Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Test2.exe

Overview

General Information

Sample name:Test2.exe
Analysis ID:1581170
MD5:7f888b6cbd5062a7558eea61eb9a9ca2
SHA1:2acfb5c3e7b8e569ea52397154b9b3ffb44e7d87
SHA256:864bec690da391f258de447606ac18baa79672b665ba321a4da67ed59d567cad
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Test2.exe (PID: 4196 cmdline: "C:\Users\user\Desktop\Test2.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
    • Client.exe (PID: 1352 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
      • cmd.exe (PID: 760 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • chcp.com (PID: 5608 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
        • PING.EXE (PID: 5628 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
        • Client.exe (PID: 3648 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
          • cmd.exe (PID: 5972 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HKybYN00EBOw.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • chcp.com (PID: 4564 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
            • PING.EXE (PID: 6300 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
            • Client.exe (PID: 2508 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
              • cmd.exe (PID: 3640 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\O2JjN7gejzZT.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 1496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • chcp.com (PID: 6588 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                • PING.EXE (PID: 516 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                • Client.exe (PID: 3652 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                  • cmd.exe (PID: 3128 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\zXNfNAaZQ18l.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                    • conhost.exe (PID: 5628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                    • chcp.com (PID: 7092 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                    • PING.EXE (PID: 3780 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                    • Client.exe (PID: 5728 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                      • cmd.exe (PID: 3168 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\YWzMsGcZYfSk.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                        • conhost.exe (PID: 5524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                        • chcp.com (PID: 616 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                        • PING.EXE (PID: 6464 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                        • Client.exe (PID: 2292 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                          • cmd.exe (PID: 2636 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\BcVX8akEUPIc.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                            • conhost.exe (PID: 6300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                            • chcp.com (PID: 7120 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                            • PING.EXE (PID: 4824 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                            • Client.exe (PID: 3788 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                              • cmd.exe (PID: 2820 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2wKqvlgp23d2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                • conhost.exe (PID: 1292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                • chcp.com (PID: 2408 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                • PING.EXE (PID: 2232 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                                • Client.exe (PID: 4832 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                                  • cmd.exe (PID: 6720 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sqncKNCuACCi.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                    • conhost.exe (PID: 4084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                    • chcp.com (PID: 3924 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                    • PING.EXE (PID: 1372 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                                    • Client.exe (PID: 6180 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                                      • cmd.exe (PID: 2624 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\r9ftmQJc7N4i.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                        • conhost.exe (PID: 4332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                        • chcp.com (PID: 5744 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                        • PING.EXE (PID: 2968 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                                        • Client.exe (PID: 3452 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                                          • cmd.exe (PID: 4460 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\VlApCIMOlO5L.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                            • conhost.exe (PID: 4352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                            • chcp.com (PID: 2704 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                              • Conhost.exe (PID: 3608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                            • PING.EXE (PID: 5836 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                                            • Client.exe (PID: 2792 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                                              • cmd.exe (PID: 6192 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Q04w6t2xkN0a.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                                • conhost.exe (PID: 6292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                                • chcp.com (PID: 6200 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                                • PING.EXE (PID: 3032 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                                                • Client.exe (PID: 6164 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7F888B6CBD5062A7558EEA61EB9A9CA2)
                                                  • cmd.exe (PID: 5528 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\lPpSfrGjSDT5.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                                    • conhost.exe (PID: 5944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                                    • chcp.com (PID: 6120 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                                    • PING.EXE (PID: 6464 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "llordiWasHere-55715.portmap.host:55715;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "124c5996-13c0-46a2-804a-191042a109db", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAIXaYfZoCIPsDpKUPnOqtzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTIxNDA3NDkwOFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAmNv4AwGc2deuTPhlF91PiC5mS1wdYg37TLdFL1gNRVcSRHPoOIUNVRgwbAvtxBAA2aG59CB8qjoeKV21Q0hEiKxzvKLhQk+98tK8xreioswEmQXPPrujjnWyIDrozdDFbjYBFnNOUK7IepZYpXW02HLz6gP6rKau5a/wcp7xiThdcp8Ba8L0cPHfDlgrHx8WLkj+8kGCRUxeEgWYYPc2a6pN5hZeQgRY31jmNtYVAt7JQzFcjGhkP5fEm4aDifaR5hLN9ZfCHE2V16l4Yg45cDbodmQ4bWFL3Uo20/6ADbOE+ASUQ347MyWqeoaDVCkiPxE2NAUom4+AJJVDBNLmqsxKornIMG3XFFtTAeiYVwNqeDZ4fe5+YnZ0NLjSOPm4DYZotykKsZZ+RBJ5Q2pKKc4dnwoMa+890CTPd7ivMmgSYKSdukQTTUsczc0tS4SetaRkSpCcHQhS07xKd+65lZkABdNEPQkN4V+lU3B+9VZaXDebQDrHaMpQa3rVOYs0DG4J420cQ5gSUgjNUiIme2f3nvYSiMAsHvOz798ChCuTK5+f23LEP7rJA9+8yBe/G6P7XCTatwoXYjlEV2U1ZKkAnSSJ1TIQf7yfVQ0bT2By5VpThlzpODeI5p+CMAQMVsyOxBQcsalP2CqfL/wc/3FmJEVnGh9YrramS22WWAcCAwEAAaMyMDAwHQYDVR0OBBYEFLbdC8wNaCuvbyePDaHlRb+pIzsEMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAHi/FdNFmeIXieoGwyx3R/aL3J8RPwIZWyAvAme/s/cBiuxrdX4LrndawqfL8BahyPbtxcDLrON3IyY+VbZB4TsTSddzF/BEJlFJPvjjvrHLs3V/K3o7ni/lDOA9/PySUNTZB5roOt3vl7IANIL2ztmpsDWUgXahEVKDpN1i7yukuEC0U5XGG0TVbHGdpR9T6lMnf5t3giAYY/WydAlIglVqVEruijWfj1K2jBJwkgoptlt3nwFJ5FFTDLu78wCbhm/gZuS2A874fO/c2QgGnjUdTv1CpVZU5ED5teH03c/r38/eF36/QVMbXsIhbp5bki7LGceYovTIhi4EWHJItDkCSLxbkBEtKcGL6HiPFWxdd+jKQ19JZzpOxA73BaSO6QijmOcztsPVzzY1iNHgJD+jcCXuTztxgdOShfGW4rS88L6LCkYAiR03iUjO3T5EdaSf4EMCqK3hfjLI/J8UDG6CNu6gc/p8jyPITpkE6mbsiqR8DEoTYIc2Mzap7uSnikgiNEuh06p8gYZjNgn0cRhLVmbUXVPxIIyDVX8+n9aMhdCdou6QHMOciBI2TJ45lgscGuTeHCWdlWz/XeKZRDulU7dnkIb0S6yKLRwWuPsILfN0DtSGay1V2bNrIfZyhxKR04E2VUt5HeI+oO9GCNd6N3i+s0E2rsU6XU+LZUEo"}
SourceRuleDescriptionAuthorStrings
Test2.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Test2.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Test2.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ef12:$x1: Quasar.Common.Messages
      • 0x29f23b:$x1: Quasar.Common.Messages
      • 0x2ab832:$x4: Uninstalling... good bye :-(
      • 0x2ad027:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Test2.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aade4:$f1: FileZilla\recentservers.xml
      • 0x2aae24:$f2: FileZilla\sitemanager.xml
      • 0x2aae66:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab0b2:$b1: Chrome\User Data\
      • 0x2ab108:$b1: Chrome\User Data\
      • 0x2ab3e0:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4dc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd488:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab634:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6ee:$b5: YandexBrowser\User Data\
      • 0x2ab75c:$b5: YandexBrowser\User Data\
      • 0x2ab430:$s4: logins.json
      • 0x2ab166:$a1: username_value
      • 0x2ab184:$a2: password_value
      • 0x2ab470:$a3: encryptedUsername
      • 0x2fd3cc:$a3: encryptedUsername
      • 0x2ab494:$a4: encryptedPassword
      • 0x2fd3ea:$a4: encryptedPassword
      • 0x2fd368:$a5: httpRealm
      Test2.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab91c:$s3: Process already elevated.
      • 0x28ec11:$s4: get_PotentiallyVulnerablePasswords
      • 0x278ccd:$s5: GetKeyloggerLogsDirectory
      • 0x29e99a:$s5: GetKeyloggerLogsDirectory
      • 0x28ec34:$s6: set_PotentiallyVulnerablePasswords
      • 0x2feab6:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28ef12:$x1: Quasar.Common.Messages
          • 0x29f23b:$x1: Quasar.Common.Messages
          • 0x2ab832:$x4: Uninstalling... good bye :-(
          • 0x2ad027:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\SubDir\Client.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aade4:$f1: FileZilla\recentservers.xml
          • 0x2aae24:$f2: FileZilla\sitemanager.xml
          • 0x2aae66:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab0b2:$b1: Chrome\User Data\
          • 0x2ab108:$b1: Chrome\User Data\
          • 0x2ab3e0:$b2: Mozilla\Firefox\Profiles
          • 0x2ab4dc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd488:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab634:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab6ee:$b5: YandexBrowser\User Data\
          • 0x2ab75c:$b5: YandexBrowser\User Data\
          • 0x2ab430:$s4: logins.json
          • 0x2ab166:$a1: username_value
          • 0x2ab184:$a2: password_value
          • 0x2ab470:$a3: encryptedUsername
          • 0x2fd3cc:$a3: encryptedUsername
          • 0x2ab494:$a4: encryptedPassword
          • 0x2fd3ea:$a4: encryptedPassword
          • 0x2fd368:$a5: httpRealm
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab91c:$s3: Process already elevated.
          • 0x28ec11:$s4: get_PotentiallyVulnerablePasswords
          • 0x278ccd:$s5: GetKeyloggerLogsDirectory
          • 0x29e99a:$s5: GetKeyloggerLogsDirectory
          • 0x28ec34:$s6: set_PotentiallyVulnerablePasswords
          • 0x2feab6:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000007.00000002.2193762959.000000000315E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000031.00000002.3118100690.0000000002E8E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              00000012.00000002.2421403593.00000000037DE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                00000027.00000002.2892307088.0000000002CDE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  0000000D.00000002.2305729866.000000000315E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                    Click to see the 35 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.Test2.exe.460000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                      0.0.Test2.exe.460000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        0.0.Test2.exe.460000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                        • 0x28ef12:$x1: Quasar.Common.Messages
                        • 0x29f23b:$x1: Quasar.Common.Messages
                        • 0x2ab832:$x4: Uninstalling... good bye :-(
                        • 0x2ad027:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                        0.0.Test2.exe.460000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                        • 0x2aade4:$f1: FileZilla\recentservers.xml
                        • 0x2aae24:$f2: FileZilla\sitemanager.xml
                        • 0x2aae66:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                        • 0x2ab0b2:$b1: Chrome\User Data\
                        • 0x2ab108:$b1: Chrome\User Data\
                        • 0x2ab3e0:$b2: Mozilla\Firefox\Profiles
                        • 0x2ab4dc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2fd488:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2ab634:$b4: Opera Software\Opera Stable\Login Data
                        • 0x2ab6ee:$b5: YandexBrowser\User Data\
                        • 0x2ab75c:$b5: YandexBrowser\User Data\
                        • 0x2ab430:$s4: logins.json
                        • 0x2ab166:$a1: username_value
                        • 0x2ab184:$a2: password_value
                        • 0x2ab470:$a3: encryptedUsername
                        • 0x2fd3cc:$a3: encryptedUsername
                        • 0x2ab494:$a4: encryptedPassword
                        • 0x2fd3ea:$a4: encryptedPassword
                        • 0x2fd368:$a5: httpRealm
                        0.0.Test2.exe.460000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                        • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                        • 0x2ab91c:$s3: Process already elevated.
                        • 0x28ec11:$s4: get_PotentiallyVulnerablePasswords
                        • 0x278ccd:$s5: GetKeyloggerLogsDirectory
                        • 0x29e99a:$s5: GetKeyloggerLogsDirectory
                        • 0x28ec34:$s6: set_PotentiallyVulnerablePasswords
                        • 0x2feab6:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
                        No Sigma rule has matched
                        No Suricata rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Test2.exeAvira: detected
                        Source: llordiWasHere-55715.portmap.hostAvira URL Cloud: Label: malware
                        Source: C:\Users\user\AppData\Local\Temp\Q04w6t2xkN0a.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\2wKqvlgp23d2.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                        Source: C:\Users\user\AppData\Local\Temp\YWzMsGcZYfSk.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\BcVX8akEUPIc.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\zXNfNAaZQ18l.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\HKybYN00EBOw.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\sqncKNCuACCi.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\lPpSfrGjSDT5.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\VlApCIMOlO5L.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\r9ftmQJc7N4i.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: C:\Users\user\AppData\Local\Temp\O2JjN7gejzZT.batAvira: detection malicious, Label: BAT/Delbat.C
                        Source: Test2.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "llordiWasHere-55715.portmap.host:55715;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "124c5996-13c0-46a2-804a-191042a109db", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAIXaYfZoCIPsDpKUPnOqtzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTIxNDA3NDkwOFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAmNv4AwGc2deuTPhlF91PiC5mS1wdYg37TLdFL1gNRVcSRHPoOIUNVRgwbAvtxBAA2aG59CB8qjoeKV21Q0hEiKxzvKLhQk+98tK8xreioswEmQXPPrujjnWyIDrozdDFbjYBFnNOUK7IepZYpXW02HLz6gP6rKau5a/wcp7xiThdcp8Ba8L0cPHfDlgrHx8WLkj+8kGCRUxeEgWYYPc2a6pN5hZeQgRY31jmNtYVAt7JQzFcjGhkP5fEm4aDifaR5hLN9ZfCHE2V16l4Yg45cDbodmQ4bWFL3Uo20/6ADbOE+ASUQ347MyWqeoaDVCkiPxE2NAUom4+AJJVDBNLmqsxKornIMG3XFFtTAeiYVwNqeDZ4fe5+YnZ0NLjSOPm4DYZotykKsZZ+RBJ5Q2pKKc4dnwoMa+890CTPd7ivMmgSYKSdukQTTUsczc0tS4SetaRkSpCcHQhS07xKd+65lZkABdNEPQkN4V+lU3B+9VZaXDebQDrHaMpQa3rVOYs0DG4J420cQ5gSUgjNUiIme2f3nvYSiMAsHvOz798ChCuTK5+f23LEP7rJA9+8yBe/G6P7XCTatwoXYjlEV2U1ZKkAnSSJ1TIQf7yfVQ0bT2By5VpThlzpODeI5p+CMAQMVsyOxBQcsalP2CqfL/wc/3FmJEVnGh9YrramS22WWAcCAwEAAaMyMDAwHQYDVR0OBBYEFLbdC8wNaCuvbyePDaHlRb+pIzsEMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAHi/FdNFmeIXieoGwyx3R/aL3J8RPwIZWyAvAme/s/cBiuxrdX4LrndawqfL8BahyPbtxcDLrON3IyY+VbZB4TsTSddzF/BEJlFJPvjjvrHLs3V/K3o7ni/lDOA9/PySUNTZB5roOt3vl7IANIL2ztmpsDWUgXahEVKDpN1i7yukuEC0U5XGG0TVbHGdpR9T6lMnf5t3giAYY/WydAlIglVqVEruijWfj1K2jBJwkgoptlt3nwFJ5FFTDLu78wCbhm/gZuS2A874fO/c2QgGnjUdTv1CpVZU5ED5teH03c/r38/eF36/QVMbXsIhbp5bki7LGceYovTIhi4EWHJItDkCSLxbkBEtKcGL6HiPFWxdd+jKQ19JZzpOxA73BaSO6QijmOcztsPVzzY1iNHgJD+jcCXuTztxgdOShfGW4rS88L6LCkYAiR03iUjO3T5EdaSf4EMCqK3hfjLI/J8UDG6CNu6gc/p8jyPITpkE6mbsiqR8DEoTYIc2Mzap7uSnikgiNEuh06p8gYZjNgn0cRhLVmbUXVPxIIyDVX8+n9aMhdCdou6QHMOciBI2TJ45lgscGuTeHCWdlWz/XeKZRDulU7dnkIb0S6yKLRwWuPsILfN0DtSGay1V2bNrIfZyhxKR04E2VUt5HeI+oO9GCNd6N3i+s0E2rsU6XU+LZUEo"}
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeReversingLabs: Detection: 78%
                        Source: Test2.exeVirustotal: Detection: 82%Perma Link
                        Source: Test2.exeReversingLabs: Detection: 78%
                        Source: Yara matchFile source: Test2.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000007.00000002.2193762959.000000000315E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000031.00000002.3118100690.0000000002E8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2421403593.00000000037DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2892307088.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2305729866.000000000315E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2421403593.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000002.2653674828.00000000029AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.3354829409.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2193762959.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2768663751.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000036.00000002.3233179129.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002C.00000002.3002789942.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000036.00000002.3233179129.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000031.00000002.3118100690.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2034739793.0000000000780000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2305729866.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2768663751.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000002.2653674828.00000000026C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000002.2535791887.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2034418399.0000000000462000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002C.00000002.3002789942.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2084085399.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2892307088.00000000029F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.3354829409.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000002.2535791887.0000000002F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2060291190.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2062421739.000000001B382000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Test2.exe PID: 4196, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 1352, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3648, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2508, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 5728, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2292, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3788, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 4832, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6180, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3452, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6164, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeJoe Sandbox ML: detected
                        Source: Test2.exeJoe Sandbox ML: detected
                        Source: Test2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Test2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: llordiWasHere-55715.portmap.host
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: Yara matchFile source: Test2.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        Source: unknownDNS traffic detected: query: llordiWasHere-55715.portmap.host replaycode: Name error (3)
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: llordiWasHere-55715.portmap.host
                        Source: Test2.exe, 00000000.00000002.2060291190.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000002.00000002.2084085399.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000007.00000002.2193762959.000000000315E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000000D.00000002.2305729866.000000000315E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000012.00000002.2421403593.00000000037DE000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000018.00000002.2535791887.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000001D.00000002.2653674828.00000000029AE000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000022.00000002.2768663751.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000027.00000002.2892307088.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000002C.00000002.3002789942.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000031.00000002.3118100690.0000000002E8E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000036.00000002.3233179129.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000003B.00000002.3354829409.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: Test2.exe, Client.exe.0.drString found in binary or memory: https://api.ipify.org/
                        Source: Test2.exe, Client.exe.0.drString found in binary or memory: https://ipwho.is/
                        Source: Test2.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                        Source: Test2.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                        Source: Test2.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: Test2.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000007.00000002.2193762959.000000000315E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000031.00000002.3118100690.0000000002E8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2421403593.00000000037DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2892307088.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2305729866.000000000315E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2421403593.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000002.2653674828.00000000029AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.3354829409.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2193762959.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2768663751.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000036.00000002.3233179129.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002C.00000002.3002789942.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000036.00000002.3233179129.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000031.00000002.3118100690.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2034739793.0000000000780000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2305729866.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2768663751.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000002.2653674828.00000000026C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000002.2535791887.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2034418399.0000000000462000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002C.00000002.3002789942.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2084085399.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2892307088.00000000029F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.3354829409.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000002.2535791887.0000000002F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2060291190.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2062421739.000000001B382000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Test2.exe PID: 4196, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 1352, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3648, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2508, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 5728, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2292, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3788, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 4832, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6180, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3452, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6164, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                        System Summary

                        barindex
                        Source: Test2.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: Test2.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: Test2.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF848F095F22_2_00007FF848F095F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF849178A612_2_00007FF849178A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF849174D502_2_00007FF849174D50
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF849175BE12_2_00007FF849175BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF8491793C12_2_00007FF8491793C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF84917A7CD2_2_00007FF84917A7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF8491710D12_2_00007FF8491710D1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF848F295F27_2_00007FF848F295F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF849198A617_2_00007FF849198A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF849194DC67_2_00007FF849194DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF849195BE17_2_00007FF849195BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF8491993C17_2_00007FF8491993C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF84919A7CD7_2_00007FF84919A7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF8491910D17_2_00007FF8491910D1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 18_2_00007FF849198A6118_2_00007FF849198A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 18_2_00007FF849195BE118_2_00007FF849195BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 18_2_00007FF8491993C118_2_00007FF8491993C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 18_2_00007FF849194DC618_2_00007FF849194DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 18_2_00007FF84919A7CD18_2_00007FF84919A7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF848F395F224_2_00007FF848F395F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF848F394F224_2_00007FF848F394F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF8491A8A6124_2_00007FF8491A8A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF8491A4DC624_2_00007FF8491A4DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF8491A5BE124_2_00007FF8491A5BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF8491A93C124_2_00007FF8491A93C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF8491AA7CD24_2_00007FF8491AA7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF8491A10D124_2_00007FF8491A10D1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 29_2_00007FF8491A8A6129_2_00007FF8491A8A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 29_2_00007FF8491A5BE129_2_00007FF8491A5BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 29_2_00007FF8491A93C129_2_00007FF8491A93C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 29_2_00007FF8491A4DC629_2_00007FF8491A4DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 29_2_00007FF8491AA7CD29_2_00007FF8491AA7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 34_2_00007FF8491A8A6134_2_00007FF8491A8A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 34_2_00007FF8491A5BE134_2_00007FF8491A5BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 34_2_00007FF8491A93C134_2_00007FF8491A93C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 34_2_00007FF8491A4DC634_2_00007FF8491A4DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 34_2_00007FF8491AA7CD34_2_00007FF8491AA7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF848F495F239_2_00007FF848F495F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF848F494F239_2_00007FF848F494F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF8491B8A6139_2_00007FF8491B8A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF8491B4DC639_2_00007FF8491B4DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF8491B5BE139_2_00007FF8491B5BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF8491B93C139_2_00007FF8491B93C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF8491BA7CD39_2_00007FF8491BA7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF8491B11F239_2_00007FF8491B11F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF8491B10D139_2_00007FF8491B10D1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 44_2_00007FF8491B8A6144_2_00007FF8491B8A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 44_2_00007FF8491B5BE144_2_00007FF8491B5BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 44_2_00007FF8491B93C144_2_00007FF8491B93C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 44_2_00007FF8491B4DC644_2_00007FF8491B4DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 44_2_00007FF8491BA7CD44_2_00007FF8491BA7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 49_2_00007FF8491A8A6149_2_00007FF8491A8A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 49_2_00007FF8491A5BE149_2_00007FF8491A5BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 49_2_00007FF8491A93C149_2_00007FF8491A93C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 49_2_00007FF8491A4DC649_2_00007FF8491A4DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 49_2_00007FF8491AA7CD49_2_00007FF8491AA7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 54_2_00007FF849178A6154_2_00007FF849178A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 54_2_00007FF849174D5054_2_00007FF849174D50
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 54_2_00007FF849175BE154_2_00007FF849175BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 54_2_00007FF8491793C154_2_00007FF8491793C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 54_2_00007FF84917A7CD54_2_00007FF84917A7CD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 59_2_00007FF8491A8A6159_2_00007FF8491A8A61
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 59_2_00007FF8491A5BE159_2_00007FF8491A5BE1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 59_2_00007FF8491A93C159_2_00007FF8491A93C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 59_2_00007FF8491A4DC659_2_00007FF8491A4DC6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 59_2_00007FF8491AA7CD59_2_00007FF8491AA7CD
                        Source: Test2.exe, 00000000.00000000.2034739793.0000000000780000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Test2.exe
                        Source: Test2.exe, 00000000.00000002.2062421739.000000001B382000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Test2.exe
                        Source: Test2.exeBinary or memory string: OriginalFilenameClient.exe. vs Test2.exe
                        Source: Test2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Test2.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: Test2.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: Test2.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@122/27@23/0
                        Source: C:\Users\user\Desktop\Test2.exeFile created: C:\Users\user\AppData\Roaming\SubDirJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6292:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5628:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5944:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\124c5996-13c0-46a2-804a-191042a109db
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5228:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1496:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6300:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1292:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4084:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7120:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5524:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4352:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4332:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile created: C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.batJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.bat" "
                        Source: Test2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Test2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Test2.exeVirustotal: Detection: 82%
                        Source: Test2.exeReversingLabs: Detection: 78%
                        Source: Test2.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                        Source: C:\Users\user\Desktop\Test2.exeFile read: C:\Users\user\Desktop\Test2.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\Test2.exe "C:\Users\user\Desktop\Test2.exe"
                        Source: C:\Users\user\Desktop\Test2.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HKybYN00EBOw.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\O2JjN7gejzZT.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\zXNfNAaZQ18l.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\YWzMsGcZYfSk.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\BcVX8akEUPIc.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2wKqvlgp23d2.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sqncKNCuACCi.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\r9ftmQJc7N4i.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\VlApCIMOlO5L.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Q04w6t2xkN0a.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\lPpSfrGjSDT5.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\chcp.comProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Test2.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.bat" "Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HKybYN00EBOw.bat" "Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\O2JjN7gejzZT.bat" "Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\zXNfNAaZQ18l.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\YWzMsGcZYfSk.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\BcVX8akEUPIc.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2wKqvlgp23d2.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sqncKNCuACCi.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\r9ftmQJc7N4i.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\VlApCIMOlO5L.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Q04w6t2xkN0a.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\lPpSfrGjSDT5.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                        Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mrmcorer.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: thumbcache.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: Test2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Test2.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: Test2.exeStatic file information: File size 3266048 > 1048576
                        Source: Test2.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c600
                        Source: Test2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF848F07569 push ebx; iretd 2_2_00007FF848F0756A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF848F08163 push ebx; ret 2_2_00007FF848F0816A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 2_2_00007FF849172A42 push eax; ret 2_2_00007FF849172BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF848F28163 push ebx; ret 7_2_00007FF848F2816A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF848F27569 push ebx; iretd 7_2_00007FF848F2756A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 7_2_00007FF849192A42 push eax; ret 7_2_00007FF849192BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 18_2_00007FF849192A42 push eax; ret 18_2_00007FF849192BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF848F38163 push ebx; ret 24_2_00007FF848F3816A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF848F37569 push ebx; iretd 24_2_00007FF848F3756A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 24_2_00007FF8491A2B90 push eax; ret 24_2_00007FF8491A2BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 29_2_00007FF8491A2B90 push eax; ret 29_2_00007FF8491A2BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 34_2_00007FF8491A2B90 push eax; ret 34_2_00007FF8491A2BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF848F48163 push ebx; ret 39_2_00007FF848F4816A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF848F47569 push ebx; iretd 39_2_00007FF848F4756A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 39_2_00007FF8491B2A42 push eax; ret 39_2_00007FF8491B2BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 44_2_00007FF8491B2A42 push eax; ret 44_2_00007FF8491B2BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 49_2_00007FF8491A2B90 push eax; ret 49_2_00007FF8491A2BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 54_2_00007FF849172A42 push eax; ret 54_2_00007FF849172BFC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 59_2_00007FF8491A2B90 push eax; ret 59_2_00007FF8491A2BFC
                        Source: C:\Users\user\Desktop\Test2.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to dropped file

