ffe9702af95e5a2bdf33087fe75d3c
                                                            • Instruction Fuzzy Hash: F3D04838D84228CBCF209F64EA482E8BBB0EB89301F1028A6D809B2250D7346E608F51
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3760764846.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_e40000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9db96a153734d71e2453d561e6c50fe0cd45b0cda33eea3afa9f4a9cea23a2a6
                                                            • Instruction ID: a8399bfde98bdd1daa28662fed27a49796484cee8258115eee379fb94363c26a
                                                            • Opcode Fuzzy Hash: 9db96a153734d71e2453d561e6c50fe0cd45b0cda33eea3afa9f4a9cea23a2a6
                                                            • Instruction Fuzzy Hash: 31C0123056434A4BC609F775EA4661D375AF6C0704F405661B1091A12DDF79194987A4
                                                            Memory Dump Source
                                                            • Source File: 00000014.00000002.3766723869.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_20_2_5030000_rXcourOVPD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ae7e4c9baef2f8281502f457fec21c43356219ad063cf0de0c325bdd17a9bb4
                                                            • Instruction ID: 3fd53748f0289e217953d3017baa874f4a38afb2eecbb0ec48c5a193fa383e2a
                                                            • Opcode Fuzzy Hash: 0ae7e4c9baef2f8281502f457fec21c43356219ad063cf0de0c325bdd17a9bb4
                                                            • Instruction Fuzzy Hash: CBC00238A403108FD744CB14E59475877A1B784321F25C665D405C7A61D72C9C52CB44