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\Test2.exeFile opened: C:\Users\user\Desktop\Test2.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | delete
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Users\user\Desktop\Test2.exeMemory allocated: 10C0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeMemory allocated: 1AA70000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1800000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B3C0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1110000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1AE40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 12F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1AE40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 17D0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B4C0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1400000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1AEE0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: A80000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1A690000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1090000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1AC80000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: D10000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1A9C0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: C60000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1A7F0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: EB0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1AB70000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: FE0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1AB10000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1790000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B5D0000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\Test2.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\Desktop\Test2.exe TID: 5036Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 6488Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 5668Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 7060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 6444Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 5792Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 572Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 2352Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 3228Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 4124Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 940Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 5564Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 5776Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                        Source: C:\Users\user\Desktop\Test2.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                        Source: Client.exe, 00000036.00000002.3280560936.000000001B6EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp
                        Source: Client.exe, 0000000D.00000002.2316579347.000000001B950000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000012.00000002.2432299693.000000001C0D0000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 0000003B.00000002.3387715618.000000001BEE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Client.exe, 0000003B.00000002.3390622435.000000001C153000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: Client.exe, 00000002.00000002.2089954592.000000001BD34000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000007.00000002.2201234655.000000001B8EF000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 0000000D.00000002.2316579347.000000001B950000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000018.00000002.2552531345.000000001B91C000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 0000001D.00000002.2676671848.000000001B212000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000022.00000002.2784995626.000000001B5AD000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000027.00000002.2917004821.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 0000002C.00000002.3022842266.000000001B105000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000031.00000002.3145957903.000000001B4AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\Test2.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                        Source: C:\Users\user\Desktop\Test2.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Users\user\Desktop\Test2.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.bat" "Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HKybYN00EBOw.bat" "Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\O2JjN7gejzZT.bat" "Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\zXNfNAaZQ18l.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\YWzMsGcZYfSk.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\BcVX8akEUPIc.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2wKqvlgp23d2.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sqncKNCuACCi.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\r9ftmQJc7N4i.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\VlApCIMOlO5L.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Q04w6t2xkN0a.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\lPpSfrGjSDT5.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                        Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\Test2.exeQueries volume information: C:\Users\user\Desktop\Test2.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
                        Source: C:\Users\user\Desktop\Test2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: Test2.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000007.00000002.2193762959.000000000315E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000031.00000002.3118100690.0000000002E8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2421403593.00000000037DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2892307088.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2305729866.000000000315E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2421403593.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000002.2653674828.00000000029AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.3354829409.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2193762959.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2768663751.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000036.00000002.3233179129.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002C.00000002.3002789942.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000036.00000002.3233179129.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000031.00000002.3118100690.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2034739793.0000000000780000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2305729866.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2768663751.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000002.2653674828.00000000026C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000002.2535791887.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2034418399.0000000000462000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002C.00000002.3002789942.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2084085399.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2892307088.00000000029F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.3354829409.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000002.2535791887.0000000002F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2060291190.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2062421739.000000001B382000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Test2.exe PID: 4196, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 1352, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3648, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2508, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 5728, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2292, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3788, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 4832, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6180, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3452, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6164, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Test2.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Test2.exe.460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000007.00000002.2193762959.000000000315E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000031.00000002.3118100690.0000000002E8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2421403593.00000000037DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2892307088.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2305729866.000000000315E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2421403593.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000002.2653674828.00000000029AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.3354829409.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2193762959.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2768663751.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000036.00000002.3233179129.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002C.00000002.3002789942.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000036.00000002.3233179129.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000031.00000002.3118100690.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2034739793.0000000000780000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2305729866.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2768663751.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000002.2653674828.00000000026C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000002.2535791887.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2034418399.0000000000462000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002C.00000002.3002789942.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2084085399.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2892307088.00000000029F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.3354829409.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000002.2535791887.0000000002F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2060291190.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2062421739.000000001B382000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Test2.exe PID: 4196, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 1352, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3648, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2508, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 5728, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2292, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3788, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 4832, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6180, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3452, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6164, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information1
                        Scripting
                        Valid Accounts2
                        Command and Scripting Interpreter
                        1
                        Scripting
                        11
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping11
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        LSASS Memory31
                        Virtualization/Sandbox Evasion
                        Remote Desktop ProtocolData from Removable Media1
                        Non-Application Layer Protocol
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                        Virtualization/Sandbox Evasion
                        Security Account Manager1
                        Remote System Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive11
                        Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                        Process Injection
                        NTDS1
                        System Network Configuration Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Hidden Files and Directories
                        LSA Secrets1
                        File and Directory Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Obfuscated Files or Information
                        Cached Domain Credentials12
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581170 Sample: Test2.exe Startdate: 27/12/2024 Architecture: WINDOWS Score: 100 79 llordiWasHere-55715.portmap.host 2->79 85 Found malware configuration 2->85 87 Malicious sample detected (through community Yara rule) 2->87 89 Antivirus detection for URL or domain 2->89 91 8 other signatures 2->91 15 Test2.exe 5 2->15         started        signatures3 process4 file5 75 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 15->75 dropped 77 C:\Users\user\AppData\Local\...\Test2.exe.log, CSV 15->77 dropped 81 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->81 19 Client.exe 10 15->19         started        signatures6 process7 file8 67 C:\Users\user\AppData\...\Shpa9OKN8GrQ.bat, DOS 19->67 dropped 93 Antivirus detection for dropped file 19->93 95 Multi AV Scanner detection for dropped file 19->95 97 Machine Learning detection for dropped file 19->97 99 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->99 23 cmd.exe 1 19->23         started        signatures9 process10 signatures11 105 Uses ping.exe to sleep 23->105 107 Uses ping.exe to check the status of other devices and networks 23->107 26 Client.exe 9 23->26         started        30 conhost.exe 23->30         started        32 PING.EXE 1 23->32         started        34 chcp.com 1 23->34         started        process12 file13 73 C:\Users\user\AppData\...\HKybYN00EBOw.bat, DOS 26->73 dropped 111 Hides that the sample has been downloaded from the Internet (zone.identifier) 26->111 36 cmd.exe 1 26->36         started        signatures14 process15 signatures16 101 Uses ping.exe to sleep 36->101 39 Client.exe 9 36->39         started        43 conhost.exe 36->43         started        45 PING.EXE 1 36->45         started        47 chcp.com 1 36->47         started        process17 file18 71 C:\Users\user\AppData\...\O2JjN7gejzZT.bat, DOS 39->71 dropped 109 Hides that the sample has been downloaded from the Internet (zone.identifier) 39->109 49 cmd.exe 39->49         started        signatures19 process20 signatures21 83 Uses ping.exe to sleep 49->83 52 Client.exe 49->52         started        56 conhost.exe 49->56         started        58 chcp.com 49->58         started        60 PING.EXE 49->60         started        process22 file23 69 C:\Users\user\AppData\...\zXNfNAaZQ18l.bat, DOS 52->69 dropped 103 Hides that the sample has been downloaded from the Internet (zone.identifier) 52->103 62 cmd.exe 52->62         started        signatures24 process25 signatures26 113 Uses ping.exe to sleep 62->113 65 conhost.exe 62->65         started        process27

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Test2.exe83%VirustotalBrowse
                        Test2.exe79%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        Test2.exe100%AviraHEUR/AGEN.1307453
                        Test2.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\Temp\Q04w6t2xkN0a.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\2wKqvlgp23d2.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe100%AviraHEUR/AGEN.1307453
                        C:\Users\user\AppData\Local\Temp\YWzMsGcZYfSk.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\BcVX8akEUPIc.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\zXNfNAaZQ18l.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\HKybYN00EBOw.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\sqncKNCuACCi.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\lPpSfrGjSDT5.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\VlApCIMOlO5L.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\r9ftmQJc7N4i.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Local\Temp\O2JjN7gejzZT.bat100%AviraBAT/Delbat.C
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe79%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        llordiWasHere-55715.portmap.host100%Avira URL Cloudmalware
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        llordiWasHere-55715.portmap.host
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          llordiWasHere-55715.portmap.hosttrue
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/Test2.exe, Client.exe.0.drfalse
                            high
                            https://stackoverflow.com/q/14436606/23354Test2.exe, Client.exe.0.drfalse
                              high
                              https://stackoverflow.com/q/2152978/23354sCannotTest2.exe, Client.exe.0.drfalse
                                high
                                https://ipwho.is/Test2.exe, Client.exe.0.drfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTest2.exe, 00000000.00000002.2060291190.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000002.00000002.2084085399.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000007.00000002.2193762959.000000000315E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000000D.00000002.2305729866.000000000315E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000012.00000002.2421403593.00000000037DE000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000018.00000002.2535791887.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000001D.00000002.2653674828.00000000029AE000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000022.00000002.2768663751.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000027.00000002.2892307088.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000002C.00000002.3002789942.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000031.00000002.3118100690.0000000002E8E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000036.00000002.3233179129.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000003B.00000002.3354829409.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://stackoverflow.com/q/11564914/23354;Test2.exe, Client.exe.0.drfalse
                                      high
                                      No contacted IP infos
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1581170
                                      Start date and time:2024-12-27 06:46:14 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 11m 22s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:74
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Test2.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@122/27@23/0
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 266
                                      • Number of non-executed functions: 5
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe
                                      • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      No simulations
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:CSV text
                                      Category:dropped
                                      Size (bytes):2134
                                      Entropy (8bit):5.369466463144928
                                      Encrypted:false
                                      SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkafHKWA1eXrHKlT4NJH3HtbpHKs:iq+wmj0qCYqGSI6oPtzHeqKkGqhA7qZe
                                      MD5:034569213C23E9CD691260B5AEACED74
                                      SHA1:8D6380383DF7F23E39D50C521AA30DF076BF9ED4
                                      SHA-256:D4E8B779A407DB36AF3B30CE1FA53DF7D4FE500571FE475C8D5C889BB09B37DC
                                      SHA-512:1380AA70E23D74651D3EDDEAE4B2972B867BF5A1DC436F21C6A883E475DFFF015257AACCF18442AFD52D85B1263E34D8458E4E900E17166EFE74F577BD759D95
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                      Process:C:\Users\user\Desktop\Test2.exe
                                      File Type:CSV text
                                      Category:dropped
                                      Size (bytes):1281
                                      Entropy (8bit):5.370111951859942
                                      Encrypted:false
                                      SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                      MD5:12C61586CD59AA6F2A21DF30501F71BD
                                      SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                      SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                      SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                      Malicious:true
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.3190374254404125
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fL9GcH:d5r+uVEOCDEmH3MdH
                                      MD5:8F1ED928865715216A32B346615E944A
                                      SHA1:8B92E6CE509757D3A39508BA36EDE829C16D348D
                                      SHA-256:12C3A561BEE3ED8C1C8F46D63D5EDACB35FFD96B83970ED39FD1B7588E8DEB5E
                                      SHA-512:4BF410F27B72846B3EFB3500274C1094F20FD8BC36FAC528C881AF346CE778A11702A85155E182F8DC1FE9746763E225E2B4069B618320B45D6B36CB38362D23
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\2wKqvlgp23d2.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.3156950772859854
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fxf:d5r+uVEOCDEmH3MB
                                      MD5:A8D8FF11066E3AFC4C30D3F2E1241885
                                      SHA1:C8927E317E10F90206B776328E3FD66A70A0261F
                                      SHA-256:F14B68B39616E04D6BDBD16B9B38E4756817916795F6839144E50B5AF6CAE9B0
                                      SHA-512:564CCE78A0FB939661A0BC3226284E92EF7314D127F41786DA7F15E7C74DC31F54CBFA54BDC4C2470B7F273CD33E8D583F1881BC39797DFEEFD3E489624DA002
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\BcVX8akEUPIc.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.322759794284757
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fReFn:d5r+uVEOCDEmH3MpeF
                                      MD5:D6FB6C8C256D3DE89D2D9E583713385B
                                      SHA1:1076B2425948E863A965419D4C8818EB45A1EFD3
                                      SHA-256:2892F69DC2AF5987255551991A4E993EB297F1A3419F4FC5785723414248C0D1
                                      SHA-512:5EFD990AD85065EB2A48CBDEFC2DCE03B7FBAF8E76B31F0A5CAE021C5722B0532D5020EF8E8849E61E28F5F1D0DD0D38081C749564C5B8D77CCFD1EDAE85E81A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\HKybYN00EBOw.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.327160198775398
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fqykRH:d5r+uVEOCDEmH3MyTH
                                      MD5:3C1BE3BFE8D53959EF5A03F5CFB3AC11
                                      SHA1:5B16F9530715A5253BEA1AB330980A87C3630A38
                                      SHA-256:4C0AFE3111ECD25D3E309E86EA25712A5BE747376792C6CEDBB12A90BFD336B3
                                      SHA-512:2EE3C2AA31D501BF7CBD1FF622DDBC18740714FFFBBF6E28860220B4672585FEF46BDE88543B079FE884A54A90935D8D310C12F4A09200306543458835D0A8C1
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\O2JjN7gejzZT.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.306325909726014
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fpauK:d5r+uVEOCDEmH3MBfK
                                      MD5:88DEEFC115AA416C483669C22F62C7D0
                                      SHA1:13888A18E450EFC89975BB6C5CC6203F55E18B4F
                                      SHA-256:45DEB95449C155950F24E66B7856C68EB29BAD5299597DF0AA2D8F191FFA15F1
                                      SHA-512:169192BD85E87C028D271E623847404F44BF09CBEE160A9B3ADEF5730437A7D193037E139383B11FA2926B05351EBB6F8D4F8D00FEB09FBB7C557A9C02F072EA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\Q04w6t2xkN0a.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.29266680459552
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fK4H:d5r+uVEOCDEmH3Mr
                                      MD5:E3023EB2EBE1DD3C4FF4FBE4C9E06093
                                      SHA1:7747726F95640B9B73D44E32D304552B76534CE6
                                      SHA-256:EFF321F756FC334CFCCAD1116E588906231BD92C5C631F478AA676F42CC6DC6F
                                      SHA-512:7A644F5793A7A585A6E42476FB041FC76BFDCE0164815E22B3560DDFD08DF7C06EE4636F964F166C79030BA907034C90148CFF25FA46B25D66F1522A53EE8809
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.252486052786029
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fp:d5r+uVEOCDEmH3Mx
                                      MD5:BB774B0593FC0AB62DE4E9C5B03208EB
                                      SHA1:8627C451779D7BECC570F9F0836FA1B041BDC107
                                      SHA-256:42EE3E2111AEE2666B9ABAD96845DF863F1DD238A440D2CE85071CC77B4A9B4C
                                      SHA-512:BB7A5EBB6B6724D289C7AE5BE510B2E6C4F4FE1F7192451719806C641A28D8E6AA71DA1234565F065D2C6AEA7766AD5A6FA792E4156D345CEAC18C5EC1A77ADD
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\VlApCIMOlO5L.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.318159179363655
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923f60:d5r+uVEOCDEmH3MS0
                                      MD5:BF2A49006105B273E1D2BB37FB195BD7
                                      SHA1:AF9B87591523A80E2F725098B7E77379F848FCEE
                                      SHA-256:434A6AA9FAC4AE5A23A28C07FC36AADFC134E28C3401DBB65390CA97906783EB
                                      SHA-512:D5CDA9C99225E514602B79BA596429F167C22A064CE9475351048669B0B2A677F61772206992B42C93822D41E19D052417F3757936927F470F09BEFCC9F3E28C
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\YWzMsGcZYfSk.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.261621157497829
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923ftRLYH:d5r+uVEOCDEmH3M6
                                      MD5:D789DAA5C5DF84469ADCFE7E2D30F22C
                                      SHA1:EFFABF6BFD140B6EA72D598780328DD002BDDE16
                                      SHA-256:ED89F71BA3260D8A4D5C84A4FCE3A4BC3B2760EA4EF39BE19CA4A76FF70BE96C
                                      SHA-512:3EBDD642853F7D7BC776D7271B7C672807885D8BA9E7DBE4C80129B40C361568BDD038C5BB9C6E92ED8B14C87C90DC5A2A7BC2E35AB0C613340C3A05DCEEA4AA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\lPpSfrGjSDT5.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.296397234455441
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fO:d5r+uVEOCDEmH3MW
                                      MD5:F4A29D4565A23B10FF595B7F2F8FB033
                                      SHA1:87CB4074D40A36E70BC3C171B1BA58129BC83AA7
                                      SHA-256:C6BA5726AC73798970DD1039D1134D51007E5E864806109D1373933E42775082
                                      SHA-512:781381FCF53019F2FF96614989874DA719DE07CF38D68C4B042D685B68F09CB5D1ACBF2BD19A867BE95275E012D37012CAFD62C2FB27B3C551E05F0AC6A2CFC7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\r9ftmQJc7N4i.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.232158373377831
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fFyKq:d5r+uVEOCDEmH3MAKq
                                      MD5:E4AD8038157B7C0EF8CC9758768C6536
                                      SHA1:4732DFF2DCB4807A0EFA3AB8CB56DD9A195CC4EF
                                      SHA-256:2AA053749DDF02F2CB62F5445E5D96260DB7534F5C54187C2CBDF3D49CA83612
                                      SHA-512:23E4FCA4A5E286C7ACFFB5A1825BF204C720B23BE144A164C1CD4E05F5DA2A64A93F73CDEAA8DEAFB057126CEBDAA1713236098383E73D8052EF56D7C4481680
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\sqncKNCuACCi.bat"
                                      Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):209
                                      Entropy (8bit):5.296847065098435
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE19aZ53ZNSKOZG1923fk:d5r+uVEOCDEmH3MM
                                      MD5:020E5C2662A0781307AA3DD518174B1C
                                      SHA1:2E3745BD228F05FC2E7A671B228498E3F8881E35
                                      SHA-256:C94B8E4CB2EEB49556C03A019175AA1AAC17C10DC1F909CAEB9E7E6C80063495
                                      SHA-512:A9CE805DC7B64E98B594D9A5CE6F2DAD1A81A8144E24D98166F5028A317719FBD9B5EC91137DC19CBACD7FCCFE5683A8A27870F684A26AFD7AC346C87D9C9F1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\SubDir\Client.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\zXNfNAaZQ18l.bat"
                                      Process:C:\Users\user\Desktop\Test2.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):3266048
                                      Entropy (8bit):6.0751351573376215
                                      Encrypted:false
                                      SSDEEP:49152:/v2lL26AaNeWgPhlmVqvMQ7XSKKQSYmzwXoGdVTHHB72eh2NT:/v2L26AaNeWgPhlmVqkQ7XSKKQSq
                                      MD5:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      SHA1:2ACFB5C3E7B8E569EA52397154B9B3FFB44E7D87
                                      SHA-256:864BEC690DA391F258DE447606AC18BAA79672B665BA321A4DA67ED59D567CAD
                                      SHA-512:7DA70E844E0FCE4B4BBC70DB89503B95B6514CABF9CE9CF66FED643F6C11AAFC5E7A8F385B5D16F7FA802CC47C9200BF486030834551D14C55078307EF7E93D8
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                      • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                      • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                      • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 79%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1.........>.1.. ........@.. .......................@2...........@...................................1.K.....2...................... 2...................................................... ............... ..H............text...D.1.. ....1................. ..`.rsrc.........2.......1.............@..@.reloc....... 2.......1.............@..B................ .1.....H........................k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                      Process:C:\Windows\System32\PING.EXE
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):502
                                      Entropy (8bit):4.630609828667227
                                      Encrypted:false
                                      SSDEEP:12:PF5pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:3dUOAokItULVDv
                                      MD5:AD895E21D0D519A86FAF4781C06E40AD
                                      SHA1:E1117E8118B19001664288AB0C32E32CD0FB6C6D
                                      SHA-256:24B06C18C14E5F86DAB472772B3903A77CBE9549B3F4C4AAED1E86B509A1D44B
                                      SHA-512:617AE584FB3CA7D1BD5035C80B003F4A3BD2520CA12A1A3031F136D17DE418ECEC754BCC054B23EC19CABACEE6D8B5EEA79244B724C6BCE7F14C646FB2088548
                                      Malicious:false
                                      Preview:..Pinging 468325 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.0751351573376215
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Windows Screen Saver (13104/52) 0.07%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:Test2.exe
                                      File size:3'266'048 bytes
                                      MD5:7f888b6cbd5062a7558eea61eb9a9ca2
                                      SHA1:2acfb5c3e7b8e569ea52397154b9b3ffb44e7d87
                                      SHA256:864bec690da391f258de447606ac18baa79672b665ba321a4da67ed59d567cad
                                      SHA512:7da70e844e0fce4b4bbc70db89503b95b6514cabf9ce9cf66fed643f6c11aafc5e7a8f385b5d16f7fa802cc47c9200bf486030834551d14c55078307ef7e93d8
                                      SSDEEP:49152:/v2lL26AaNeWgPhlmVqvMQ7XSKKQSYmzwXoGdVTHHB72eh2NT:/v2L26AaNeWgPhlmVqkQ7XSKKQSq
                                      TLSH:AFE55A0477F85E62E5AAD3B3D5F0541363F0F82AF3A3EB0B5191677A1C93B4098426A7
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1.........>.1.. ........@.. .......................@2...........@................................
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x71e43e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3f00x4b.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x31c4440x31c600880ba636326a953ae74844df8215cb7funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x3220000xc0x20082af84a97c26dde1ee285c565894879aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_VERSION0x3200a00x31cdata0.4484924623115578
                                      RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 27, 2024 06:47:10.434401989 CET5217553192.168.2.51.1.1.1
                                      Dec 27, 2024 06:47:10.848803997 CET53521751.1.1.1192.168.2.5
                                      Dec 27, 2024 06:47:21.876594067 CET6416753192.168.2.51.1.1.1
                                      Dec 27, 2024 06:47:22.015328884 CET53641671.1.1.1192.168.2.5
                                      Dec 27, 2024 06:47:32.977411032 CET6341553192.168.2.51.1.1.1
                                      Dec 27, 2024 06:47:33.115261078 CET53634151.1.1.1192.168.2.5
                                      Dec 27, 2024 06:47:44.535075903 CET6131253192.168.2.51.1.1.1
                                      Dec 27, 2024 06:47:44.674062967 CET53613121.1.1.1192.168.2.5
                                      Dec 27, 2024 06:47:56.002815962 CET5006253192.168.2.51.1.1.1
                                      Dec 27, 2024 06:47:56.140671015 CET53500621.1.1.1192.168.2.5
                                      Dec 27, 2024 06:48:07.360058069 CET5185753192.168.2.51.1.1.1
                                      Dec 27, 2024 06:48:07.714904070 CET53518571.1.1.1192.168.2.5
                                      Dec 27, 2024 06:48:19.060259104 CET5901953192.168.2.51.1.1.1
                                      Dec 27, 2024 06:48:19.196938992 CET53590191.1.1.1192.168.2.5
                                      Dec 27, 2024 06:48:31.386117935 CET5076853192.168.2.51.1.1.1
                                      Dec 27, 2024 06:48:31.523041010 CET53507681.1.1.1192.168.2.5
                                      Dec 27, 2024 06:48:42.281372070 CET5713853192.168.2.51.1.1.1
                                      Dec 27, 2024 06:48:42.582626104 CET53571381.1.1.1192.168.2.5
                                      Dec 27, 2024 06:48:53.472259045 CET6377453192.168.2.51.1.1.1
                                      Dec 27, 2024 06:48:53.610065937 CET53637741.1.1.1192.168.2.5
                                      Dec 27, 2024 06:49:05.570930958 CET4924153192.168.2.51.1.1.1
                                      Dec 27, 2024 06:49:05.707827091 CET53492411.1.1.1192.168.2.5
                                      Dec 27, 2024 06:49:16.699248075 CET5562453192.168.2.51.1.1.1
                                      Dec 27, 2024 06:49:17.201442957 CET53556241.1.1.1192.168.2.5
                                      Dec 27, 2024 06:49:28.726604939 CET5271753192.168.2.51.1.1.1
                                      Dec 27, 2024 06:49:28.864137888 CET53527171.1.1.1192.168.2.5
                                      Dec 27, 2024 06:49:39.128494024 CET6434353192.168.2.51.1.1.1
                                      Dec 27, 2024 06:49:39.265472889 CET53643431.1.1.1192.168.2.5
                                      Dec 27, 2024 06:49:49.483700991 CET5131653192.168.2.51.1.1.1
                                      Dec 27, 2024 06:49:49.621309042 CET53513161.1.1.1192.168.2.5
                                      Dec 27, 2024 06:49:59.810256958 CET5402353192.168.2.51.1.1.1
                                      Dec 27, 2024 06:49:59.948362112 CET53540231.1.1.1192.168.2.5
                                      Dec 27, 2024 06:50:10.167757988 CET5650653192.168.2.51.1.1.1
                                      Dec 27, 2024 06:50:10.305295944 CET53565061.1.1.1192.168.2.5
                                      Dec 27, 2024 06:50:20.455073118 CET5883953192.168.2.51.1.1.1
                                      Dec 27, 2024 06:50:20.592583895 CET53588391.1.1.1192.168.2.5
                                      Dec 27, 2024 06:50:30.997086048 CET5671953192.168.2.51.1.1.1
                                      Dec 27, 2024 06:50:31.133971930 CET53567191.1.1.1192.168.2.5
                                      Dec 27, 2024 06:50:41.785559893 CET5693353192.168.2.51.1.1.1
                                      Dec 27, 2024 06:50:41.922771931 CET53569331.1.1.1192.168.2.5
                                      Dec 27, 2024 06:50:52.170691967 CET6377753192.168.2.51.1.1.1
                                      Dec 27, 2024 06:50:52.307748079 CET53637771.1.1.1192.168.2.5
                                      Dec 27, 2024 06:51:02.648930073 CET4934453192.168.2.51.1.1.1
                                      Dec 27, 2024 06:51:02.786406040 CET53493441.1.1.1192.168.2.5
                                      Dec 27, 2024 06:51:13.294262886 CET5762753192.168.2.51.1.1.1
                                      Dec 27, 2024 06:51:13.434181929 CET53576271.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Dec 27, 2024 06:47:10.434401989 CET192.168.2.51.1.1.10xc33dStandard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:47:21.876594067 CET192.168.2.51.1.1.10x92b9Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:47:32.977411032 CET192.168.2.51.1.1.10xf1b4Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:47:44.535075903 CET192.168.2.51.1.1.10xd37fStandard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:47:56.002815962 CET192.168.2.51.1.1.10x3ec2Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:07.360058069 CET192.168.2.51.1.1.10x3dbcStandard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:19.060259104 CET192.168.2.51.1.1.10xe363Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:31.386117935 CET192.168.2.51.1.1.10xfcf2Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:42.281372070 CET192.168.2.51.1.1.10xd43Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:53.472259045 CET192.168.2.51.1.1.10xbb2fStandard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:05.570930958 CET192.168.2.51.1.1.10x479dStandard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:16.699248075 CET192.168.2.51.1.1.10x8ac6Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:28.726604939 CET192.168.2.51.1.1.10x2965Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:39.128494024 CET192.168.2.51.1.1.10xa452Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:49.483700991 CET192.168.2.51.1.1.10x33eStandard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:59.810256958 CET192.168.2.51.1.1.10x60b2Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:10.167757988 CET192.168.2.51.1.1.10x8307Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:20.455073118 CET192.168.2.51.1.1.10x5bb6Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:30.997086048 CET192.168.2.51.1.1.10xddc4Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:41.785559893 CET192.168.2.51.1.1.10x1274Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:52.170691967 CET192.168.2.51.1.1.10x55caStandard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:51:02.648930073 CET192.168.2.51.1.1.10x380Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:51:13.294262886 CET192.168.2.51.1.1.10x8e97Standard query (0)llordiWasHere-55715.portmap.hostA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Dec 27, 2024 06:47:10.848803997 CET1.1.1.1192.168.2.50xc33dName error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:47:22.015328884 CET1.1.1.1192.168.2.50x92b9Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:47:33.115261078 CET1.1.1.1192.168.2.50xf1b4Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:47:44.674062967 CET1.1.1.1192.168.2.50xd37fName error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:47:56.140671015 CET1.1.1.1192.168.2.50x3ec2Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:07.714904070 CET1.1.1.1192.168.2.50x3dbcName error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:19.196938992 CET1.1.1.1192.168.2.50xe363Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:31.523041010 CET1.1.1.1192.168.2.50xfcf2Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:42.582626104 CET1.1.1.1192.168.2.50xd43Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:48:53.610065937 CET1.1.1.1192.168.2.50xbb2fName error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:05.707827091 CET1.1.1.1192.168.2.50x479dName error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:17.201442957 CET1.1.1.1192.168.2.50x8ac6Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:28.864137888 CET1.1.1.1192.168.2.50x2965Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:39.265472889 CET1.1.1.1192.168.2.50xa452Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:49.621309042 CET1.1.1.1192.168.2.50x33eName error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:49:59.948362112 CET1.1.1.1192.168.2.50x60b2Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:10.305295944 CET1.1.1.1192.168.2.50x8307Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:20.592583895 CET1.1.1.1192.168.2.50x5bb6Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:31.133971930 CET1.1.1.1192.168.2.50xddc4Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:41.922771931 CET1.1.1.1192.168.2.50x1274Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:50:52.307748079 CET1.1.1.1192.168.2.50x55caName error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:51:02.786406040 CET1.1.1.1192.168.2.50x380Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false
                                      Dec 27, 2024 06:51:13.434181929 CET1.1.1.1192.168.2.50x8e97Name error (3)llordiWasHere-55715.portmap.hostnonenoneA (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:00:47:05
                                      Start date:27/12/2024
                                      Path:C:\Users\user\Desktop\Test2.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\Test2.exe"
                                      Imagebase:0x460000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.2034739793.0000000000780000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.2034418399.0000000000462000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2060291190.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2062421739.000000001B382000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:00:47:07
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0xeb0000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000002.00000002.2084085399.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                      • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                      • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                      • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 79%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:3
                                      Start time:00:47:10
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Shpa9OKN8GrQ.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:00:47:10
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:00:47:10
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:00:47:10
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:00:47:19
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x8a0000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2193762959.000000000315E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2193762959.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:8
                                      Start time:00:47:21
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HKybYN00EBOw.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:9
                                      Start time:00:47:21
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:00:47:21
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:00:47:21
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:13
                                      Start time:00:47:30
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x890000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000D.00000002.2305729866.000000000315E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000D.00000002.2305729866.0000000002E79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:14
                                      Start time:00:47:32
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\O2JjN7gejzZT.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:15
                                      Start time:00:47:32
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:16
                                      Start time:00:47:32
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:17
                                      Start time:00:47:32
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:18
                                      Start time:00:47:41
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0xe80000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000012.00000002.2421403593.00000000037DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000012.00000002.2421403593.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:19
                                      Start time:00:47:43
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\zXNfNAaZQ18l.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:20
                                      Start time:00:47:43
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:21
                                      Start time:00:47:44
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:00:47:44
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:24
                                      Start time:00:47:53
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x9b0000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000018.00000002.2535791887.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000018.00000002.2535791887.0000000002F19000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:25
                                      Start time:00:47:55
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\YWzMsGcZYfSk.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:00:47:55
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:27
                                      Start time:00:47:55
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:00:47:55
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff632ac0000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:29
                                      Start time:00:48:05
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x130000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000001D.00000002.2653674828.00000000029AE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000001D.00000002.2653674828.00000000026C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:30
                                      Start time:00:48:06
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\BcVX8akEUPIc.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:31
                                      Start time:00:48:06
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:32
                                      Start time:00:48:07
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:33
                                      Start time:00:48:07
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:34
                                      Start time:00:48:16
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x640000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000022.00000002.2768663751.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000022.00000002.2768663751.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:35
                                      Start time:00:48:18
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2wKqvlgp23d2.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:36
                                      Start time:00:48:18
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:37
                                      Start time:00:48:18
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:38
                                      Start time:00:48:18
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:39
                                      Start time:00:48:28
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x4c0000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000027.00000002.2892307088.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000027.00000002.2892307088.00000000029F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:40
                                      Start time:00:48:30
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\sqncKNCuACCi.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:41
                                      Start time:00:48:30
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:42
                                      Start time:00:48:30
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:43
                                      Start time:00:48:31
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:44
                                      Start time:00:48:40
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x300000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000002C.00000002.3002789942.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000002C.00000002.3002789942.0000000002829000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:45
                                      Start time:00:48:41
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\r9ftmQJc7N4i.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:46
                                      Start time:00:48:41
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:47
                                      Start time:00:48:42
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:48
                                      Start time:00:48:42
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:49
                                      Start time:00:48:51
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x650000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000031.00000002.3118100690.0000000002E8E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000031.00000002.3118100690.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:50
                                      Start time:00:48:53
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\VlApCIMOlO5L.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:51
                                      Start time:00:48:53
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:52
                                      Start time:00:48:53
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:53
                                      Start time:00:48:53
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:54
                                      Start time:00:49:03
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0x590000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000036.00000002.3233179129.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000036.00000002.3233179129.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:55
                                      Start time:00:49:04
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Q04w6t2xkN0a.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:56
                                      Start time:00:49:04
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:57
                                      Start time:00:49:05
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:58
                                      Start time:00:49:05
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:59
                                      Start time:00:49:14
                                      Start date:27/12/2024
                                      Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                      Imagebase:0xff0000
                                      File size:3'266'048 bytes
                                      MD5 hash:7F888B6CBD5062A7558EEA61EB9A9CA2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000003B.00000002.3354829409.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000003B.00000002.3354829409.0000000003609000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:60
                                      Start time:00:49:16
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\lPpSfrGjSDT5.bat" "
                                      Imagebase:0x7ff70ade0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:61
                                      Start time:00:49:16
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:62
                                      Start time:00:49:17
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff790b80000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:63
                                      Start time:00:49:17
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff77d000000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:101
                                      Start time:00:50:41
                                      Start date:27/12/2024
                                      Path:C:\Windows\System32\Conhost.exe
                                      Wow64 process (32bit):
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:
                                      Has administrator privileges:
                                      Programmed in:C, C++ or other language
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:16.2%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:13
                                        Total number of Limit Nodes:0
                                        execution_graph 1999 7ff848f23569 2000 7ff848f23571 DeleteFileW 1999->2000 2002 7ff848f23616 2000->2002 2003 7ff848f23811 2004 7ff848f2382f 2003->2004 2005 7ff848f238c4 2004->2005 2008 7ff848f23540 2005->2008 2007 7ff848f238d1 2009 7ff848f23551 DeleteFileW 2008->2009 2011 7ff848f23616 2009->2011 2011->2007 2012 7ff848f23525 2013 7ff848f23531 DeleteFileW 2012->2013 2015 7ff848f23616 2013->2015

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 118 7ff848f23525-7ff848f2352f 119 7ff848f23571-7ff848f235d8 118->119 120 7ff848f23531-7ff848f23562 118->120 126 7ff848f235da-7ff848f235df 119->126 127 7ff848f235e2-7ff848f23614 DeleteFileW 119->127 120->119 126->127 128 7ff848f2361c-7ff848f2364a 127->128 129 7ff848f23616 127->129 129->128
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2064325956.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff848f20000_Test2.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: d6b3dc1de286b365e93921be7eff55d86a4bfad882c9025c39155beffcd3e805
                                        • Instruction ID: 32c4b7410c7a5dc19b08ee4714aca34e11199ae9839807a67ab3d1c1fabba9a1
                                        • Opcode Fuzzy Hash: d6b3dc1de286b365e93921be7eff55d86a4bfad882c9025c39155beffcd3e805
                                        • Instruction Fuzzy Hash: 1C41047180DB8C9FDB05DB6C98596E9BFF0FF56310F0441AFC049C75A2DB2968498752

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 131 7ff848f23569-7ff848f235d8 136 7ff848f235da-7ff848f235df 131->136 137 7ff848f235e2-7ff848f23614 DeleteFileW 131->137 136->137 138 7ff848f2361c-7ff848f2364a 137->138 139 7ff848f23616 137->139 139->138
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2064325956.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff848f20000_Test2.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 8d358f59e70f7231e6e6bd0a2b47db04b79cc063e6a771c1c1136b43fece1bad
                                        • Instruction ID: abc54ccf21843c473a4d7dff86577630fd02a3549c39ea79b2012866f3849d86
                                        • Opcode Fuzzy Hash: 8d358f59e70f7231e6e6bd0a2b47db04b79cc063e6a771c1c1136b43fece1bad
                                        • Instruction Fuzzy Hash: 1131F07180CB5C9FDB19DB5888496E9BBF0FF65310F04426BC049D3292DB79A846CB91

                                        Execution Graph

                                        Execution Coverage:10.7%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:3
                                        Total number of Limit Nodes:0
                                        execution_graph 11302 7ff848f03569 11303 7ff848f03571 DeleteFileW 11302->11303 11305 7ff848f03616 11303->11305

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 33 7ff849175be1-7ff849175bfb 34 7ff849175bff-7ff849175c01 33->34 35 7ff849175ce7-7ff849175cf9 34->35 36 7ff849175c07-7ff849175c56 34->36 38 7ff849175cff-7ff849175d95 35->38 36->35 41 7ff849175c5c-7ff849175c97 36->41 48 7ff84917601e-7ff84917603b 38->48 46 7ff849175c99-7ff849175cc2 41->46 47 7ff849175cc4-7ff849175cd5 41->47 46->47 62 7ff849175cd9-7ff849175ce1 46->62 47->41 49 7ff849175cd7 47->49 50 7ff849175af5-7ff849175b2f 48->50 51 7ff849176041-7ff849176044 48->51 49->35 50->48 69 7ff849175b35-7ff849175b7f 50->69 53 7ff849176066-7ff849176087 51->53 54 7ff849176046-7ff84917604a 51->54 60 7ff849176089-7ff84917609f 53->60 61 7ff8491760a6-7ff8491760ab 53->61 54->53 56 7ff84917604c-7ff849176061 call 7ff849174ae0 54->56 56->53 60->61 64 7ff8491760ed-7ff8491760f4 61->64 65 7ff8491760ad-7ff8491760cb 61->65 62->35 67 7ff8491760f6-7ff849176102 64->67 68 7ff849176122-7ff849176127 64->68 65->64 70 7ff8491760cd-7ff8491760d9 65->70 76 7ff849176109-7ff84917610f 67->76 72 7ff8491761fc-7ff84917620d 68->72 73 7ff84917612d-7ff849176135 68->73 69->48 83 7ff849175b85-7ff849175b88 69->83 74 7ff8491760db-7ff8491760e3 70->74 75 7ff8491760e5-7ff8491760eb 70->75 77 7ff84917613b-7ff84917614b 73->77 78 7ff849176287-7ff8491762be 73->78 74->75 75->64 75->70 79 7ff84917611a-7ff849176120 76->79 80 7ff849176111-7ff849176112 76->80 85 7ff84917614d-7ff849176151 77->85 86 7ff84917615b-7ff849176163 77->86 79->67 79->68 80->79 88 7ff849175b8a-7ff849175baf 83->88 89 7ff849175bb5-7ff849175bd3 83->89 85->78 90 7ff849176157-7ff849176158 85->90 86->78 92 7ff849176169-7ff849176179 86->92 88->48 88->89 93 7ff849175d9a-7ff849175db3 89->93 94 7ff849175bd9-7ff849175bdb 89->94 90->86 101 7ff84917617b-7ff84917617f 92->101 102 7ff849176189-7ff849176191 92->102 99 7ff849175e8f-7ff849175ea8 93->99 100 7ff849175db9-7ff849175e00 93->100 94->33 94->48 99->48 106 7ff849175eae-7ff849175eb0 99->106 114 7ff849175e1b-7ff849175e8a 100->114 115 7ff849175e02-7ff849175e15 100->115 101->78 103 7ff849176185-7ff849176186 101->103 102->78 104 7ff849176197-7ff8491761a7 102->104 103->102 111 7ff8491761a9-7ff8491761ad 104->111 112 7ff8491761b7-7ff8491761bf 104->112 106->48 108 7ff849175eb6-7ff849175ed3 106->108 108->48 118 7ff849175ed9-7ff849175edd 108->118 111->78 116 7ff8491761b3-7ff8491761b4 111->116 112->78 117 7ff8491761c5-7ff8491761d5 112->117 114->48 115->48 115->114 116->112 123 7ff8491761d7-7ff8491761db 117->123 124 7ff8491761e5-7ff8491761f5 117->124 118->48 120 7ff849175ee3-7ff849175f06 118->120 126 7ff849175f0d-7ff849176013 120->126 123->78 125 7ff8491761e1-7ff8491761e2 123->125 124->72 125->124 126->48
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: *#I
                                        • API String ID: 0-2219797031
                                        • Opcode ID: 783765f4a4f3ab2bafcb849de44ab3ad6181c957e73d70ee20bb41bdcdd19785
                                        • Instruction ID: 2b8cf162cb6ae144a83f953d3b19d92dd15d08ea8cdade0d186ef45155fa44dc
                                        • Opcode Fuzzy Hash: 783765f4a4f3ab2bafcb849de44ab3ad6181c957e73d70ee20bb41bdcdd19785
                                        • Instruction Fuzzy Hash: 51324F30A18A5A8FDBA4EF18C8857A9B7E1FF98341F5045B9D04ED3295DB38E9818F41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 367 7ff8491793c1-7ff849179409 369 7ff84917940b-7ff849179419 367->369 370 7ff84917941a-7ff84917942c 367->370 372 7ff8491794af-7ff8491794b3 370->372 373 7ff849179432-7ff849179442 370->373 374 7ff8491794cb-7ff8491794cf 372->374 375 7ff8491794b5-7ff8491794b9 372->375 380 7ff84917972b-7ff849179761 373->380 381 7ff849179448-7ff849179497 373->381 377 7ff8491794fe-7ff849179502 374->377 378 7ff8491794d1-7ff8491794f8 374->378 379 7ff8491794c0-7ff8491794c4 375->379 382 7ff84917971c-7ff84917972a 377->382 383 7ff849179508-7ff84917950d 377->383 378->377 388 7ff849179781-7ff849179799 378->388 379->374 416 7ff849179499-7ff8491794a2 381->416 417 7ff8491794a4-7ff8491794a8 381->417 383->382 386 7ff849179513-7ff84917951d 383->386 394 7ff84917951f-7ff849179531 386->394 395 7ff84917956b-7ff849179570 386->395 404 7ff84917979b-7ff8491797a1 388->404 405 7ff8491797a5 388->405 394->395 406 7ff849179533-7ff84917955e 394->406 397 7ff8491796f8-7ff8491796fd 395->397 398 7ff849179576-7ff849179580 395->398 397->382 400 7ff8491796ff-7ff849179714 397->400 398->397 410 7ff849179586-7ff849179598 398->410 400->382 412 7ff849179716-7ff849179719 400->412 407 7ff8491797a9-7ff849179808 404->407 411 7ff8491797a3 404->411 405->407 408 7ff8491797a7-7ff8491797a8 405->408 406->395 424 7ff849179560-7ff849179564 406->424 429 7ff849179dae-7ff849179dc0 407->429 430 7ff84917980e-7ff849179820 407->430 408->407 421 7ff84917968e-7ff8491796f1 410->421 422 7ff84917959e-7ff8491795c5 410->422 411->405 412->382 416->372 417->372 421->397 424->395 430->429 434 7ff849179826-7ff84917985f 430->434 434->429 440 7ff849179865-7ff8491798a6 434->440 444 7ff8491798ac-7ff8491798c4 440->444 445 7ff849179958-7ff84917996b 440->445 450 7ff84917994c-7ff849179952 444->450 451 7ff8491798ca-7ff8491798ea 444->451 448 7ff84917996d-7ff84917998e 445->448 449 7ff8491799c0 445->449 457 7ff8491799b9-7ff8491799be 448->457 458 7ff849179990-7ff8491799b7 448->458 452 7ff8491799c2-7ff8491799c7 449->452 450->444 450->445 451->450 465 7ff8491798ec-7ff8491798fe 451->465 454 7ff849179a0e-7ff849179a31 452->454 455 7ff8491799c9-7ff8491799d0 452->455 462 7ff849179b27-7ff849179b33 454->462 463 7ff849179a37-7ff849179a5f 454->463 460 7ff8491799d7-7ff8491799f1 455->460 457->452 458->452 460->454 470 7ff8491799f3-7ff849179a0c 460->470 462->429 466 7ff849179b39-7ff849179b4e 462->466 476 7ff849179b1b-7ff849179b21 463->476 477 7ff849179a65-7ff849179a80 463->477 465->450 471 7ff849179900-7ff849179904 465->471 466->429 470->454 473 7ff84917990a-7ff84917991f 471->473 474 7ff849179dc1-7ff849179e63 471->474 481 7ff849179926-7ff849179928 473->481 484 7ff849179e69-7ff849179e6b 474->484 485 7ff849179f75-7ff849179fa8 474->485 476->462 476->463 477->476 491 7ff849179a86-7ff849179a98 477->491 481->450 483 7ff84917992a-7ff849179948 call 7ff849174bb0 481->483 483->450 489 7ff849179e6d-7ff849179e7f 484->489 490 7ff849179e85-7ff849179e93 484->490 504 7ff849179faf-7ff849179fba 485->504 489->490 489->504 492 7ff849179e99-7ff849179eb0 490->492 493 7ff849179fe8-7ff84917a01b 490->493 491->476 500 7ff849179a9e-7ff849179aa2 491->500 512 7ff849179eca-7ff849179ecd 492->512 513 7ff849179eb2-7ff849179ec4 492->513 515 7ff84917a022-7ff84917a061 493->515 500->474 505 7ff849179aa8-7ff849179aeb 500->505 509 7ff849179fbc-7ff849179fd1 504->509 510 7ff849179f41-7ff849179f42 504->510 505->476 535 7ff849179aed-7ff849179b18 call 7ff849174bb0 505->535 519 7ff849179fd6-7ff849179fe1 509->519 520 7ff849179fd3-7ff849179fd5 509->520 517 7ff849179ecf-7ff849179ee6 512->517 518 7ff849179ef6-7ff849179f12 call 7ff849177240 512->518 513->512 513->515 540 7ff84917a06d 515->540 541 7ff84917a063-7ff84917a069 515->541 517->518 536 7ff849179ee8-7ff849179eec 517->536 533 7ff849179f14-7ff849179f40 518->533 534 7ff849179f43-7ff849179f47 518->534 519->493 520->519 533->510 542 7ff849179f4e-7ff849179f74 534->542 535->476 538 7ff849179ef3-7ff849179ef4 536->538 538->518 545 7ff84917a071-7ff84917a0ac 540->545 547 7ff84917a06f 540->547 544 7ff84917a06b 541->544 541->545 544->540 548 7ff84917a0ef-7ff84917a122 545->548 549 7ff84917a0ae-7ff84917a0d5 545->549 547->545 558 7ff84917a129-7ff84917a171 548->558 549->558 561 7ff84917a0d7-7ff84917a0ee 549->561 566 7ff84917a175-7ff84917a197 558->566 567 7ff84917a173 558->567 570 7ff84917a19d-7ff84917a1af 566->570 571 7ff84917a27a-7ff84917a292 566->571 567->566 568 7ff84917a1b5-7ff84917a1ba 567->568 576 7ff84917a1bb-7ff84917a1d3 call 7ff8491738a0 570->576 577 7ff84917a1b1-7ff84917a1b4 570->577 573 7ff84917a295-7ff84917a2c3 571->573 585 7ff84917a305 573->585 586 7ff84917a2c5-7ff84917a2e2 573->586 581 7ff84917a237-7ff84917a240 576->581 582 7ff84917a1d5-7ff84917a206 576->582 577->568 596 7ff84917a208-7ff84917a22f 582->596 597 7ff84917a231-7ff84917a235 582->597 587 7ff84917a307 585->587 588 7ff84917a2f5-7ff84917a2ff 585->588 589 7ff84917a309-7ff84917a30b 586->589 590 7ff84917a2e4-7ff84917a2f4 586->590 587->589 588->589 594 7ff84917a301-7ff84917a302 588->594 591 7ff84917a30d-7ff84917a31b 589->591 592 7ff84917a31c-7ff84917a32c 589->592 590->588 594->585 596->597 599 7ff84917a241-7ff84917a266 596->599 597->581 597->582 599->573 602 7ff84917a268-7ff84917a279 599->602
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ded5c034f0ffb99bb46a76d8e3ee3a3128e60582064b405bce6851afa2d0ddc
                                        • Instruction ID: dd3944de64c34c3ad75c572e604f58dd29aa8e5d1c8281413af9852a36157a9b
                                        • Opcode Fuzzy Hash: 0ded5c034f0ffb99bb46a76d8e3ee3a3128e60582064b405bce6851afa2d0ddc
                                        • Instruction Fuzzy Hash: AA92E430B1C94A4FEBA8EF2C945977577D1FF99390F0401BAD44EC72A6DE28AC468B41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 671 7ff849174d50-7ff849174d59 672 7ff849174d7e 671->672 673 7ff849174d5b-7ff849174d74 671->673 674 7ff849174dcd-7ff849174dd8 672->674 675 7ff849174d80-7ff849174da2 672->675 677 7ff849174dba-7ff849174dbc 673->677 678 7ff849174d76-7ff849174d7a 673->678 683 7ff849174dbe-7ff849174dc3 674->683 684 7ff849174dda-7ff849174e33 674->684 682 7ff849174da9-7ff849174db5 675->682 677->683 681 7ff849174d7c-7ff849174d7d 678->681 678->682 681->672 682->677 688 7ff849174e84-7ff849174ebc call 7ff8491738a0 call 7ff849173730 684->688 689 7ff849174e35-7ff849174e40 684->689 698 7ff849174ebe-7ff849174ed3 call 7ff849174ae0 688->698 699 7ff849174ed8-7ff849174ee0 688->699 691 7ff849174e47-7ff849174e4a 689->691 691->688 693 7ff849174e4c-7ff849174e61 call 7ff849173730 691->693 693->688 703 7ff849174e63-7ff849174e7f call 7ff849173140 693->703 698->699 701 7ff849174efc 699->701 702 7ff849174ee2-7ff849174efa 699->702 704 7ff849174efe-7ff849174f05 701->704 702->704 703->688 707 7ff849174f18-7ff849174f5a 704->707 708 7ff849174f07-7ff849174f17 704->708 709 7ff849175a36-7ff849175a40 707->709 710 7ff849174f60-7ff849174f93 707->710 711 7ff849175a58 709->711 712 7ff849175a42-7ff849175a4d 709->712 722 7ff8491751ee-7ff849175200 710->722 723 7ff849174f99-7ff849174fab 710->723 713 7ff849175a5d-7ff849175a5f 711->713 712->713 715 7ff849175a7a-7ff849175a7f 713->715 716 7ff849175a61-7ff849175a73 713->716 718 7ff849175a84-7ff849175a95 715->718 719 7ff849175a81 715->719 716->715 725 7ff84917620e-7ff8491762be 718->725 719->718 729 7ff849175206-7ff849175232 722->729 730 7ff8491752c3-7ff8491752c5 722->730 723->722 727 7ff849174fb1-7ff849174fe3 723->727 738 7ff849175016-7ff84917504a 727->738 739 7ff849174fe5-7ff849175007 727->739 729->730 736 7ff849175238-7ff84917523d 729->736 732 7ff8491752c7-7ff8491752d9 730->732 733 7ff849175335-7ff849175347 730->733 732->733 743 7ff8491752db-7ff8491752de 732->743 745 7ff84917534d-7ff849175379 733->745 746 7ff84917591b-7ff84917592d 733->746 736->730 742 7ff849175243-7ff849175246 736->742 760 7ff84917507e-7ff8491750b5 738->760 761 7ff84917504c-7ff84917506c 738->761 739->738 747 7ff84917526b-7ff849175274 742->747 748 7ff849175248-7ff849175251 742->748 749 7ff849175304-7ff849175332 call 7ff849174bb0 743->749 750 7ff8491752e0-7ff8491752fb 743->750 763 7ff8491753af-7ff8491753c6 745->763 764 7ff84917537b-7ff849175384 745->764 770 7ff84917592f-7ff849175937 746->770 771 7ff84917599c-7ff8491759ae 746->771 757 7ff84917529b-7ff8491752c0 call 7ff849174bb0 747->757 758 7ff849175276-7ff849175299 747->758 748->747 749->733 750->749 757->730 758->757 778 7ff8491750bb-7ff8491750d3 760->778 779 7ff849175141-7ff84917516e 760->779 761->760 789 7ff8491753cc-7ff8491753f5 763->789 790 7ff8491754c2-7ff8491754ef 763->790 773 7ff8491753a8-7ff8491753a9 764->773 774 7ff849175386-7ff849175396 764->774 770->771 777 7ff849175939-7ff849175966 770->777 791 7ff849175a25-7ff849175a30 771->791 792 7ff8491759b0-7ff8491759ba 771->792 773->763 774->773 777->771 795 7ff849175968-7ff849175971 777->795 787 7ff849175138-7ff84917513f 778->787 788 7ff8491750d5-7ff8491750e5 778->788 806 7ff8491751a4-7ff8491751ae 779->806 807 7ff849175170-7ff849175179 779->807 799 7ff849175105-7ff849175136 787->799 788->799 789->746 816 7ff8491753fb-7ff84917541b 789->816 810 7ff84917551f-7ff849175548 790->810 811 7ff8491754f1-7ff84917551c 790->811 791->709 791->710 797 7ff849175a4f-7ff849175a56 792->797 798 7ff8491759c0-7ff8491759ec 792->798 802 7ff849175995-7ff849175996 795->802 803 7ff849175973-7ff849175983 795->803 797->791 798->791 821 7ff8491759ee-7ff8491759f7 798->821 799->806 802->771 803->802 806->725 813 7ff8491751b4-7ff8491751d5 806->813 808 7ff84917519d-7ff84917519e 807->808 809 7ff84917517b-7ff84917518b 807->809 808->806 809->808 830 7ff84917554e-7ff84917557d 810->830 831 7ff8491755df-7ff8491755f3 810->831 811->810 813->722 832 7ff8491751d7-7ff8491751e6 813->832 816->790 827 7ff849175a1e-7ff849175a1f 821->827 828 7ff8491759f9-7ff849175a09 821->828 827->791 828->827 830->831 837 7ff84917557f-7ff8491755ab 830->837 833 7ff8491755f5-7ff84917560c 831->833 832->722 838 7ff84917560e-7ff849175613 833->838 839 7ff849175647-7ff849175674 833->839 837->831 844 7ff8491755ad-7ff8491755dc 837->844 838->839 840 7ff849175615-7ff849175637 838->840 846 7ff8491756cc-7ff8491756f8 839->846 847 7ff849175676-7ff8491756c7 call 7ff849174ae0 839->847 840->833 850 7ff849175639-7ff849175644 840->850 844->831 855 7ff84917573d-7ff849175769 846->855 856 7ff8491756fa-7ff849175738 call 7ff849174ae0 846->856 847->846 850->839 861 7ff8491757ae-7ff8491757da 855->861 862 7ff84917576b-7ff8491757a9 call 7ff849174ae0 855->862 856->855 866 7ff8491757dc-7ff8491757f0 861->866 867 7ff849175842-7ff84917586f 861->867 862->861 870 7ff8491757f1-7ff849175811 866->870 873 7ff8491758b4-7ff8491758e0 867->873 874 7ff849175871-7ff8491758af call 7ff849174ae0 867->874 870->867 875 7ff849175813-7ff849175835 870->875 873->746 881 7ff8491758e2-7ff8491758eb 873->881 874->873 875->870 885 7ff849175837 875->885 883 7ff8491758ed-7ff849175910 881->883 884 7ff849175912-7ff849175913 881->884 883->884 884->746 885->867
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 386eac8a0b8daaddddfaba2a68af433a11ce7ebc620714a368c094ef88fdebf2
                                        • Instruction ID: bad2c2993e07f430f1e1b410b215454d051e3c475cfb26ba4d8411c02907e6b3
                                        • Opcode Fuzzy Hash: 386eac8a0b8daaddddfaba2a68af433a11ce7ebc620714a368c094ef88fdebf2
                                        • Instruction Fuzzy Hash: 33A2A570A1CA4A8FDF98EF18C494BA977E2FF58340F5041A9D04ED7296DE39E885CB41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 918 7ff84917a7cd-7ff84917a869 920 7ff84917a86f-7ff84917a872 918->920 921 7ff84917aee1-7ff84917aef6 918->921 920->921 922 7ff84917a878-7ff84917a895 920->922 922->921 924 7ff84917a89b-7ff84917a8ba 922->924 926 7ff84917a8bc-7ff84917a8bf 924->926 927 7ff84917a8c6-7ff84917a8d9 924->927 928 7ff84917a8de-7ff84917a8f2 926->928 929 7ff84917a8c1 926->929 930 7ff84917a969-7ff84917a97b 927->930 932 7ff84917a927-7ff84917a962 928->932 933 7ff84917a8f4-7ff84917a90e 928->933 929->921 930->921 935 7ff84917a981-7ff84917a9c0 930->935 932->930 933->921 939 7ff84917a914-7ff84917a923 933->939 935->921 943 7ff84917a9c6-7ff84917a9d0 935->943 939->932 946 7ff84917a9e8-7ff84917a9f8 943->946 947 7ff84917a9d2-7ff84917a9e6 943->947 949 7ff84917aa02-7ff84917aa57 946->949 947->949 953 7ff84917aa5d-7ff84917aa65 949->953 954 7ff84917aacb-7ff84917aad3 953->954 955 7ff84917aa67-7ff84917aa7b 953->955 954->921 956 7ff84917aad9-7ff84917aafb 954->956 955->954 959 7ff84917aa7d-7ff84917aac7 955->959 960 7ff84917abff-7ff84917ac35 956->960 961 7ff84917ab01-7ff84917ab2a 956->961 959->954 960->921 973 7ff84917ac3b-7ff84917ac4d 960->973 966 7ff84917abb1-7ff84917abd2 961->966 967 7ff84917ab30-7ff84917ab56 961->967 966->961 969 7ff84917abd8 966->969 967->966 977 7ff84917ab58-7ff84917ab6e 967->977 969->960 973->921 978 7ff84917ac53-7ff84917ac71 973->978 977->966 980 7ff84917ab70-7ff84917ab88 977->980 978->921 985 7ff84917ac77-7ff84917aca5 978->985 980->966 984 7ff84917ab8a-7ff84917abaf 980->984 984->966 988 7ff84917abda-7ff84917abf8 984->988 992 7ff84917acc8-7ff84917acd5 985->992 993 7ff84917aca7-7ff84917acc1 985->993 988->960 996 7ff84917acdb-7ff84917ad08 992->996 997 7ff84917ad9a-7ff84917adba 992->997 993->992 1005 7ff84917ad2b-7ff84917ad37 996->1005 1006 7ff84917ad0a-7ff84917ad24 996->1006 1000 7ff84917adbc-7ff84917adbd 997->1000 1001 7ff84917adc4-7ff84917ae00 997->1001 1000->1001 1001->921 1013 7ff84917ae06-7ff84917ae23 1001->1013 1011 7ff84917ad39-7ff84917ad45 1005->1011 1012 7ff84917ad88-7ff84917ad94 1005->1012 1006->1005 1014 7ff84917ad4b-7ff84917ad81 1011->1014 1015 7ff84917b030-7ff84917b047 1011->1015 1012->921 1012->997 1018 7ff84917ae2d-7ff84917ae68 1013->1018 1019 7ff84917ae25-7ff84917ae26 1013->1019 1014->1012 1022 7ff84917b049-7ff84917b050 1015->1022 1023 7ff84917b051-7ff84917b0be call 7ff849174860 call 7ff849177560 call 7ff849174b60 call 7ff84917b0c0 1015->1023 1018->921 1035 7ff84917ae6a-7ff84917ae7c 1018->1035 1019->1018 1022->1023 1035->921 1039 7ff84917ae7e-7ff84917ae9c 1035->1039 1039->921 1042 7ff84917ae9e-7ff84917aeba 1039->1042 1045 7ff84917aebc-7ff84917aedf 1042->1045 1046 7ff84917aef7-7ff84917af6c 1042->1046 1045->921 1045->1046 1056 7ff84917b017-7ff84917b02f 1046->1056 1057 7ff84917af72-7ff84917af9a 1046->1057 1057->1056 1060 7ff84917af9c-7ff84917b010 1057->1060 1060->1056
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41316391230f3151997dbc2e36b461b8324faa27d3596eb801e1d77ae0011e51
                                        • Instruction ID: 3a02b9194f6077d34d9fd34e463ca852624e3f271d645d092752d220f923f015
                                        • Opcode Fuzzy Hash: 41316391230f3151997dbc2e36b461b8324faa27d3596eb801e1d77ae0011e51
                                        • Instruction Fuzzy Hash: 3262413061CA498FEBA8EF2CC454B6977E1FF99341F1445BAE04DC72A6DE39E8418B41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d3032f650d5c823a215c71f29b5148eee7a580143716f364798aa912d8f56d20
                                        • Instruction ID: 910b01101d35b93ed28a1464ee594d180fa855a8ad10caa4e3ff19a17663fbc7
                                        • Opcode Fuzzy Hash: d3032f650d5c823a215c71f29b5148eee7a580143716f364798aa912d8f56d20
                                        • Instruction Fuzzy Hash: CE228430A1C94A4FEBA8EF1884957B977E2FF98340F5441BDD44EC36D2DE38A8468B45

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X!&I$`"&I$a(_H
                                        • API String ID: 0-269873546
                                        • Opcode ID: 0ecc13c994bf05324ac7c518c655dffd14f23d51350c8983753e5e7182afbd1f
                                        • Instruction ID: 3a0833ccfe48e77c5072bf8e15a4c57805c8bdb8fe52a9d1fc7bfdba92e58be7
                                        • Opcode Fuzzy Hash: 0ecc13c994bf05324ac7c518c655dffd14f23d51350c8983753e5e7182afbd1f
                                        • Instruction Fuzzy Hash: E951D472E1DECA5FE7A9EA3840556B577D1FFA9780B5404BEC04EC3286DE2DB8428740

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 133 7ff849173f38-7ff849173f3e 134 7ff849173f9f-7ff849173fa6 133->134 135 7ff849173f40-7ff849173f47 133->135 136 7ff849173fab-7ff849173fbd 134->136 137 7ff849173fa8-7ff849173fa9 134->137 135->134 139 7ff849173fbf-7ff849173fc7 136->139 140 7ff84917400d-7ff84917400e 136->140 137->136 141 7ff849173fc9-7ff849173fcc 139->141 142 7ff849174002-7ff849174008 139->142 144 7ff849174015-7ff84917401d 140->144 141->142 145 7ff849173fce-7ff849173ffd 141->145 143 7ff849174513-7ff849174525 142->143 148 7ff849174526-7ff849174539 143->148 146 7ff84917401f-7ff849174034 144->146 147 7ff849174038-7ff84917403e 144->147 145->148 146->147 150 7ff849174379-7ff849174380 147->150 151 7ff849174044-7ff849174058 147->151 152 7ff849174387-7ff849174393 150->152 153 7ff849174382-7ff849174385 150->153 151->150 155 7ff849174395-7ff849174398 152->155 153->155 157 7ff84917439a-7ff8491743a0 155->157 158 7ff8491743a5-7ff8491743ad 155->158 157->148 160 7ff84917450d 158->160 161 7ff8491743b3-7ff8491743d0 158->161 160->143 163 7ff8491743f7-7ff849174402 161->163 164 7ff8491743d2-7ff8491743e2 call 7ff849173020 161->164 166 7ff849174408-7ff84917440d 163->166 167 7ff8491744c2-7ff8491744c5 163->167 164->163 174 7ff8491743e4-7ff8491743f2 164->174 170 7ff84917440f 166->170 171 7ff849174414-7ff849174417 166->171 167->160 168 7ff8491744c7-7ff8491744cd 167->168 172 7ff8491744cf-7ff8491744d4 168->172 173 7ff8491744d6 168->173 170->171 175 7ff849174419-7ff849174423 171->175 176 7ff849174427-7ff84917442a 171->176 179 7ff8491744db-7ff8491744e9 172->179 173->179 174->163 175->176 177 7ff84917442c-7ff84917442f 176->177 178 7ff84917447a-7ff84917447d 176->178 180 7ff849174451-7ff849174454 177->180 181 7ff849174431-7ff84917444b 177->181 183 7ff84917447f-7ff849174488 178->183 184 7ff84917448a-7ff84917448f 178->184 179->143 187 7ff8491744eb-7ff84917450b 179->187 185 7ff849174456-7ff84917445c 180->185 186 7ff849174464-7ff84917446a 180->186 181->180 193 7ff84917453a-7ff849174561 181->193 188 7ff849174493-7ff8491744c0 183->188 184->188 185->186 190 7ff84917445e-7ff849174461 185->190 186->178 191 7ff84917446c-7ff849174476 186->191 187->148 188->148 190->186 191->178 198 7ff849174578-7ff84917459c 193->198 199 7ff849174563-7ff849174576 193->199 202 7ff84917459e-7ff849174614 198->202 199->202 207 7ff849174619-7ff849174653 202->207 208 7ff849174616-7ff849174618 202->208 211 7ff849174664-7ff849174676 207->211 212 7ff849174655-7ff84917465d 207->212 208->207 216 7ff849174678-7ff849174682 211->216 217 7ff849174683-7ff84917468c 211->217 212->211 213 7ff84917465f 212->213 215 7ff8491746fc-7ff849174701 213->215 217->215
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: f3bca7fda69ee83c0e9f110d933da563467826f7f3a0ef570960d97990002747
                                        • Instruction ID: 8917fcca6fb6fe9f6da92f2a9e22bc2b00ac1a20f6306a6316a213713ecfa139
                                        • Opcode Fuzzy Hash: f3bca7fda69ee83c0e9f110d933da563467826f7f3a0ef570960d97990002747
                                        • Instruction Fuzzy Hash: 5AD1C631A0DA8B4FE7A5AF28945537477D2EF56350F1402FAD48EC72D2DE1CAC468B42

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 219 7ff848f03525-7ff848f0352f 220 7ff848f03571-7ff848f035d8 219->220 221 7ff848f03531-7ff848f03562 219->221 228 7ff848f035e2-7ff848f03614 DeleteFileW 220->228 229 7ff848f035da-7ff848f035df 220->229 221->220 230 7ff848f03616 228->230 231 7ff848f0361c-7ff848f0364a 228->231 229->228 230->231
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2091474985.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff848f00000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: d9deec097cf24c0e392a23d1899d8dbec3504a6233651111a6d0eada148bf2f8
                                        • Instruction ID: 84acac8fea8b230bd88a2c5eb4362c578577870cfb8759f82ecd6b599c875704
                                        • Opcode Fuzzy Hash: d9deec097cf24c0e392a23d1899d8dbec3504a6233651111a6d0eada148bf2f8
                                        • Instruction Fuzzy Hash: 1741F33180DB8D9FDB19EB6C88496F9BFF0EF66310F0441AFC049C71A2DB2868458791

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 233 7ff848f03569-7ff848f035d8 238 7ff848f035e2-7ff848f03614 DeleteFileW 233->238 239 7ff848f035da-7ff848f035df 233->239 240 7ff848f03616 238->240 241 7ff848f0361c-7ff848f0364a 238->241 239->238 240->241
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2091474985.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff848f00000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 4c4ec7509d5ebdfb73c5a9f8e84b4ae8fd9b005a11df5ed1b1f830db3dbfd904
                                        • Instruction ID: cb601d1e1e79d94479514162f190b514817e8a8305760d4ccb552d4efed233d6
                                        • Opcode Fuzzy Hash: 4c4ec7509d5ebdfb73c5a9f8e84b4ae8fd9b005a11df5ed1b1f830db3dbfd904
                                        • Instruction Fuzzy Hash: 7D31F03180DB5C8FDB19DB5888496F9BBF0FF66310F04426BC049D3292DB78A845CB91

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (_L
                                        • API String ID: 0-1598577166
                                        • Opcode ID: 2769a74841dcbf03c91ffce47dba137fc783d94394c65173cbccd08908ceba4d
                                        • Instruction ID: e2135bdfb03d306d86c27982fbf7b5422e8b7c8f9ec3003a7f3b87adcc0112c0
                                        • Opcode Fuzzy Hash: 2769a74841dcbf03c91ffce47dba137fc783d94394c65173cbccd08908ceba4d
                                        • Instruction Fuzzy Hash: E191E931A0DA8A4FDBBAEF2894545B577E1FF55350F0501FAD04EC3292DE2DA846CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 603 7ff8491720e2-7ff849172149 611 7ff84917216e-7ff849172215 603->611 612 7ff84917214b-7ff84917216d 603->612 624 7ff84917222d-7ff849172235 611->624 625 7ff849172217-7ff849172220 611->625 612->611 626 7ff849172227-7ff84917222b 625->626 626->624 626->625
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #)_^
                                        • API String ID: 0-363831243
                                        • Opcode ID: 74cd72ed9010e09b4ae03a4299f0f8a36e40d1a4a9af4e3aaaf14f1accd68026
                                        • Instruction ID: 2027f7e5dca8b3b9fe39a64be9c24882b6c674cfb6835a56400328c8fdb0f95c
                                        • Opcode Fuzzy Hash: 74cd72ed9010e09b4ae03a4299f0f8a36e40d1a4a9af4e3aaaf14f1accd68026
                                        • Instruction Fuzzy Hash: 7E41D73391E756AFD300BE79E8854E57360FF0132DB2846BAC088CE493DB2DA58187D9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 627 7ff8491720d7-7ff8491720d9 628 7ff8491720fe-7ff849172149 627->628 629 7ff8491720db-7ff8491720df 627->629 633 7ff84917216e-7ff849172215 628->633 634 7ff84917214b-7ff84917216d 628->634 629->628 646 7ff84917222d-7ff849172235 633->646 647 7ff849172217-7ff849172220 633->647 634->633 648 7ff849172227-7ff84917222b 647->648 648->646 648->647
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #)_^
                                        • API String ID: 0-363831243
                                        • Opcode ID: 2141bfa97fa2db00638df0ab9c7342b5d7e349be871213a52ea059573f22ed71
                                        • Instruction ID: ffd3df1b766d8cd4bd24610bb7607d1c787172eeacaf536df50d95205cc3f99f
                                        • Opcode Fuzzy Hash: 2141bfa97fa2db00638df0ab9c7342b5d7e349be871213a52ea059573f22ed71
                                        • Instruction Fuzzy Hash: 1341E93391E756AFD310BE79E8854E57360FF01368B2846BAC088CA483DB2DA5858BD5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 649 7ff8491720cf-7ff849172149 655 7ff84917216e-7ff849172215 649->655 656 7ff84917214b-7ff84917216d 649->656 668 7ff84917222d-7ff849172235 655->668 669 7ff849172217-7ff849172220 655->669 656->655 670 7ff849172227-7ff84917222b 669->670 670->668 670->669
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #)_^
                                        • API String ID: 0-363831243
                                        • Opcode ID: e38b38ad83ec3426f96c113816076cb93ea7f2de223a43e9036cb2041e35d25e
                                        • Instruction ID: d99647b26097c172b6c7324ad347c02ce2b88585234c8b29e0db2445d17f345c
                                        • Opcode Fuzzy Hash: e38b38ad83ec3426f96c113816076cb93ea7f2de223a43e9036cb2041e35d25e
                                        • Instruction Fuzzy Hash: 4041E73391E75AAFD310BE79E8854E57360FF01368B2846BAC088CA483DB2DA58187D5

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `"&I
                                        • API String ID: 0-3983917185
                                        • Opcode ID: a18a9b02d410cbb13bca03977e4ebb1ce48b09a476f30bfb9560f1bc5125daae
                                        • Instruction ID: 630fac469f92e988f3f863e5202639ac82849a75856c70f16767758acf9eb1e0
                                        • Opcode Fuzzy Hash: a18a9b02d410cbb13bca03977e4ebb1ce48b09a476f30bfb9560f1bc5125daae
                                        • Instruction Fuzzy Hash: B921D362A1D9CA2FE36AAA3844562B66BE1FF65340B4440FAC04EC3283DD1CF8054350
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a8eb345cb4fc63f02309fff94585e570610f27d5f0e8a93803fd0c2c43c4f830
                                        • Instruction ID: 3c8faeaf689c075a51afe46853d8d68e6ed4cb0a78f83f5f87f0edd77440288a
                                        • Opcode Fuzzy Hash: a8eb345cb4fc63f02309fff94585e570610f27d5f0e8a93803fd0c2c43c4f830
                                        • Instruction Fuzzy Hash: FEE11631E1DACA4FE775EA3888592A57BD0FF95380F1405FAD049C7292DE2CAC478B41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 320f286c661fcb1ba50fb32393a2c99c08b20cf875565e2162236ac8fcf25b53
                                        • Instruction ID: fc4975d2cb046ce6c30e0d40d854577f44ef2036c1f195859596bc16e40e5ef8
                                        • Opcode Fuzzy Hash: 320f286c661fcb1ba50fb32393a2c99c08b20cf875565e2162236ac8fcf25b53
                                        • Instruction Fuzzy Hash: 3DD16E3061C9498FEB98FF2CC458A7973E1FF99351B1140B9E44EC72A6DE28EC468B41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1334c6be86e3bc0b189ff5d3f1ff8f222208d6df47a9882903eda115621f4673
                                        • Instruction ID: 0a838b7284165e606595d61f518d40adda2e23b20c900fa5d6d74a3adfe92960
                                        • Opcode Fuzzy Hash: 1334c6be86e3bc0b189ff5d3f1ff8f222208d6df47a9882903eda115621f4673
                                        • Instruction Fuzzy Hash: 8FD1C130A0DA8A4FE765EB2884957B877D1FF55384F1401F9D58EC76D3EE2CA8468B04
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ab186ecd48fcd3e477dd5a7567cf53e4c21a8ce117cdc60ce1439407a6726d83
                                        • Instruction ID: 5d23191509109ffa48e70867773dcbc842f23a1a6436ed09ed642a6c10fe2cb3
                                        • Opcode Fuzzy Hash: ab186ecd48fcd3e477dd5a7567cf53e4c21a8ce117cdc60ce1439407a6726d83
                                        • Instruction Fuzzy Hash: FBD1A534A1CA4A8FDBA8EF28D4457B977E1FF99350F1401BAD04EC7292DF39A8418B41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a57f1c085975f7fa25053fdbf909d090770ef5428fed4f44e47ee3d292994803
                                        • Instruction ID: fa1f7d3a5e71160e3632640d5f0a52e4053ca3fae18d9ddb8cddc4a9a65d31fa
                                        • Opcode Fuzzy Hash: a57f1c085975f7fa25053fdbf909d090770ef5428fed4f44e47ee3d292994803
                                        • Instruction Fuzzy Hash: E7A17F31B1CA4A8FDB68EF28E4556B973E1FF89355F5041B9D44ED3282DE39E8028B44
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e1bf502691e27250bfe11d104a2178b4b8fabd21c4f8be44137fea9728a5c909
                                        • Instruction ID: acb3e7f460b5d0cd71abd650563c19575a49849881ee814fd561aa65c2848f8c
                                        • Opcode Fuzzy Hash: e1bf502691e27250bfe11d104a2178b4b8fabd21c4f8be44137fea9728a5c909
                                        • Instruction Fuzzy Hash: 4EB19220A0C94A4FE7A8FA2884957B977D2FF58384F5041BDD48EC76D3DE2CA8468B44
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 53291976b22be75d3a6c3d3279d8d5f471aab14c56870ea25891886cfa653aa1
                                        • Instruction ID: 2a3b8df87e464f6cdbc8ef892f426a54dabbe4e614830653934cf74b1d4b2a64
                                        • Opcode Fuzzy Hash: 53291976b22be75d3a6c3d3279d8d5f471aab14c56870ea25891886cfa653aa1
                                        • Instruction Fuzzy Hash: C8A16130B0C94A4FEBA8EA2D84957B877D2FF98384F5440B9D54EC36D3DE2DA8458B44
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 44b7b36866192ae3e5b93addd96697741c87deedf3feaae15980c579a0384150
                                        • Instruction ID: 3a5671ddc40b11e3fd0a2e49c63ace20c66b3463f195441afabf0a7f5533e17d
                                        • Opcode Fuzzy Hash: 44b7b36866192ae3e5b93addd96697741c87deedf3feaae15980c579a0384150
                                        • Instruction Fuzzy Hash: 9BA15030B0C94A4FEB68EA2D84957B977D2FF98384F5041B9D58EC36D3DE2CA8458B44
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0467a4b711c3c2d671a2eef34fae8441afe8d23097e55c3caba10176a5ce940e
                                        • Instruction ID: 0a0b9d607731f95c0745c148fd9229257463a309ba798ac3e2db8deeeef8330e
                                        • Opcode Fuzzy Hash: 0467a4b711c3c2d671a2eef34fae8441afe8d23097e55c3caba10176a5ce940e
                                        • Instruction Fuzzy Hash: E6915230B0C94A4FEBA8EA1D84957B977D2FF98384F5040B9D58EC36D3DE2DA8458744
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d79e7c1b9161086aaa7dae72ac3316f6326549a8110588cda3a3e7a964b3e910
                                        • Instruction ID: df8b19e8a686de99f36af9a9b17f3052e97ac397cdb6b8ea1dcbe14d96802809
                                        • Opcode Fuzzy Hash: d79e7c1b9161086aaa7dae72ac3316f6326549a8110588cda3a3e7a964b3e910
                                        • Instruction Fuzzy Hash: 00915230B0C94A4FEBA8EA2D84957B977D2FF98384F5041B9D58EC36D3DE2CA8458744
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d0b7dc00bf17dc68167259dfbf5cad8d2e04ba818c8275505aa6921374f6218
                                        • Instruction ID: 5a21bb09280d3002f6a8828e7894ed4cc7d790ce903164d5599070f3d691dae9
                                        • Opcode Fuzzy Hash: 1d0b7dc00bf17dc68167259dfbf5cad8d2e04ba818c8275505aa6921374f6218
                                        • Instruction Fuzzy Hash: 08915030B0C94A4FEBA8EA1D84957B977D2FF98384F5041B9D58EC36D3DE2CA8458B44
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c3283cb493dbdf62989576844e808bcd836d183f8ee107adc85aeb5ebbb95818
                                        • Instruction ID: a72a686f97ba6d7e9db9c3e19d74a89a7928e789b086538fb2e3b24922bfa65e
                                        • Opcode Fuzzy Hash: c3283cb493dbdf62989576844e808bcd836d183f8ee107adc85aeb5ebbb95818
                                        • Instruction Fuzzy Hash: 53711631B1D98A4FE798FB2CE85967577D1EF9A360F0400BAD44EC7292DD29AC428781
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eaf8325cf20099b74f03b6d838ceefa45a2d866fa6e2e481d2a4ee20e8237b7b
                                        • Instruction ID: a40ca63ba61dbd1b8263bfba0340b3b598c753ba7e6a7d7fcd0a5689936c361d
                                        • Opcode Fuzzy Hash: eaf8325cf20099b74f03b6d838ceefa45a2d866fa6e2e481d2a4ee20e8237b7b
                                        • Instruction Fuzzy Hash: 8661E071A2DD8B8FE6A8FB28945627563D2FF997C0B4400F9D00EC32D6DE2DAC028741
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f677bd84e53701e7e2357d11ef0afb5cc988f005f1905c06949ceb31b250934c
                                        • Instruction ID: 211ddd7dfdf3183789dd8fcdbd70364fa755e713af2e96f857a6bc98542da3a4
                                        • Opcode Fuzzy Hash: f677bd84e53701e7e2357d11ef0afb5cc988f005f1905c06949ceb31b250934c
                                        • Instruction Fuzzy Hash: 1E616E30A5DA8A4FEBA1EF28D858AB577E1EF49344F0504F6D459C72A2DF2CAC41CB41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 19d25abc40a9efb07f634478b2a66c3ac050bfc20255c2837f45ac92bfabeff7
                                        • Instruction ID: 5e373bdee35d8a0dfb06d79cbd0aeb812cb6e951a3f524511490aef6d811d101
                                        • Opcode Fuzzy Hash: 19d25abc40a9efb07f634478b2a66c3ac050bfc20255c2837f45ac92bfabeff7
                                        • Instruction Fuzzy Hash: CE51F432D0DECB4FD379AF2898551B57BD0EF553D0B0842BAD449C7292EE1CA98A8781
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c5fe332717d5b8c8091d670ade2592219626653c014b19bd54bdd838d0d4fc5
                                        • Instruction ID: b5bd64d058c41c24eb23875eff2857b2339539b29ae16845543990561d6afca2
                                        • Opcode Fuzzy Hash: 9c5fe332717d5b8c8091d670ade2592219626653c014b19bd54bdd838d0d4fc5
                                        • Instruction Fuzzy Hash: D7517931F0DE8A9FE3E5AA3C90556B573D2EF99781B5005FAC40EC328ADD296852CB40
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8f9137d2c5349f89afe7a83eb201a0c518fa150d964fe9ab155213354131e7c4
                                        • Instruction ID: 05da679b362fd994fb9010fadd29b182da81119b36d38b0fbbad9af34f54e857
                                        • Opcode Fuzzy Hash: 8f9137d2c5349f89afe7a83eb201a0c518fa150d964fe9ab155213354131e7c4
                                        • Instruction Fuzzy Hash: F9512A7161C68A5FEB64FB28A8446757BD0EF96364F1002BED48DC31D7EE2DA8038781
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a56a2d41c25d9810ea4f8dc1dee665bc88daab0868f6170c2e24d3187ddba73
                                        • Instruction ID: 19ea16c59a9aaada3d50fb02d4ba3c0f4312ac3d578020bb01c5c41edf24e6ee
                                        • Opcode Fuzzy Hash: 8a56a2d41c25d9810ea4f8dc1dee665bc88daab0868f6170c2e24d3187ddba73
                                        • Instruction Fuzzy Hash: 1441E020B1EA8A1FE755BB7858563F5B7D1EF88364F2401BAD00CC72C7DD1CA84683A2
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59ea5d5f30a5f7655bc9df12285abbdbfd091b371da6cbf433fda1762b6d082e
                                        • Instruction ID: c29fe964c8bb34d22b08b6a6de131b0eac63a314f394c002fe4a25e891260a92
                                        • Opcode Fuzzy Hash: 59ea5d5f30a5f7655bc9df12285abbdbfd091b371da6cbf433fda1762b6d082e
                                        • Instruction Fuzzy Hash: C941413060CA9A4FDBA8EF28D455AB633D2FF59350F1000A9E44EC7286DE39E852CB40
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d1d19bac8c2ddd8643773a7299ac56e401612839a39992f6bc75d61625f0a9fb
                                        • Instruction ID: 0a159338260bf14314bbc72518e9057afde0b380b195ac47405d23bb7c810518
                                        • Opcode Fuzzy Hash: d1d19bac8c2ddd8643773a7299ac56e401612839a39992f6bc75d61625f0a9fb
                                        • Instruction Fuzzy Hash: 0941E621A1DAC64FE755FB3C98686757FE1DFA6280B0C08FAD089C71A7D91D9C858702
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4c397f5b0c1a5fa413fa894de07bbad4e4690b2ea8b47907971ec883becbcbd5
                                        • Instruction ID: 5ae8cc2f94c17896c6316b614332e58e52a6f10377ed77e5c45feafaf9b94bac
                                        • Opcode Fuzzy Hash: 4c397f5b0c1a5fa413fa894de07bbad4e4690b2ea8b47907971ec883becbcbd5
                                        • Instruction Fuzzy Hash: 0841AF7190CA888FDB09DF68C8056A9BBE0FF99310F04426FD049D3252DB38A945CB91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6bf8449e52de8279d6539f936d314239117d1b75bae40b91c401c894a09b2823
                                        • Instruction ID: 93ec176a294607ade39cb7354d9e4d73b7bff889564d7455b13b2d695905c1ef
                                        • Opcode Fuzzy Hash: 6bf8449e52de8279d6539f936d314239117d1b75bae40b91c401c894a09b2823
                                        • Instruction Fuzzy Hash: 7B31F221A2DADA4FE365BB2898611B67BB0EF5A340F4444B7C04EC31C3DD2D680A8751
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 384d237b960806c45752260ddf7a0b6cfe3e48aa7423cf5a77be5a060d575084
                                        • Instruction ID: d597e46fa9c0edbdffe99adc5a2a7140aabe98ee0ec132c7dcb387ffd5e628cf
                                        • Opcode Fuzzy Hash: 384d237b960806c45752260ddf7a0b6cfe3e48aa7423cf5a77be5a060d575084
                                        • Instruction Fuzzy Hash: 2331463291EAC65FE396AB3848546A17BE1EF5A250B0844FEC049CB197DD2DAC47C740
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 271bee907c2a4b3dcaeaa8ee8e7a4482ce623ba07f276875a33c8ff24fe2e7c6
                                        • Instruction ID: 754deb66a2fd6c8d210508b22f3edb4b107b674045a3ecf33099f3e9b53806de
                                        • Opcode Fuzzy Hash: 271bee907c2a4b3dcaeaa8ee8e7a4482ce623ba07f276875a33c8ff24fe2e7c6
                                        • Instruction Fuzzy Hash: 3131D77161C90A5FEB98FF28E84967573C1EF993A4B1002BDE44DC3296EE2DE8024780
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 336b4e6500f0bd45cff5b60a698864d28eb88ae4cb4fe5147a19e07f5246812b
                                        • Instruction ID: d78a32c9d0610c617b692b33caa6be7178640814980c0e0825df7898283bf80c
                                        • Opcode Fuzzy Hash: 336b4e6500f0bd45cff5b60a698864d28eb88ae4cb4fe5147a19e07f5246812b
                                        • Instruction Fuzzy Hash: 0A31E110B2E94A1FF794FB6C989A3B8A2C2EF98754F6401BAD00DC32C7DD2CAC454355
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 65c90329d9b0e0f99fda8f97b1a8a91572abc121ba66800c40e63a62a583dfdd
                                        • Instruction ID: 75cde52e3d8683854fbe0851d3691b508b454d349d76bb1feec4add573a7a2cd
                                        • Opcode Fuzzy Hash: 65c90329d9b0e0f99fda8f97b1a8a91572abc121ba66800c40e63a62a583dfdd
                                        • Instruction Fuzzy Hash: 0D31FF3890DACB4FE3B9AA28985467176D0EF46390F5900FAC44FC7592DE1CE882CB41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1ac3837a1c2a50edcdae5d6cc6edb69d5a5e4a88c2063a6c3a028877e92eeade
                                        • Instruction ID: 2c63a245485bafe87bb7653dc5a842775a32b342ffa157ba87e72c231dfad75a
                                        • Opcode Fuzzy Hash: 1ac3837a1c2a50edcdae5d6cc6edb69d5a5e4a88c2063a6c3a028877e92eeade
                                        • Instruction Fuzzy Hash: 70212922F1ED4A1FF2A8A92D684957177D1EFE4290B6501FAE00DC328ADD18AC424690
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6a1a3e79326f8fcc857b461e80dd100158a50db5a23c5be14d37f96471c0bd50
                                        • Instruction ID: 85f102590223b22cf69fd3f0f8d515fd5024291b03086fd15944efadb38e8c40
                                        • Opcode Fuzzy Hash: 6a1a3e79326f8fcc857b461e80dd100158a50db5a23c5be14d37f96471c0bd50
                                        • Instruction Fuzzy Hash: 59218B31A18A4D8FDB98EF28D8456A977E1FF99315F10417EE40ED3282DB35E852CB40
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a07d612406a3525d16111fe617580a108c3784d60710935c2ec4a7ae174644f
                                        • Instruction ID: 130a530babe6d9b95c39819bddcda1fc658b70d582b97fe170bcd1f6b62495d3
                                        • Opcode Fuzzy Hash: 7a07d612406a3525d16111fe617580a108c3784d60710935c2ec4a7ae174644f
                                        • Instruction Fuzzy Hash: C3110D32B1DD4E1FF2B8A91D684957177D1EFD56A0B5501F9E00DC328AED18AC424690
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0b26243a7afb4d7b9eca0b51160737ff43434da2e9bcbc3cd2d3ad915a954d38
                                        • Instruction ID: ca143eb7860cfa8f407308c16e5271864df167dc2fcca301349aaf3247ea6b24
                                        • Opcode Fuzzy Hash: 0b26243a7afb4d7b9eca0b51160737ff43434da2e9bcbc3cd2d3ad915a954d38
                                        • Instruction Fuzzy Hash: FF21793061CA498FDB98EF1CD4456B9B7E1FF98321F10117EE48AD32A2CA35E8428B41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e5a28688dae0f4553e930e4bb16fefd187ae760da51fffb725ee6ba8ebdf126
                                        • Instruction ID: bbe5e7089e35f80f32c5aa1fe54aabd097e9fdd28139d84bd4880f8f23b65210
                                        • Opcode Fuzzy Hash: 1e5a28688dae0f4553e930e4bb16fefd187ae760da51fffb725ee6ba8ebdf126
                                        • Instruction Fuzzy Hash: 2121022692C99E5FEB25BB6884057FABBE0FF96350F0802B7E018C31C2DF1CA5558791
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d13e45b431885349a6e9acf35589d1fee52036308faf77cb18ead4ff6fe1b1f
                                        • Instruction ID: 1c8294c1df393acaec92c4c3b46ebc04066ac6e0b2775f64bfe1ea1966803588
                                        • Opcode Fuzzy Hash: 0d13e45b431885349a6e9acf35589d1fee52036308faf77cb18ead4ff6fe1b1f
                                        • Instruction Fuzzy Hash: 3921C231B2CA5A4EE764BB28C4952F672E1FB58340F80447AD04FC36C7DE2DA8068780
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 47fd496d8ec20c169cf21a65ae04608033b170b2f93670b79adabd12adb0e874
                                        • Instruction ID: 19d00dfa294ff3e8be9c84f02d0a1f95d8e132eac3d4bcf8e283bf0a6067a65f
                                        • Opcode Fuzzy Hash: 47fd496d8ec20c169cf21a65ae04608033b170b2f93670b79adabd12adb0e874
                                        • Instruction Fuzzy Hash: 9311A00148FAC61FE34667B48C295E23FA5DF8B19071E42E7E081CB5A3D84C498A83B2
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ae3740dd95b6d6ba793c2bf30eed220effd7029de36a866634a4f4bce5d93839
                                        • Instruction ID: 69fb064408f3dc3e335f347a8ddb16b8408c5b3ef873f53973d825ea353f4cab
                                        • Opcode Fuzzy Hash: ae3740dd95b6d6ba793c2bf30eed220effd7029de36a866634a4f4bce5d93839
                                        • Instruction Fuzzy Hash: B511C43158E6C61FC3469B748C20AD27FE5DFCB19030941F6E089CB5A3C91D9987C761
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 78a6d699c15415a838f9e2dde61795adfc5ec7d052d7dcd8c12fbf9647741536
                                        • Instruction ID: 1d4479699f4537bdc70d9085208d1fe99309fdccfcd96cdf70f620a4fdab555a
                                        • Opcode Fuzzy Hash: 78a6d699c15415a838f9e2dde61795adfc5ec7d052d7dcd8c12fbf9647741536
                                        • Instruction Fuzzy Hash: AE110131A1DBC94FD356EB3488690E97FB0EF96220B4905FBC184CB193EB2C694A8751
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f68886cf8b93ac2a95ecd2f769413ee5512950e249228f907e1a5b571708516
                                        • Instruction ID: 7b7e9669360176e4c53ecfeb9f332faeeae319b7df3b585b5bd786d96ea36513
                                        • Opcode Fuzzy Hash: 6f68886cf8b93ac2a95ecd2f769413ee5512950e249228f907e1a5b571708516
                                        • Instruction Fuzzy Hash: 8E01283190DB954FE752F72888452B97FD1DF85260F084ABED08CC60E2DE684AC6C387
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c2c537ed04acb8e85478a2a7a2508abc35e2e635a1c2eeb6e4199514921a75c6
                                        • Instruction ID: d6838a7a3487eed5f2b45fc43c4fb976cb19a8df715cc2e4b9932341a5282668
                                        • Opcode Fuzzy Hash: c2c537ed04acb8e85478a2a7a2508abc35e2e635a1c2eeb6e4199514921a75c6
                                        • Instruction Fuzzy Hash: 38F0C23180DAC96FEB11AB7898592EABFF0EF46300F4540E7D848D7293DA286A958741
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e51226a47880c05c5a09d032a0858159fca9dc5aa199f5854efefe651face09b
                                        • Instruction ID: 894700fa2e9bb654fa6082f4fc902c59a42119b3916d090aebba7b4a81b2ca59
                                        • Opcode Fuzzy Hash: e51226a47880c05c5a09d032a0858159fca9dc5aa199f5854efefe651face09b
                                        • Instruction Fuzzy Hash: 92F0D621E19DC75FD2A8BE3804515BA62E2FFD8680B8445BCD01EC3286CF1CB9064B01
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 90db19d8fd4f875f29c22c70a91f0b7187a64b831f5c273156be62f4276c8880
                                        • Instruction ID: 48022dd74922a311e3ea29dd298bcfa7ff7fd49ce8df8774c0692c90ef785437
                                        • Opcode Fuzzy Hash: 90db19d8fd4f875f29c22c70a91f0b7187a64b831f5c273156be62f4276c8880
                                        • Instruction Fuzzy Hash: 83F0973668DE8F1FE350BD9E98C14F07380FB403B4B5801BAC909C3481DA8EA8530280
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b2e8f475b2c671f66d3e2bf267a6af3831eecbdbf4112cb82820bfb5b2b96c98
                                        • Instruction ID: 7aa66cc4498c60c23065d05a3a2f3762807d4f665e045c52b087bdc773de905b
                                        • Opcode Fuzzy Hash: b2e8f475b2c671f66d3e2bf267a6af3831eecbdbf4112cb82820bfb5b2b96c98
                                        • Instruction Fuzzy Hash: 6DF0B430A2CA4A4FE755BA3C580427573D5FF45305F5409BDD889C7591DF28D8424741
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b43d43b492d4213959e61bb28802a0fa943040318bce010ea734979e5beae78
                                        • Instruction ID: 6c8d1ecce4743a7c7779fabf787fa419379958b9f467e0ce99b578513b5a0e17
                                        • Opcode Fuzzy Hash: 2b43d43b492d4213959e61bb28802a0fa943040318bce010ea734979e5beae78
                                        • Instruction Fuzzy Hash: 3BF08C7190D60D6FDA18FF59EC469EA37A8FB86220F00013AF44D82192E6256862CB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf0684dd68ec0025d4e2429798ca093fdff1ca473fad36cd5fa825859e9077ad
                                        • Instruction ID: 7ba1382fcfb21367da4b8061a9b8d10ff3f8f56deeb494129ace7e77169c63f6
                                        • Opcode Fuzzy Hash: bf0684dd68ec0025d4e2429798ca093fdff1ca473fad36cd5fa825859e9077ad
                                        • Instruction Fuzzy Hash: 14E048A391F3C55FC752AA3889695953F609E1729131A48FFC045DB1B3F14D8C0DC712
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1166c6ff3804cd25489c47a985e9db0361672f986eb1ef1639711b6ffb183d8
                                        • Instruction ID: 27ba853327b417b3d7f54e4a0839c4eed0135128d4873486665ed5fbacc50591
                                        • Opcode Fuzzy Hash: b1166c6ff3804cd25489c47a985e9db0361672f986eb1ef1639711b6ffb183d8
                                        • Instruction Fuzzy Hash: 78D0A763E5C68F0EF5907D0878910F163C0FF562B4B5002B7C48AD2187DD2FB9870641
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2093675079.00007FF849170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849170000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff849170000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4578cca5cb98f4bfff19d11a49fae82358a2a3af9f544dbef2eaa708a7071a37
                                        • Instruction ID: 7a629bbc91013eb3bd7550812ad5c9442e1c19bebcf01f8b7a949bb6ad396672
                                        • Opcode Fuzzy Hash: 4578cca5cb98f4bfff19d11a49fae82358a2a3af9f544dbef2eaa708a7071a37
                                        • Instruction Fuzzy Hash: 73F18722D1F2E3AFE351BB78B4950E67B70EF0226DB1C42B7D08C4D0539E1D658686A9
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.2091474985.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_7ff848f00000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fca22ef0f090f4595479521507cc9f3f5533080623a5316787b906355cead8dd
                                        • Instruction ID: bc9cdb7ba2a4b5f5c065d45471071fec397d04d3478614ebe7a474add06bb084
                                        • Opcode Fuzzy Hash: fca22ef0f090f4595479521507cc9f3f5533080623a5316787b906355cead8dd
                                        • Instruction Fuzzy Hash: 6AB1E963E0EAC24FE257A73C28141756FA1EF93AA4F0845FFC2884F5D7B9485C468399

                                        Execution Graph

                                        Execution Coverage:10%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:3
                                        Total number of Limit Nodes:0
                                        execution_graph 11350 7ff848f23569 11351 7ff848f23571 DeleteFileW 11350->11351 11353 7ff848f23616 11351->11353

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 7ff8491993c1-7ff849199409 2 7ff84919940b-7ff849199419 0->2 3 7ff84919941a-7ff84919942c 0->3 5 7ff849199432-7ff849199442 3->5 6 7ff8491994af-7ff8491994b3 3->6 14 7ff849199448-7ff849199497 5->14 15 7ff84919972b-7ff849199761 5->15 7 7ff8491994b5-7ff8491994b9 6->7 8 7ff8491994cb-7ff8491994cf 6->8 16 7ff8491994c0-7ff8491994c4 7->16 9 7ff8491994d1-7ff8491994f8 8->9 10 7ff8491994fe-7ff849199502 8->10 9->10 20 7ff849199781-7ff849199799 9->20 12 7ff849199508-7ff84919950d 10->12 13 7ff84919971c-7ff84919972a 10->13 12->13 19 7ff849199513-7ff84919951d 12->19 49 7ff8491994a4-7ff8491994a8 14->49 50 7ff849199499-7ff8491994a2 14->50 16->8 27 7ff84919956b-7ff849199570 19->27 28 7ff84919951f-7ff849199531 19->28 37 7ff8491997a5 20->37 38 7ff84919979b-7ff8491997a1 20->38 30 7ff849199576-7ff849199580 27->30 31 7ff8491996f8-7ff8491996fd 27->31 28->27 39 7ff849199533-7ff84919955e 28->39 30->31 40 7ff849199586-7ff849199598 30->40 31->13 33 7ff8491996ff-7ff849199714 31->33 33->13 46 7ff849199716-7ff849199719 33->46 42 7ff8491997a9-7ff849199808 37->42 43 7ff8491997a7 37->43 41 7ff8491997a3 38->41 38->42 39->27 56 7ff849199560-7ff849199564 39->56 53 7ff84919968e-7ff8491996f1 40->53 54 7ff84919959e-7ff8491995c5 40->54 41->37 61 7ff849199dae-7ff849199dc0 42->61 62 7ff84919980e-7ff849199820 42->62 43->42 46->13 49->6 50->6 53->31 56->27 62->61 67 7ff849199826-7ff84919985f 62->67 67->61 73 7ff849199865-7ff8491998a6 67->73 77 7ff849199958-7ff84919996b 73->77 78 7ff8491998ac-7ff8491998c4 73->78 83 7ff8491999c0 77->83 84 7ff84919996d-7ff84919998e 77->84 81 7ff8491998ca-7ff8491998ea 78->81 82 7ff84919994c-7ff849199952 78->82 81->82 98 7ff8491998ec-7ff8491998fe 81->98 82->77 82->78 85 7ff8491999c2-7ff8491999c7 83->85 90 7ff849199990-7ff8491999b7 84->90 91 7ff8491999b9-7ff8491999be 84->91 86 7ff8491999c9-7ff8491999d0 85->86 87 7ff849199a0e-7ff849199a31 85->87 92 7ff8491999d7-7ff8491999f1 86->92 95 7ff849199b27-7ff849199b33 87->95 96 7ff849199a37-7ff849199a5f 87->96 90->85 91->85 92->87 102 7ff8491999f3-7ff849199a0c 92->102 95->61 100 7ff849199b39-7ff849199b4e 95->100 109 7ff849199a65-7ff849199a80 96->109 110 7ff849199b1b-7ff849199b21 96->110 98->82 104 7ff849199900-7ff849199904 98->104 100->61 102->87 107 7ff849199dc1-7ff849199e63 104->107 108 7ff84919990a-7ff84919991f 104->108 120 7ff849199f75-7ff849199fa8 107->120 121 7ff849199e69-7ff849199e6b 107->121 115 7ff849199926-7ff849199928 108->115 109->110 122 7ff849199a86-7ff849199a98 109->122 110->95 110->96 115->82 116 7ff84919992a-7ff849199948 call 7ff849194bb0 115->116 116->82 136 7ff849199faf-7ff849199fba 120->136 124 7ff849199e85-7ff849199e93 121->124 125 7ff849199e6d-7ff849199e7f 121->125 122->110 134 7ff849199a9e-7ff849199aa2 122->134 128 7ff849199e99-7ff849199eb0 124->128 129 7ff849199fe8-7ff84919a01b 124->129 125->124 125->136 147 7ff849199eb2-7ff849199ec4 128->147 148 7ff849199eca-7ff849199ecd 128->148 150 7ff84919a022-7ff84919a061 129->150 134->107 138 7ff849199aa8-7ff849199aeb 134->138 143 7ff849199f41-7ff849199f42 136->143 144 7ff849199fbc-7ff849199fd1 136->144 138->110 166 7ff849199aed-7ff849199b18 call 7ff849194bb0 138->166 153 7ff849199fd3 144->153 154 7ff849199fd6-7ff849199fe1 144->154 147->148 147->150 151 7ff849199ef6-7ff849199f12 call 7ff849197240 148->151 152 7ff849199ecf-7ff849199ee6 148->152 174 7ff84919a063-7ff84919a069 150->174 175 7ff84919a06d 150->175 168 7ff849199f43-7ff849199f47 151->168 169 7ff849199f14-7ff849199f40 151->169 152->151 170 7ff849199ee8-7ff849199eec 152->170 153->154 154->129 166->110 176 7ff849199f4e-7ff849199f74 168->176 169->143 178 7ff849199ef3-7ff849199ef4 170->178 179 7ff84919a071-7ff84919a0ac 174->179 180 7ff84919a06b 174->180 175->179 182 7ff84919a06f 175->182 178->151 186 7ff84919a0ef-7ff84919a122 179->186 187 7ff84919a0ae-7ff84919a0d5 179->187 180->175 182->179 194 7ff84919a129-7ff84919a171 186->194 187->194 195 7ff84919a0d7-7ff84919a0ee 187->195 201 7ff84919a173 194->201 202 7ff84919a175-7ff84919a197 194->202 201->202 203 7ff84919a1b5-7ff84919a1ba 201->203 205 7ff84919a27a-7ff84919a292 202->205 206 7ff84919a19d-7ff84919a1af 202->206 208 7ff84919a293-7ff84919a295 205->208 212 7ff84919a1b1-7ff84919a1b4 206->212 213 7ff84919a1bb-7ff84919a1d3 call 7ff8491938a0 206->213 210 7ff84919a297-7ff84919a2c3 208->210 211 7ff84919a2df-7ff84919a2e2 208->211 226 7ff84919a305 210->226 230 7ff84919a2c5-7ff84919a2dd 210->230 215 7ff84919a2e4-7ff84919a2f4 211->215 216 7ff84919a309-7ff84919a30b 211->216 212->203 222 7ff84919a1d5-7ff84919a206 213->222 223 7ff84919a237-7ff84919a240 213->223 220 7ff84919a2f5-7ff84919a2ff 215->220 218 7ff84919a30d-7ff84919a31b 216->218 219 7ff84919a31c-7ff84919a32c 216->219 220->216 225 7ff84919a301-7ff84919a302 220->225 234 7ff84919a231-7ff84919a235 222->234 235 7ff84919a208-7ff84919a22f 222->235 225->226 226->220 229 7ff84919a307 226->229 229->216 230->211 234->222 234->223 235->234 237 7ff84919a241-7ff84919a266 235->237 237->208 240 7ff84919a268-7ff84919a279 237->240
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH$HAH$HAH$HAH$HAH
                                        • API String ID: 0-4024470385
                                        • Opcode ID: 18e7aab77b058f7fcae9ecd3b4cbfa57e61e213bb24e277f2e906a924feb1981
                                        • Instruction ID: 17536e4ff0b9510d8743353485f2882be3947ac2b87d94ff0377e961f3b0aa26
                                        • Opcode Fuzzy Hash: 18e7aab77b058f7fcae9ecd3b4cbfa57e61e213bb24e277f2e906a924feb1981
                                        • Instruction Fuzzy Hash: 3192F330A1C9894FEBA8EF2C9459A7577D1FF99394F0400BAD44EC7296DE2DAC42CB41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 501 7ff849194dc6-7ff849194dd8 503 7ff849194dda-7ff849194e33 501->503 504 7ff849194dbe-7ff849194dc3 501->504 506 7ff849194e84-7ff849194ebc call 7ff8491938a0 call 7ff849193730 503->506 507 7ff849194e35-7ff849194e40 503->507 516 7ff849194ed8-7ff849194ee0 506->516 517 7ff849194ebe-7ff849194ed3 call 7ff849194ae0 506->517 509 7ff849194e47-7ff849194e4a 507->509 509->506 511 7ff849194e4c-7ff849194e61 call 7ff849193730 509->511 511->506 521 7ff849194e63-7ff849194e7f call 7ff849193140 511->521 519 7ff849194ee2-7ff849194efa 516->519 520 7ff849194efc 516->520 517->516 522 7ff849194efe-7ff849194f05 519->522 520->522 521->506 525 7ff849194f07-7ff849194f17 522->525 526 7ff849194f18-7ff849194f5a 522->526 527 7ff849194f60-7ff849194f93 526->527 528 7ff849195a36-7ff849195a40 526->528 540 7ff849194f99-7ff849194fab 527->540 541 7ff8491951ee-7ff849195200 527->541 529 7ff849195a42-7ff849195a4d 528->529 530 7ff849195a58 528->530 531 7ff849195a5d-7ff849195a5f 529->531 530->531 533 7ff849195a61-7ff849195a73 531->533 534 7ff849195a7a-7ff849195a7f 531->534 533->534 536 7ff849195a81 534->536 537 7ff849195a84-7ff849195a95 534->537 536->537 543 7ff84919620e-7ff8491962be 537->543 540->541 545 7ff849194fb1-7ff849194fe3 540->545 547 7ff8491952c3-7ff8491952c5 541->547 548 7ff849195206-7ff849195232 541->548 556 7ff849194fe5-7ff849195007 545->556 557 7ff849195016-7ff84919504a 545->557 550 7ff849195335-7ff849195347 547->550 551 7ff8491952c7-7ff8491952d9 547->551 548->547 554 7ff849195238-7ff84919523d 548->554 563 7ff84919591b-7ff84919592d 550->563 564 7ff84919534d-7ff849195379 550->564 551->550 561 7ff8491952db-7ff8491952de 551->561 554->547 560 7ff849195243-7ff849195246 554->560 556->557 578 7ff84919504c-7ff84919506c 557->578 579 7ff84919507e-7ff8491950b5 557->579 565 7ff849195248-7ff849195251 560->565 566 7ff84919526b-7ff849195274 560->566 567 7ff8491952e0-7ff8491952fb 561->567 568 7ff849195304-7ff849195332 call 7ff849194bb0 561->568 588 7ff84919599c-7ff8491959ae 563->588 589 7ff84919592f-7ff849195937 563->589 581 7ff84919537b-7ff849195384 564->581 582 7ff8491953af-7ff8491953c6 564->582 565->566 575 7ff849195276-7ff849195299 566->575 576 7ff84919529b-7ff8491952c0 call 7ff849194bb0 566->576 567->568 568->550 575->576 576->547 578->579 596 7ff849195141-7ff84919516e 579->596 597 7ff8491950bb-7ff8491950d3 579->597 591 7ff849195386-7ff849195396 581->591 592 7ff8491953a8-7ff8491953a9 581->592 607 7ff8491954c2-7ff8491954ef 582->607 608 7ff8491953cc-7ff8491953f5 582->608 609 7ff8491959b0-7ff8491959ba 588->609 610 7ff849195a25-7ff849195a30 588->610 589->588 595 7ff849195939-7ff849195966 589->595 591->592 592->582 595->588 613 7ff849195968-7ff849195971 595->613 624 7ff849195170-7ff849195179 596->624 625 7ff8491951a4-7ff8491951ae 596->625 605 7ff8491950d5-7ff8491950e5 597->605 606 7ff849195138-7ff84919513f 597->606 617 7ff849195105-7ff849195136 605->617 606->617 629 7ff8491954f1-7ff84919551c 607->629 630 7ff84919551f-7ff849195548 607->630 608->563 634 7ff8491953fb-7ff84919541b 608->634 615 7ff8491959c0-7ff8491959ec 609->615 616 7ff849195a4f-7ff849195a56 609->616 610->527 610->528 621 7ff849195973-7ff849195983 613->621 622 7ff849195995-7ff849195996 613->622 615->610 639 7ff8491959ee-7ff8491959f7 615->639 616->610 617->625 621->622 622->588 626 7ff84919517b-7ff84919518b 624->626 627 7ff84919519d-7ff84919519e 624->627 625->543 632 7ff8491951b4-7ff8491951d5 625->632 626->627 627->625 629->630 648 7ff84919554e-7ff84919557d 630->648 649 7ff8491955df-7ff8491955f3 630->649 632->541 650 7ff8491951d7-7ff8491951e6 632->650 634->607 645 7ff8491959f9-7ff849195a09 639->645 646 7ff849195a1e-7ff849195a1f 639->646 645->646 646->610 648->649 655 7ff84919557f-7ff8491955ab 648->655 651 7ff8491955f5-7ff84919560c 649->651 650->541 656 7ff849195647-7ff849195674 651->656 657 7ff84919560e-7ff849195613 651->657 655->649 662 7ff8491955ad-7ff8491955dc 655->662 664 7ff849195676-7ff8491956c7 call 7ff849194ae0 656->664 665 7ff8491956cc-7ff8491956f8 656->665 657->656 658 7ff849195615-7ff849195637 657->658 658->651 668 7ff849195639-7ff849195644 658->668 662->649 664->665 673 7ff8491956fa-7ff849195738 call 7ff849194ae0 665->673 674 7ff84919573d-7ff849195769 665->674 668->656 673->674 679 7ff84919576b-7ff8491957a9 call 7ff849194ae0 674->679 680 7ff8491957ae-7ff8491957da 674->680 679->680 684 7ff849195842-7ff84919586f 680->684 685 7ff8491957dc-7ff8491957f0 680->685 691 7ff849195871-7ff8491958af call 7ff849194ae0 684->691 692 7ff8491958b4-7ff8491958e0 684->692 688 7ff8491957f1-7ff849195811 685->688 688->684 693 7ff849195813-7ff849195835 688->693 691->692 692->563 699 7ff8491958e2-7ff8491958eb 692->699 693->688 703 7ff849195837-7ff84919583a 693->703 701 7ff849195912-7ff849195913 699->701 702 7ff8491958ed-7ff849195910 699->702 701->563 702->701 703->684
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: 50e423830797252b7462f863199c31a83f9fd6edc4e5c65c69deaa3f400b834a
                                        • Instruction ID: 5001a460aab2008c969c54fdd5686bb0f13a1b5c6ecca69454e70ff956366ed1
                                        • Opcode Fuzzy Hash: 50e423830797252b7462f863199c31a83f9fd6edc4e5c65c69deaa3f400b834a
                                        • Instruction Fuzzy Hash: 5492A570A1CA598FDF98EF18C494BA97BE2FF58344F5041A8D44ED7296CE39E885CB40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 706 7ff849195be1-7ff849195bfb 707 7ff849195bff-7ff849195c01 706->707 708 7ff849195ce7-7ff849195cf9 707->708 709 7ff849195c07-7ff849195c56 707->709 711 7ff849195cff-7ff849195d95 708->711 709->708 714 7ff849195c5c-7ff849195c97 709->714 721 7ff84919601e-7ff84919603b 711->721 719 7ff849195cc4-7ff849195cd5 714->719 720 7ff849195c99-7ff849195cc2 714->720 719->714 722 7ff849195cd7 719->722 720->719 737 7ff849195cd9-7ff849195ce1 720->737 723 7ff849196041-7ff849196044 721->723 724 7ff849195af5-7ff849195b2f 721->724 722->708 726 7ff849196066-7ff849196087 723->726 727 7ff849196046-7ff84919604a 723->727 724->721 742 7ff849195b35-7ff849195b7f 724->742 732 7ff8491960a6-7ff8491960ab 726->732 733 7ff849196089-7ff84919609f 726->733 727->726 730 7ff84919604c-7ff849196061 call 7ff849194ae0 727->730 730->726 735 7ff8491960ed-7ff8491960f4 732->735 736 7ff8491960ad-7ff8491960cb 732->736 733->732 740 7ff849196122-7ff849196127 735->740 741 7ff8491960f6-7ff849196102 735->741 736->735 745 7ff8491960cd-7ff8491960d9 736->745 737->708 743 7ff8491961fc-7ff84919620d 740->743 744 7ff84919612d-7ff849196135 740->744 751 7ff849196109-7ff84919610f 741->751 742->721 756 7ff849195b85-7ff849195b88 742->756 747 7ff849196287-7ff8491962be 744->747 748 7ff84919613b-7ff84919614b 744->748 749 7ff8491960e5-7ff8491960eb 745->749 750 7ff8491960db-7ff8491960e3 745->750 761 7ff84919615b-7ff849196163 748->761 762 7ff84919614d-7ff849196151 748->762 749->735 749->745 750->749 753 7ff849196111-7ff849196112 751->753 754 7ff84919611a-7ff849196120 751->754 753->754 754->740 754->741 759 7ff849195bb5-7ff849195bd3 756->759 760 7ff849195b8a-7ff849195baf 756->760 767 7ff849195bd9-7ff849195bdb 759->767 768 7ff849195d9a-7ff849195db3 759->768 760->721 760->759 761->747 765 7ff849196169-7ff849196179 761->765 762->747 763 7ff849196157-7ff849196158 762->763 763->761 774 7ff849196189-7ff849196191 765->774 775 7ff84919617b-7ff84919617f 765->775 767->706 767->721 772 7ff849195db9-7ff849195e00 768->772 773 7ff849195e8f-7ff849195ea8 768->773 789 7ff849195e02-7ff849195e15 772->789 790 7ff849195e1b-7ff849195e8a 772->790 773->721 779 7ff849195eae-7ff849195eb0 773->779 774->747 776 7ff849196197-7ff8491961a7 774->776 775->747 778 7ff849196185-7ff849196186 775->778 783 7ff8491961b7-7ff8491961bf 776->783 784 7ff8491961a9-7ff8491961ad 776->784 778->774 779->721 782 7ff849195eb6-7ff849195ed3 779->782 782->721 791 7ff849195ed9-7ff849195edd 782->791 783->747 787 7ff8491961c5-7ff8491961d5 783->787 784->747 786 7ff8491961b3-7ff8491961b4 784->786 786->783 796 7ff8491961e5-7ff8491961f5 787->796 797 7ff8491961d7-7ff8491961db 787->797 789->721 789->790 790->721 791->721 795 7ff849195ee3-7ff849195f06 791->795 799 7ff849195f0d-7ff849196013 795->799 796->743 797->747 798 7ff8491961e1-7ff8491961e2 797->798 798->796 799->721
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: *%I
                                        • API String ID: 0-3524644257
                                        • Opcode ID: 54808ccf77d4b549684ee25b3be00e0c1877cc42a23e15d4f7cb1167b8a36e4d
                                        • Instruction ID: 9208b29016d09c793de702c1e32cf8d6e2e688d31c855150a4ffe504d76f41c8
                                        • Opcode Fuzzy Hash: 54808ccf77d4b549684ee25b3be00e0c1877cc42a23e15d4f7cb1167b8a36e4d
                                        • Instruction Fuzzy Hash: A7325C30A18A598FEBA4EF18C8857A9B7E1FFA8344F5045B9D44ED3295DB34E981CF40
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 027920c7c5276570b85542bc1f4e5587c43c4d9188c1bcd6d55685ace63d58a3
                                        • Instruction ID: 842fed6330de5f9945c6c152990b2d87f5aff33adc30a04d233292505c3b586b
                                        • Opcode Fuzzy Hash: 027920c7c5276570b85542bc1f4e5587c43c4d9188c1bcd6d55685ace63d58a3
                                        • Instruction Fuzzy Hash: BC62513060CA498FEB98EB2CC458B6977E1FF99344F1445BAE44DC72A6DE38E845CB41
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b36f49fabefe3aafc18d1720a463cdb0363d54fe11d5550dd0d5443fc43b1053
                                        • Instruction ID: 676c17c296b48ab9e479d26e86f8b7949ec009e37f966d89c9563676283539ff
                                        • Opcode Fuzzy Hash: b36f49fabefe3aafc18d1720a463cdb0363d54fe11d5550dd0d5443fc43b1053
                                        • Instruction Fuzzy Hash: 32228030A1CA494FEBA8EF1894957B973E2FF98344F5441BDD44EC3692DE39A842CB41

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH
                                        • API String ID: 0-4204409433
                                        • Opcode ID: d65be5e795112607ac6ba079b9986816e2200c042e787d65140ca06c49c75d03
                                        • Instruction ID: a7015334e991d6f4f21ac8a120a93598c26d8183b7c9017dbd106e40912bdb6d
                                        • Opcode Fuzzy Hash: d65be5e795112607ac6ba079b9986816e2200c042e787d65140ca06c49c75d03
                                        • Instruction Fuzzy Hash: 1061C171A2DD8A4FE6A9EB2CD45667563D2FF987D4B4800B9D00EC32D6DE2DAC02C750

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X!(I$`"(I$a&_H
                                        • API String ID: 0-2743432387
                                        • Opcode ID: 2f6be554e39ffe5b0b940c082e17de6ce9dead3fa9b6295eb0173b8a7a45fcba
                                        • Instruction ID: d85c1ea4ee8b84674dbd499e331d2457e23414a15258922e965f26f8dac5797c
                                        • Opcode Fuzzy Hash: 2f6be554e39ffe5b0b940c082e17de6ce9dead3fa9b6295eb0173b8a7a45fcba
                                        • Instruction Fuzzy Hash: D651D472F1CE8A5FE3A9EA2C50556B573D1FFA8794B50057AC08EC32C6DE2DA9428740

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 386 7ff84919a3d9-7ff84919a3fa 389 7ff84919a402-7ff84919a4d3 386->389 390 7ff84919a3fc-7ff84919a401 386->390 396 7ff84919a4db-7ff84919a4dd 389->396 397 7ff84919a4e9-7ff84919a4f5 396->397 398 7ff84919a4df-7ff84919a4e4 396->398 401 7ff84919a4fb-7ff84919a50d 397->401 402 7ff84919a59e-7ff84919a5ba 397->402 399 7ff84919a778-7ff84919a78b 398->399 401->402 405 7ff84919a513-7ff84919a532 401->405 406 7ff84919a6b1-7ff84919a6b5 402->406 407 7ff84919a5c0-7ff84919a5e4 402->407 418 7ff84919a565-7ff84919a575 405->418 419 7ff84919a534-7ff84919a538 405->419 408 7ff84919a6c1-7ff84919a6e6 406->408 409 7ff84919a6b7-7ff84919a6bc 406->409 414 7ff84919a6a5-7ff84919a6ab 407->414 415 7ff84919a5ea-7ff84919a617 407->415 416 7ff84919a76b-7ff84919a775 408->416 417 7ff84919a6ec-7ff84919a6f1 408->417 409->399 414->406 414->407 424 7ff84919a697-7ff84919a69e 415->424 425 7ff84919a619-7ff84919a622 415->425 416->399 417->399 427 7ff84919a577-7ff84919a588 418->427 428 7ff84919a599 418->428 419->402 420 7ff84919a53a-7ff84919a556 419->420 420->428 430 7ff84919a558-7ff84919a563 420->430 424->414 425->414 429 7ff84919a628-7ff84919a62c 425->429 436 7ff84919a58f-7ff84919a594 427->436 428->402 432 7ff84919a632-7ff84919a64f 429->432 433 7ff84919a6f6-7ff84919a764 429->433 430->418 430->436 432->428 439 7ff84919a655-7ff84919a667 432->439 433->416 436->399 439->414 442 7ff84919a669-7ff84919a680 439->442 442->428 446 7ff84919a686-7ff84919a692 442->446 446->424
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH
                                        • API String ID: 0-524784639
                                        • Opcode ID: 2b91ac9e68fa1ccd56e733f45d1593e1f074c44b4387ba584da70abee1e0b60d
                                        • Instruction ID: 258e5f35d57c748949129334e41e417a750fe013c0daee3fd2e064e18f350db1
                                        • Opcode Fuzzy Hash: 2b91ac9e68fa1ccd56e733f45d1593e1f074c44b4387ba584da70abee1e0b60d
                                        • Instruction Fuzzy Hash: 29C18130A1CA498FEBA8EF28D4457B9B7E1FF98344F54417AD04EC7292DE38A845CB41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 806 7ff849192c10-7ff849192c2c 807 7ff849192c34-7ff849192c48 806->807 808 7ff849192c2e-7ff849192c32 806->808 809 7ff849192c4b-7ff849192caa 807->809 808->807 808->809 816 7ff849192cf4-7ff849192d5e 809->816 817 7ff849192cac-7ff849192cf3 809->817 827 7ff849192d60-7ff849192d62 816->827 828 7ff849192dcf-7ff849192ddc 816->828 817->816 829 7ff849192d64 827->829 830 7ff849192dde-7ff849192de0 827->830 828->830 831 7ff849192e4d-7ff849192e56 828->831 832 7ff849192d66-7ff849192d6e 829->832 833 7ff849192dab 829->833 834 7ff849192de2 830->834 835 7ff849192e5c-7ff849192e64 830->835 841 7ff849192e58-7ff849192e59 831->841 837 7ff849192d70 832->837 838 7ff849192dea-7ff849192dec 832->838 842 7ff849192e2c-7ff849192e34 833->842 843 7ff849192dac 833->843 839 7ff849192de4 834->839 840 7ff849192e29 834->840 844 7ff849192e65-7ff849192e67 835->844 847 7ff849192d72-7ff849192d9a 837->847 848 7ff849192db7-7ff849192dce 837->848 851 7ff849192e68-7ff849192e70 838->851 852 7ff849192dee 838->852 849 7ff849192de7 839->849 845 7ff849192eaa-7ff849192ec2 840->845 846 7ff849192e2a 840->846 841->835 850 7ff849192e35-7ff849192e4c 842->850 853 7ff849192df3-7ff849192e0a 843->853 854 7ff849192dad-7ff849192db6 843->854 844->851 856 7ff849192e71-7ff849192e79 846->856 857 7ff849192e2b 846->857 866 7ff849192e0b-7ff849192e18 847->866 867 7ff849192d9c-7ff849192d9e 847->867 848->828 849->841 858 7ff849192de9 849->858 850->831 851->856 852->850 859 7ff849192df0 852->859 853->866 854->848 865 7ff849192e81-7ff849192e87 856->865 857->842 858->838 859->853 868 7ff849192e89-7ff849192e92 865->868 866->868 870 7ff849192e1a-7ff849192e1c 866->870 869 7ff849192da0 867->869 867->870 869->849 871 7ff849192da2-7ff849192daa 869->871 872 7ff849192e98-7ff849192e9d 870->872 873 7ff849192e1e 870->873 871->833 877 7ff849192e26-7ff849192e28 871->877 875 7ff849192ee7-7ff849192f31 872->875 876 7ff849192e9f-7ff849192ea3 872->876 873->844 874 7ff849192e20-7ff849192e25 873->874 874->877 882 7ff849192fe0-7ff849193038 875->882 883 7ff849192f37-7ff849192f3a 875->883 878 7ff849192ea4-7ff849192ea8 876->878 877->840 877->878 878->845 894 7ff84919303f-7ff849193055 882->894 883->882 884 7ff849192f40-7ff849192f41 883->884 886 7ff849192f42-7ff849192f4b 884->886 891 7ff849192f4d-7ff849192fcf 886->891 904 7ff849192fd6-7ff849192fdf 891->904 897 7ff849193057-7ff84919306a 894->897 898 7ff84919306b-7ff849193071 894->898 897->898
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: 0f2baf96655ccebf738db9fb067d2e925775fc1835d4a79bfa51985212993bbf
                                        • Instruction ID: 2f9d1b58a8b637905b3a27458d2610d219a11ec1a937dcc2be2e6608412ca790
                                        • Opcode Fuzzy Hash: 0f2baf96655ccebf738db9fb067d2e925775fc1835d4a79bfa51985212993bbf
                                        • Instruction Fuzzy Hash: 4CE13632E1D9CA4FE7B5FA2C98492B57BD0EF95394F0405BAD049C7292DE2CAC46CB41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 905 7ff849193f19-7ff849193f1b 906 7ff849193f65-7ff849193fa6 905->906 907 7ff849193f1d-7ff849193f47 905->907 912 7ff849193fa8-7ff849193fa9 906->912 913 7ff849193fab-7ff849193fbd 906->913 907->906 912->913 916 7ff84919400d-7ff84919400e 913->916 917 7ff849193fbf-7ff849193fc7 913->917 921 7ff849194015-7ff84919401d 916->921 919 7ff849194002-7ff849194008 917->919 920 7ff849193fc9-7ff849193fcc 917->920 923 7ff849194513-7ff849194525 919->923 920->919 922 7ff849193fce-7ff849193ffd 920->922 924 7ff849194038-7ff84919403e 921->924 925 7ff84919401f-7ff849194034 921->925 926 7ff849194526-7ff849194539 922->926 923->926 928 7ff849194044-7ff849194058 924->928 929 7ff849194379-7ff849194380 924->929 925->924 928->929 930 7ff849194382-7ff849194385 929->930 931 7ff849194387-7ff849194393 929->931 933 7ff849194395-7ff849194398 930->933 931->933 935 7ff8491943a5-7ff8491943ad 933->935 936 7ff84919439a-7ff8491943a0 933->936 938 7ff8491943b3-7ff8491943d0 935->938 939 7ff84919450d 935->939 936->926 941 7ff8491943d2-7ff8491943e2 call 7ff849193020 938->941 942 7ff8491943f7-7ff849194402 938->942 939->923 941->942 950 7ff8491943e4-7ff8491943f2 941->950 944 7ff8491944c2-7ff8491944c5 942->944 945 7ff849194408-7ff84919440d 942->945 944->939 949 7ff8491944c7-7ff8491944cd 944->949 947 7ff849194414-7ff849194417 945->947 948 7ff84919440f 945->948 951 7ff849194427-7ff84919442a 947->951 952 7ff849194419-7ff849194423 947->952 948->947 953 7ff8491944d6 949->953 954 7ff8491944cf-7ff8491944d4 949->954 950->942 955 7ff84919447a-7ff84919447d 951->955 956 7ff84919442c-7ff84919442f 951->956 952->951 957 7ff8491944db-7ff84919450b 953->957 954->957 959 7ff84919448a-7ff84919448f 955->959 960 7ff84919447f-7ff849194488 955->960 961 7ff849194451-7ff849194454 956->961 962 7ff849194431-7ff84919444b 956->962 957->926 966 7ff849194493-7ff8491944c0 959->966 960->966 963 7ff849194464-7ff84919446a 961->963 964 7ff849194456-7ff84919445c 961->964 962->961 972 7ff84919453a-7ff849194561 962->972 963->955 968 7ff84919446c-7ff849194476 963->968 964->963 967 7ff84919445e-7ff849194461 964->967 966->926 967->963 968->955 976 7ff849194563-7ff849194576 972->976 977 7ff849194578-7ff84919459c 972->977 980 7ff84919459e-7ff849194614 976->980 977->980 985 7ff849194616-7ff849194618 980->985 986 7ff849194619-7ff849194653 980->986 985->986 988 7ff849194664-7ff849194676 986->988 989 7ff849194655-7ff84919465d 986->989 992 7ff849194683-7ff84919468c 988->992 993 7ff849194678-7ff849194682 988->993 989->988 990 7ff84919465f 989->990 994 7ff8491946fc-7ff849194701 990->994 992->994
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: 488f0b8c438b12fea8e419c8a5df85de028107d76c438eea67ecc784aae0fc38
                                        • Instruction ID: 1b150359fe1fb0c15d211ee5d6a5b1789a60c85158ef2aa24a026fea785a44cc
                                        • Opcode Fuzzy Hash: 488f0b8c438b12fea8e419c8a5df85de028107d76c438eea67ecc784aae0fc38
                                        • Instruction Fuzzy Hash: 86E12731A0CA9A4FE7A5AF28985537937D1EF56354F0402BAD48EC72D2DE1CAC46C782

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 996 7ff848f23525-7ff848f2352f 997 7ff848f23571-7ff848f235d8 996->997 998 7ff848f23531-7ff848f23562 996->998 1005 7ff848f235da-7ff848f235df 997->1005 1006 7ff848f235e2-7ff848f23614 DeleteFileW 997->1006 998->997 1005->1006 1007 7ff848f2361c-7ff848f2364a 1006->1007 1008 7ff848f23616 1006->1008 1008->1007
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2205422456.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff848f20000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 621667b5e92df981a467c3468a716cdc75b405d6f3084c27cd931e2e74ebe20d
                                        • Instruction ID: 94eeb3ceba49940d97bc64828f464bc8390313a7bdfe520e21ef9d0706a0c236
                                        • Opcode Fuzzy Hash: 621667b5e92df981a467c3468a716cdc75b405d6f3084c27cd931e2e74ebe20d
                                        • Instruction Fuzzy Hash: DC41F57180DB8C5FDB15EB6C98496E9BFF0EF56310F0441AFC049C71A2DB2968058751

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1010 7ff848f23569-7ff848f235d8 1015 7ff848f235da-7ff848f235df 1010->1015 1016 7ff848f235e2-7ff848f23614 DeleteFileW 1010->1016 1015->1016 1017 7ff848f2361c-7ff848f2364a 1016->1017 1018 7ff848f23616 1016->1018 1018->1017
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2205422456.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff848f20000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 8d358f59e70f7231e6e6bd0a2b47db04b79cc063e6a771c1c1136b43fece1bad
                                        • Instruction ID: abc54ccf21843c473a4d7dff86577630fd02a3549c39ea79b2012866f3849d86
                                        • Opcode Fuzzy Hash: 8d358f59e70f7231e6e6bd0a2b47db04b79cc063e6a771c1c1136b43fece1bad
                                        • Instruction Fuzzy Hash: 1131F07180CB5C9FDB19DB5888496E9BBF0FF65310F04426BC049D3292DB79A846CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1020 7ff849193451-7ff84919345b 1021 7ff849193462-7ff849193473 1020->1021 1022 7ff84919345d 1020->1022 1024 7ff849193475 1021->1024 1025 7ff84919347a-7ff8491934a7 1021->1025 1022->1021 1023 7ff84919345f 1022->1023 1023->1021 1024->1025 1026 7ff849193477 1024->1026 1028 7ff8491934d5-7ff8491934e2 1025->1028 1029 7ff8491934a9-7ff8491934b3 1025->1029 1026->1025 1030 7ff8491934b5-7ff8491934cc 1029->1030 1031 7ff8491934ee-7ff84919355b call 7ff849193490 1029->1031 1034 7ff8491934e3-7ff8491934ed 1030->1034 1035 7ff8491934ce-7ff8491934d3 1030->1035 1039 7ff84919355d-7ff849193577 1031->1039 1040 7ff84919359f-7ff8491935b0 1031->1040 1035->1028 1035->1029 1044 7ff849193590-7ff84919359e 1039->1044 1045 7ff849193579-7ff849193586 1039->1045 1041 7ff8491935b2 1040->1041 1042 7ff8491935b7-7ff8491935e0 call 7ff849193490 1040->1042 1041->1042 1051 7ff849193622-7ff849193629 1042->1051 1052 7ff8491935e2-7ff8491935fc 1042->1052 1045->1044 1049 7ff849193588-7ff84919358e 1045->1049 1049->1044 1055 7ff849193630-7ff849193632 1051->1055 1056 7ff849193615-7ff84919361d 1052->1056 1057 7ff8491935fe-7ff84919360b 1052->1057 1058 7ff849193634-7ff849193636 1055->1058 1059 7ff849193638-7ff849193659 1055->1059 1061 7ff8491936a7-7ff8491936be call 7ff8491936bf 1056->1061 1057->1056 1065 7ff84919360d-7ff849193613 1057->1065 1062 7ff849193663-7ff849193666 1058->1062 1067 7ff849193660-7ff849193661 1059->1067 1063 7ff8491936a3-7ff8491936a4 1062->1063 1064 7ff849193668-7ff84919369c 1062->1064 1063->1061 1064->1063 1065->1056 1067->1062
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: &_L
                                        • API String ID: 0-1440118532
                                        • Opcode ID: 76b847f4644dc8f40dd6562ab8df880306e5a34ffa5bd1687f37683f6b9cacf6
                                        • Instruction ID: 8be88a50018b1547991fdbe2a04a78b2c9c5da92ccae12d55ca2e014cfcb6b71
                                        • Opcode Fuzzy Hash: 76b847f4644dc8f40dd6562ab8df880306e5a34ffa5bd1687f37683f6b9cacf6
                                        • Instruction Fuzzy Hash: D0911830A0DA894FDBA6EF2894546B577E1FF59354F0501BAD00EC32A2DE2DE846CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1100 7ff849196e69-7ff849196e88 1103 7ff849196e8d-7ff849196ec1 1100->1103 1107 7ff849196ec3 1103->1107 1108 7ff849196ec5-7ff849196ef9 1103->1108 1107->1108 1109 7ff849196f05-7ff849196f35 1107->1109 1108->1103 1111 7ff849196f37-7ff849196f3e 1109->1111 1112 7ff849196f3f-7ff849196f42 1109->1112 1113 7ff849196f44-7ff849196f4e 1112->1113 1114 7ff849196f4f-7ff849196f6c 1112->1114 1115 7ff849196f72-7ff849196f74 1114->1115 1116 7ff849196f76-7ff849196f7c 1115->1116 1117 7ff849196fbc-7ff849196fc3 1115->1117 1116->1117 1118 7ff849196f7e-7ff849196fbb 1116->1118
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: 85def69c15dd46047042b0f1177cc2038a9893a7ac094799d4475ce46eaeb03c
                                        • Instruction ID: e0689052aa82c02ff15ac8e87c6a607890b564495be8fdbed7f108446e3a131e
                                        • Opcode Fuzzy Hash: 85def69c15dd46047042b0f1177cc2038a9893a7ac094799d4475ce46eaeb03c
                                        • Instruction Fuzzy Hash: C2412721A1EAC54FE796AB3C98686757FE1DFA6384B0804FAD089C71A3D91D9885C701
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #'_^
                                        • API String ID: 0-523350721
                                        • Opcode ID: 1b12e625d07d778b83150386e6fb02b39c85607b16371d8ed9d06258134584e2
                                        • Instruction ID: f50f03f9b3e44deff4f7b11bc3b965d452f695278f4a653962641dd99ad1012f
                                        • Opcode Fuzzy Hash: 1b12e625d07d778b83150386e6fb02b39c85607b16371d8ed9d06258134584e2
                                        • Instruction Fuzzy Hash: C5410E37E1A5269EC311BEBDF4864D9B3B0EF85379B084677C188CE093DB1C544586E9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #'_^
                                        • API String ID: 0-523350721
                                        • Opcode ID: da19acb61aec4956819ddf830d09c5ce2f1545100b7d4c59c46fcb4c551777a3
                                        • Instruction ID: 8896d64552868fc34030e801095ad9f07f2a7e3fb9bed2cb6d469f7f411aafae
                                        • Opcode Fuzzy Hash: da19acb61aec4956819ddf830d09c5ce2f1545100b7d4c59c46fcb4c551777a3
                                        • Instruction Fuzzy Hash: 63313D27F1E5259ED310BEBDF4864EAB3A0EF85379B0C4677C188CE083DA1C644586E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #'_^
                                        • API String ID: 0-523350721
                                        • Opcode ID: b6785d5bfe575b9a9b4ea9d9429d74f49a92da007baf977676ab808a6e8e139f
                                        • Instruction ID: a7d5dbeb470b70c4e61a75ed4f64e325159e7a837f88e226ad12b0c94fe1a245
                                        • Opcode Fuzzy Hash: b6785d5bfe575b9a9b4ea9d9429d74f49a92da007baf977676ab808a6e8e139f
                                        • Instruction Fuzzy Hash: DF310D27E5E52A9EC311BEBDF4864E9B3A0EF85379B0C4677C188CE183DA1C544586E4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `"(I
                                        • API String ID: 0-1945562383
                                        • Opcode ID: 450a14919b0a85711d6fffc8e02c4a5ee4438a6b7ae98420067902bdbbc9e71d
                                        • Instruction ID: 858f33006d9b2d037623cc0ecc49c5ef280719a9ceeb9d757b1f0a4a23fb0cc5
                                        • Opcode Fuzzy Hash: 450a14919b0a85711d6fffc8e02c4a5ee4438a6b7ae98420067902bdbbc9e71d
                                        • Instruction Fuzzy Hash: BD2128A2B1DDCA1FE399EA3C44553B567E1FFA8350B0401BAC08EC72C7DD1CA8058350
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7314310cb6929b9ae138ba4ce3d2e202baf1394032c268b45525031f160886bf
                                        • Instruction ID: 0dd6c70585c1a8f0df5bf8f7e17c6e358b7334e7e93abd9755afbb7ef882112f
                                        • Opcode Fuzzy Hash: 7314310cb6929b9ae138ba4ce3d2e202baf1394032c268b45525031f160886bf
                                        • Instruction Fuzzy Hash: 0ED14B306189498FEB98EF2CD499A7973E1FF59345B1140B9E44EC72A6DE28EC42CB41
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 913f4818d3ca3534a14d7fc172c69bec00404cbdf62e966faf66e42b9dac6b36
                                        • Instruction ID: 7a6826d5d72ff479789f95c4d73e2ba21d4f6da8fd732b196e88246a4222a83d
                                        • Opcode Fuzzy Hash: 913f4818d3ca3534a14d7fc172c69bec00404cbdf62e966faf66e42b9dac6b36
                                        • Instruction Fuzzy Hash: 2CC1BF20A0CA4A4FEB68EB2C94557B877D1FF54388F5441B9D48EC72D2DE2DA846CB04
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a64478ad9fd5205c25e393929d3fafa858a0642a1925e2bf44fdb01f4d2f258a
                                        • Instruction ID: 35096003fd484967f57f1684055d1907151cbca31ddb9e69309ac24082fbfaf9
                                        • Opcode Fuzzy Hash: a64478ad9fd5205c25e393929d3fafa858a0642a1925e2bf44fdb01f4d2f258a
                                        • Instruction Fuzzy Hash: 45A17E31A1CA498FDBA8EF28D4556B973E1FF88355F504179E45ED32D2CF39A8028B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c309ae073ce051f5073c48e10176c89a1e2b58e65660e2ad6c1c22c6a24810af
                                        • Instruction ID: 2fc4457616909eefa62dd2bf0dfa807abc2aecb246cdef58f401734ec26ff13d
                                        • Opcode Fuzzy Hash: c309ae073ce051f5073c48e10176c89a1e2b58e65660e2ad6c1c22c6a24810af
                                        • Instruction Fuzzy Hash: D4A1AF30A0CA494FEB68EB2994557B877D2FF58388F5041BCD48EC36D2DE2DA8468B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9144c0d6284ee2335248b67c84759043225644d19694353acfa76dbfe7094b39
                                        • Instruction ID: fb8c5e64b94bd3b9f5d53a14debd9231f576698aef5181bfa1c29b7933ec1c4d
                                        • Opcode Fuzzy Hash: 9144c0d6284ee2335248b67c84759043225644d19694353acfa76dbfe7094b39
                                        • Instruction Fuzzy Hash: B4A19030A0C9494FEB68EB2D94557B877D1FF58384F5041B8D48EC36D2DE2DA8468B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 82d1acb9e788213accce6f5d18633eb39f2eb5446c23643f327f71681b2dbfab
                                        • Instruction ID: 6d130e9ca2a999c81133d5d4478c451e1aca0f202d42f56a2d84dcec56870a52
                                        • Opcode Fuzzy Hash: 82d1acb9e788213accce6f5d18633eb39f2eb5446c23643f327f71681b2dbfab
                                        • Instruction Fuzzy Hash: 4B916030B0C9494FEBA8EB2D94957B873D2FF98384F504179D48EC36D6DE29A8468B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74579974ad64606443bb7e5523b9954360764574d3927f56dfb092c0208466f7
                                        • Instruction ID: 78d5aa5ed4294918cc45339d42b80779d84e854fbe7aa73ae04e887dba513fa8
                                        • Opcode Fuzzy Hash: 74579974ad64606443bb7e5523b9954360764574d3927f56dfb092c0208466f7
                                        • Instruction Fuzzy Hash: 3D915030A0C9494FEBA8EB1D94957B873D2FF98384F504179D48EC36D7DE29A8468B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d152a46da08d637e65fb56121e04c6f354acf20a23990b9d81497be19b289d9
                                        • Instruction ID: efd606582ac007c5939f115e6bcb886ede48e13379bf23cb9e2e56c8c659838b
                                        • Opcode Fuzzy Hash: 6d152a46da08d637e65fb56121e04c6f354acf20a23990b9d81497be19b289d9
                                        • Instruction Fuzzy Hash: 4D915030A0C9494FEB68EB2D94957B873D2FF98384F504179D48EC36C7DE29A8868B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0227b86016d52ab2e1d446ef4ee4558d2737ae5b0b1d44020d5da512a6c52257
                                        • Instruction ID: d9ed101c386671a61b75be1e538f23d7d2487d4f838aeb6abf9477505c173822
                                        • Opcode Fuzzy Hash: 0227b86016d52ab2e1d446ef4ee4558d2737ae5b0b1d44020d5da512a6c52257
                                        • Instruction Fuzzy Hash: 15915030B0C9494FEBA8EB1D94957B873D2FF98384F504179D48EC36D6DE2DA8868B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 90609fb0b01fd9738fda38446314bf2a861349021838002008dd82c0cf770551
                                        • Instruction ID: ca90f547531a7f680cb9b382251532d55f0526b9b5ea297d0b435217d4b7782c
                                        • Opcode Fuzzy Hash: 90609fb0b01fd9738fda38446314bf2a861349021838002008dd82c0cf770551
                                        • Instruction Fuzzy Hash: 59915030A0C9494FEB68EB1D94957B873D2FF98384F504179D48EC36D7DE2DA8868B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f527879e0ebb147d57d6b3e453bb1208a098ad4ed3151b047fa60e305eca8e3b
                                        • Instruction ID: d8522c5be28bb79ecef639e30a40b992505aff855e95bfb436830469ac2efb12
                                        • Opcode Fuzzy Hash: f527879e0ebb147d57d6b3e453bb1208a098ad4ed3151b047fa60e305eca8e3b
                                        • Instruction Fuzzy Hash: B2916030A0C9494FEB68EB1D94957B873D2FF98384F5441B9D48EC36C7DE2DA8468B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6c7dc5837b27b723a6dfc24b481fc380de4996782a6568f0b32aa2643ce264b0
                                        • Instruction ID: 6ecd3398aefde7188b000d0964bc16644c2d8a4602036f475d2865b9ec9fc5c3
                                        • Opcode Fuzzy Hash: 6c7dc5837b27b723a6dfc24b481fc380de4996782a6568f0b32aa2643ce264b0
                                        • Instruction Fuzzy Hash: 47915130A0C9494FEB68EB1D94957B877D2FF98384F5041B9D48EC36C7DE29A8468B44
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c9a184db423af3b59908a38139c27f1ae00750b7f0b071ef01df58ca5299203
                                        • Instruction ID: fc4a0a4e82893be7bedb6586efd57d664ae38073bc4f66947d709f61e8f344e9
                                        • Opcode Fuzzy Hash: 7c9a184db423af3b59908a38139c27f1ae00750b7f0b071ef01df58ca5299203
                                        • Instruction Fuzzy Hash: 1A713731B1C9494FEBA8FB2CE84967577D1EF9A364B0401BAD44EC7293DD29EC428781
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 952e0f008315306dbf9392a97c290a951aeec02139977c5825941f2f8217f6dc
                                        • Instruction ID: a9442ed3fa12d579a612266feb157994e7b4a9cd9e311272e3fd0153ccdd096c
                                        • Opcode Fuzzy Hash: 952e0f008315306dbf9392a97c290a951aeec02139977c5825941f2f8217f6dc
                                        • Instruction Fuzzy Hash: 6A619230A4DA898FEBA5EF28D858AB577E1FF45348F0504BAD45DC71A2DA2CEC41CB41
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 584bd8e9a985696f3331e015902a2b8ae42c867dcc08a522f1a2c042d562235e
                                        • Instruction ID: d7eec369e0cbaa2ad0daf6646d5c0d8b2069bd14f40728be77eb499b1c158c0a
                                        • Opcode Fuzzy Hash: 584bd8e9a985696f3331e015902a2b8ae42c867dcc08a522f1a2c042d562235e
                                        • Instruction Fuzzy Hash: 26511672D0CACA4FE379EE2CA8151B57BD0EF556D4B04427AC48EC71D2DD1DA885C781
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 25ff7c5b833382391642a9fe1342db0aee9fe3742c56d61244a7c508b055872b
                                        • Instruction ID: 28e17837f1213ac985cd79ed8d67861fdce928b7108f453edbae97dddcb9a73c
                                        • Opcode Fuzzy Hash: 25ff7c5b833382391642a9fe1342db0aee9fe3742c56d61244a7c508b055872b
                                        • Instruction Fuzzy Hash: 29519B71F0CE8A9FE3E4EA7C90556B473D2EF98794B5005BEC44EC328ADD296842CB40
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39a7186164cd7bf150320a120b48d473827f0a8c9a45f710900a501ffda07b08
                                        • Instruction ID: abb76c9021bb3e5650a5fc68adec04447b43f026f043509fe4d608d167b2fb62
                                        • Opcode Fuzzy Hash: 39a7186164cd7bf150320a120b48d473827f0a8c9a45f710900a501ffda07b08
                                        • Instruction Fuzzy Hash: E151083151CA894FEB68FB2898456767BD0EF563A8F10067ED48DC31E6EE1DA843C781
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 620506d7f55f44c3311f95ebdacd227603a699825450fcfd519e2c6aa22701d1
                                        • Instruction ID: b7dddc1128b5e9ce90c570e19e9a5be8736aeb543fa135ad934443952026e75e
                                        • Opcode Fuzzy Hash: 620506d7f55f44c3311f95ebdacd227603a699825450fcfd519e2c6aa22701d1
                                        • Instruction Fuzzy Hash: 75411220B1EA865FE754BB7C58463B5B7D1EF98755F2401BAE40CC32C7DD2CA84683A2
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 635d58790f4f2fc4d9f1eb2e0b2be033e36bd2af7cfef1caac394802b81c23ab
                                        • Instruction ID: 5ecc20bc4304da26972d093ede95a2197fff7b0e66a0352b0a56b59b8b98f1b5
                                        • Opcode Fuzzy Hash: 635d58790f4f2fc4d9f1eb2e0b2be033e36bd2af7cfef1caac394802b81c23ab
                                        • Instruction Fuzzy Hash: 25317A3291D9C64FE39AAB3894452B13BE1EF9B35470444FAC009CB293CD2D9C47C740
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b92074d423c848063a17dd06a3aced4af8941c004e6324df9b8009342c2dc10
                                        • Instruction ID: 1a20cf2d43772aee813ee96f88a7fcfbe54a9378c253144637377db472ef9671
                                        • Opcode Fuzzy Hash: 7b92074d423c848063a17dd06a3aced4af8941c004e6324df9b8009342c2dc10
                                        • Instruction Fuzzy Hash: 0431E221A2DADA4FE765BB2894651F67BF0EF5A344F4004B7D04AC31C7DE2D6806C791
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 17207ba3023ceb273b0f3b584b5154f041d76f88de1ffb4a1ab141f41781fa36
                                        • Instruction ID: 63173fb47b8f30940e5840dd3e927b370264a3eda066046354867706ea56fbf6
                                        • Opcode Fuzzy Hash: 17207ba3023ceb273b0f3b584b5154f041d76f88de1ffb4a1ab141f41781fa36
                                        • Instruction Fuzzy Hash: 1231D73161C9495FEB98FF28D449A7633D1EF99394B10067DD44EC32A6EE29A8028781
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f853f2670ac78b683cea1c34d0b72235c83fd7fac0cbc4eef035b73b17560d61
                                        • Instruction ID: 3c49bf979db5bc15f8bea14ebcc778c9d75f46524d03a0db64b7b0e8007fd354
                                        • Opcode Fuzzy Hash: f853f2670ac78b683cea1c34d0b72235c83fd7fac0cbc4eef035b73b17560d61
                                        • Instruction Fuzzy Hash: CD31033A90DAC74FE7B9AA2C94542717BD0EF45398F1800B9E44FC7192DE1CE881CB41
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c5f20176eab9b213672abddc3069fc86d3b620a8c67c1a989393514d4eb2d18
                                        • Instruction ID: 59b572fc492cc3fa5b961acc1297b83cd9b91388b694a9f279fe28e5cf703416
                                        • Opcode Fuzzy Hash: 7c5f20176eab9b213672abddc3069fc86d3b620a8c67c1a989393514d4eb2d18
                                        • Instruction Fuzzy Hash: D9113A33F1ED4A5FF2B8A91C68495B537D1EFE87A475502BAD00DC3286ED1CAC42C690
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 617480ec8379741bdbcc26516d4a8ad12cf611d24e87577959cd10e7ab68d7ca
                                        • Instruction ID: f15d14fe100184bc4c1872538f046a0903b15e530964e0fa1aae5b08da50eedc
                                        • Opcode Fuzzy Hash: 617480ec8379741bdbcc26516d4a8ad12cf611d24e87577959cd10e7ab68d7ca
                                        • Instruction Fuzzy Hash: D221AB31A18A4D8FDB98EF28D4456AA77E1FF99319F10017EE40ED3292CB35E852CB40
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4cc23f08f062537f57da25aa846b3bd4b5b6b8f580fa459cdc76326926ae3f0b
                                        • Instruction ID: f9632734babef89120cfc4a56455d58702f02a6fd1ee84b9a917fb85ef0d7222
                                        • Opcode Fuzzy Hash: 4cc23f08f062537f57da25aa846b3bd4b5b6b8f580fa459cdc76326926ae3f0b
                                        • Instruction Fuzzy Hash: 9A112932F1DD4A1FF2B8A91CA84A5B537D1EFE97A475502BAD00DC3286ED1CBC42C690
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ca8d749adcc35a90960060d05e621b05a4eb57cceac6aa0f1f7cb931412474c2
                                        • Instruction ID: e1344c576649195c80d93808864a628027ea46dd323f1e1b0aaf89acf08b42cd
                                        • Opcode Fuzzy Hash: ca8d749adcc35a90960060d05e621b05a4eb57cceac6aa0f1f7cb931412474c2
                                        • Instruction Fuzzy Hash: ED216A3061CA498FDB98EF1DD4456A9B7E1FF98321F10117EE48AD32A1CA35E842CB41
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 30e3c9fd302e7ce5f1e32d101ac83386c64d8d65977a4f3d027c69550898d1ec
                                        • Instruction ID: e285601e8082b6f5d3ca7456fba95ec737e4e21e235793dac843f88e1a438a57
                                        • Opcode Fuzzy Hash: 30e3c9fd302e7ce5f1e32d101ac83386c64d8d65977a4f3d027c69550898d1ec
                                        • Instruction Fuzzy Hash: D921322691C99D5FE765BB6894017FAB7E0FF96354F0802B6E00CC30C2CF1CA91487A1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f5b8531caa20ba977c609587fb2d875a79ae07f340d30521c08a12c33ff01e2
                                        • Instruction ID: 982bad26c3e52cf9ce80d7897e09ee4c1eaccc6dfdd57b7902e4b7928823c8f6
                                        • Opcode Fuzzy Hash: 6f5b8531caa20ba977c609587fb2d875a79ae07f340d30521c08a12c33ff01e2
                                        • Instruction Fuzzy Hash: C4219231B3995A4EE764BB28D0552FA72E1FB58344F804576D44FC32C7DE2DA8468781
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 04543487c11183bd29f2be614a3aebb49d17fcc8325ec81624ed478006f36048
                                        • Instruction ID: 4446d0fe66a21aa45b216bd03f6e9dc9d9ea8d14a6c42db422093f6e69e05dee
                                        • Opcode Fuzzy Hash: 04543487c11183bd29f2be614a3aebb49d17fcc8325ec81624ed478006f36048
                                        • Instruction Fuzzy Hash: A211A31148EAC60FE34A6BB44C295E13FE5DF9B59071D42EBE0C5CB4A3D85C498BC3A1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 388f6dc0d0931debd34a59f4572515a07ca7372fdfecbd8b9c5f0c81777c176c
                                        • Instruction ID: 6335dc559a245b1b68ced56663220aaef59cc89c56491f2fa80ac394861f987f
                                        • Opcode Fuzzy Hash: 388f6dc0d0931debd34a59f4572515a07ca7372fdfecbd8b9c5f0c81777c176c
                                        • Instruction Fuzzy Hash: A711A53158E6C65FC3469BB48814AD17BE1EF8B15030941FAD089CB593C96C9887C761
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1f0aca70f4caff74a7da22dc25e8941fe8ad42601fac7d8f2547d00557000eb1
                                        • Instruction ID: 5f3fa7ddc394a8e96e6106df0d3b39e4ddc4a8548c6a85c8e1afb0ca2e913d33
                                        • Opcode Fuzzy Hash: 1f0aca70f4caff74a7da22dc25e8941fe8ad42601fac7d8f2547d00557000eb1
                                        • Instruction Fuzzy Hash: CE11323291E7C94FD356AB3498150E97FB0EF46210B4A05FBC144CB1A3DF2C594AC351
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 30aa03f9ebd3b243a2f2912e4991a16a04de79a8b383222cda0942732e343144
                                        • Instruction ID: 2991edce58318fe24afe76c9aa8fdf45d9c10673b2fbded0936309cb47e91d12
                                        • Opcode Fuzzy Hash: 30aa03f9ebd3b243a2f2912e4991a16a04de79a8b383222cda0942732e343144
                                        • Instruction Fuzzy Hash: CC01F53190DA954FE752E72894452A97FD1DF85264F080A6ED088C61E2CA684A86C386
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 22e9c81a7a3874f985da31ff2a67fa59900deff2e94a1d53eedb6ce3d1bfd332
                                        • Instruction ID: 8e16371ef11843a4a65a9b8c125e0836fb37a27d43fd805e9d0ebc0a6dcba6ab
                                        • Opcode Fuzzy Hash: 22e9c81a7a3874f985da31ff2a67fa59900deff2e94a1d53eedb6ce3d1bfd332
                                        • Instruction Fuzzy Hash: 44F0C23180DAC82FEB51AB78A4496EABFF0EF46310F4544E7D848DA193CE286645CB51
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 008e25f5b8e082badb337c0a234f77ff7680e7e58a5e89e42d955fa0517cd11e
                                        • Instruction ID: bb41a19233668a7f786590f8999e9994f1899deac7c237ed25a497f227ce3109
                                        • Opcode Fuzzy Hash: 008e25f5b8e082badb337c0a234f77ff7680e7e58a5e89e42d955fa0517cd11e
                                        • Instruction Fuzzy Hash: EB01D671E1DEC64FE3A8FE3844515BA63E2FFD8684B444578C04EC3286CE1DB9068B10
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 101badfb939290e4272dba7a2347a3336ba70ca66ac3b914a9317be90a2dac1f
                                        • Instruction ID: aca2c59662c9e666fb17bb8fb00c30c55683654bea72ad0605772e343720c6a1
                                        • Opcode Fuzzy Hash: 101badfb939290e4272dba7a2347a3336ba70ca66ac3b914a9317be90a2dac1f
                                        • Instruction Fuzzy Hash: 02F0542778DD4E0FD364BD9D7CC15F17380F780379B58013ACA1EC3585D54D68664290
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 49138bda0a58c861e825fb19f86c2fa74a8dfd61baf0aca26c4ae1dcb5d84b13
                                        • Instruction ID: f9288b2d012b362c74ebd4f7b897d01ac920a468624749927c4a1c21f2951529
                                        • Opcode Fuzzy Hash: 49138bda0a58c861e825fb19f86c2fa74a8dfd61baf0aca26c4ae1dcb5d84b13
                                        • Instruction Fuzzy Hash: 7BF0E920E6C9490BE754BB3C640527573D5EF45309F5409B9D84DC71E5DF29DC524781
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b43d43b492d4213959e61bb28802a0fa943040318bce010ea734979e5beae78
                                        • Instruction ID: 684a1ce79898f5fbc51e78b3a0f55f7fb8d09b6de72f39530501dd7690f4f013
                                        • Opcode Fuzzy Hash: 2b43d43b492d4213959e61bb28802a0fa943040318bce010ea734979e5beae78
                                        • Instruction Fuzzy Hash: B1F0A07190D60C6FDB18FF59EC4AAEB37A8FF85224F00013AF44D82192E6356863CB50
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c34db2c87c02bdc3fa2be3b67f77d40251e855d98913ab74af7c4a9abfe9530f
                                        • Instruction ID: 09fe943120623a5550ef0c4316288c454063daa7019782820bc016c59263a29e
                                        • Opcode Fuzzy Hash: c34db2c87c02bdc3fa2be3b67f77d40251e855d98913ab74af7c4a9abfe9530f
                                        • Instruction Fuzzy Hash: 2CD05E53B9C58E0BE590B94878911F1A380EB542B9B500373C58D830C6CD2F65464641
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21d46be57608a414555087a9ff69b87ce9620efef7e9042b253813855672e1df
                                        • Instruction ID: 8e66ae1f85a45fcdc88f96f552331475f1a95b3ad1d0e0bdb1f1df88fcdd09f1
                                        • Opcode Fuzzy Hash: 21d46be57608a414555087a9ff69b87ce9620efef7e9042b253813855672e1df
                                        • Instruction Fuzzy Hash: 23D02331C0D589CFD348BB3C40051643650FF08388F5404BDD00ECB1D1D557540EC302
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2208208602.00007FF849190000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff849190000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH$HAH$HAH$HAH$r&_H
                                        • API String ID: 0-1577230237
                                        • Opcode ID: b16bf41d030f5ff01f1545e3f6f2ce5717cbac58bb400a0b3b4c5e5049ebea41
                                        • Instruction ID: be846a6027a42d52494a3028f75d70838d4bd7f5308db5d5e6f1f7d848a68569
                                        • Opcode Fuzzy Hash: b16bf41d030f5ff01f1545e3f6f2ce5717cbac58bb400a0b3b4c5e5049ebea41
                                        • Instruction Fuzzy Hash: 4B914821E1D98A4FE794EB38A459AB477D1FF98694B0841BAC04EC7293EE1CAC47C741

                                        Execution Graph

                                        Execution Coverage:19.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:6
                                        Total number of Limit Nodes:0
                                        execution_graph 2622 7ff848f23569 2623 7ff848f23571 DeleteFileW 2622->2623 2625 7ff848f23616 2623->2625 2626 7ff848f23525 2627 7ff848f23531 DeleteFileW 2626->2627 2629 7ff848f23616 2627->2629

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF849196000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849196000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff849196000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH
                                        • API String ID: 0-4204409433
                                        • Opcode ID: e8f416d4531874c0629cc035014bfc413fb60d4a9b11e12e4024f440d62f1fe4
                                        • Instruction ID: 0c0918c0e7633196157fc9702d8b39115d6360fa559396b9781b2102feb474b7
                                        • Opcode Fuzzy Hash: e8f416d4531874c0629cc035014bfc413fb60d4a9b11e12e4024f440d62f1fe4
                                        • Instruction Fuzzy Hash: 1B61C171A2DD8A4FE6A9EB2CD45667563D2FF987D4B4800B9D00EC32D6DE2DAC02C750

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 163 7ff848f23525-7ff848f2352f 164 7ff848f23571-7ff848f235d8 163->164 165 7ff848f23531-7ff848f23562 163->165 172 7ff848f235da-7ff848f235df 164->172 173 7ff848f235e2-7ff848f23614 DeleteFileW 164->173 165->164 172->173 174 7ff848f2361c-7ff848f2364a 173->174 175 7ff848f23616 173->175 175->174
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2318993306.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff848f20000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 621667b5e92df981a467c3468a716cdc75b405d6f3084c27cd931e2e74ebe20d
                                        • Instruction ID: 94eeb3ceba49940d97bc64828f464bc8390313a7bdfe520e21ef9d0706a0c236
                                        • Opcode Fuzzy Hash: 621667b5e92df981a467c3468a716cdc75b405d6f3084c27cd931e2e74ebe20d
                                        • Instruction Fuzzy Hash: DC41F57180DB8C5FDB15EB6C98496E9BFF0EF56310F0441AFC049C71A2DB2968058751

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 177 7ff848f23569-7ff848f235d8 182 7ff848f235da-7ff848f235df 177->182 183 7ff848f235e2-7ff848f23614 DeleteFileW 177->183 182->183 184 7ff848f2361c-7ff848f2364a 183->184 185 7ff848f23616 183->185 185->184
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2318993306.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff848f20000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 8d358f59e70f7231e6e6bd0a2b47db04b79cc063e6a771c1c1136b43fece1bad
                                        • Instruction ID: abc54ccf21843c473a4d7dff86577630fd02a3549c39ea79b2012866f3849d86
                                        • Opcode Fuzzy Hash: 8d358f59e70f7231e6e6bd0a2b47db04b79cc063e6a771c1c1136b43fece1bad
                                        • Instruction Fuzzy Hash: 1131F07180CB5C9FDB19DB5888496E9BBF0FF65310F04426BC049D3292DB79A846CB91

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF849193000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849193000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff849193000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: &_L
                                        • API String ID: 0-1440118532
                                        • Opcode ID: 8362a2d8e6f34d011ce4d72c487b6986664761d2fd1244bb452726f0f05baf66
                                        • Instruction ID: 8be88a50018b1547991fdbe2a04a78b2c9c5da92ccae12d55ca2e014cfcb6b71
                                        • Opcode Fuzzy Hash: 8362a2d8e6f34d011ce4d72c487b6986664761d2fd1244bb452726f0f05baf66
                                        • Instruction Fuzzy Hash: D0911830A0DA894FDBA6EF2894546B577E1FF59354F0501BAD00EC32A2DE2DE846CB81

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF849196000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849196000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff849196000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: cf05f286b154616a46ef704f4e5e7f74175c12d0d43d3a5a11ddf576a3731923
                                        • Instruction ID: e0689052aa82c02ff15ac8e87c6a607890b564495be8fdbed7f108446e3a131e
                                        • Opcode Fuzzy Hash: cf05f286b154616a46ef704f4e5e7f74175c12d0d43d3a5a11ddf576a3731923
                                        • Instruction Fuzzy Hash: C2412721A1EAC54FE796AB3C98686757FE1DFA6384B0804FAD089C71A3D91D9885C701

                                        Control-flow Graph

                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF849193000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849193000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff849193000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c41f587340b936d901126003d427b5394f8bda40fbc2c769bf7aac4cee7b98ed
                                        • Instruction ID: 35096003fd484967f57f1684055d1907151cbca31ddb9e69309ac24082fbfaf9
                                        • Opcode Fuzzy Hash: c41f587340b936d901126003d427b5394f8bda40fbc2c769bf7aac4cee7b98ed
                                        • Instruction Fuzzy Hash: 45A17E31A1CA498FDBA8EF28D4556B973E1FF88355F504179E45ED32D2CF39A8028B44

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 488 7ff8491936f5-7ff849193701 489 7ff849193703 488->489 490 7ff849193704-7ff849193715 488->490 489->490 491 7ff849193717 490->491 492 7ff849193718-7ff849193758 490->492 491->492 494 7ff84919375a-7ff849193769 492->494 495 7ff84919376b-7ff849193775 492->495 494->495 496 7ff849193831-7ff849193833 495->496 497 7ff84919377b-7ff8491937af 495->497 498 7ff849193855-7ff849193865 496->498 499 7ff849193835-7ff84919383b 496->499 507 7ff8491937b1-7ff8491937c3 497->507 508 7ff8491937db-7ff8491937f7 497->508 502 7ff849193842-7ff84919384e 499->502 502->498 506 7ff849193850 502->506 506->498 513 7ff8491937c5-7ff8491937d7 507->513 514 7ff84919380d-7ff849193813 507->514 509 7ff849193801-7ff849193806 508->509 511 7ff849193866-7ff849193879 509->511 512 7ff849193808-7ff84919380b 509->512 515 7ff849193825-7ff84919382b 512->515 518 7ff8491937d9 513->518 519 7ff84919381a-7ff849193820 513->519 514->515 516 7ff849193815-7ff849193818 514->516 515->496 515->497 516->515 518->515 519->515 520 7ff849193822 519->520 520->515
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF849193000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849193000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff849193000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2eabb466e9545a40fca465bba63f9adf8b9467cfdadac2d0db7f6c343a0db49f
                                        • Instruction ID: d2172a7c06b47a1a4cddeac1978bda1ec12ed943a5bf27dc14a094ceebe33660
                                        • Opcode Fuzzy Hash: 2eabb466e9545a40fca465bba63f9adf8b9467cfdadac2d0db7f6c343a0db49f
                                        • Instruction Fuzzy Hash: 4F51F73161CA894FEB69BB2898446767BD0EF563A8F10067ED48DC31E6DE1DA843C781
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF849196000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849196000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff849196000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b04bf2984b8e1262b8439f7a714d9e9165ac256c7914c4a453e1823c92b0ba9
                                        • Instruction ID: 7a8b92252492d472532d89db176db2c8e891136c28f995273033eb42c817b0a0
                                        • Opcode Fuzzy Hash: 2b04bf2984b8e1262b8439f7a714d9e9165ac256c7914c4a453e1823c92b0ba9
                                        • Instruction Fuzzy Hash: F341B030D1CA4A9FEBB4EF1988415BA73E2FF85398F444439D46A93586CA39F845CB90
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF84919D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF84919D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff84919d000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f7d7d1ea24763cefa1e4ff4fb3e058ab1fff83d87de0be24a017dad7d721f23e
                                        • Instruction ID: 12fe264369a44b8c18dcd5868cc1323619b433608a984a70521243ebee76995c
                                        • Opcode Fuzzy Hash: f7d7d1ea24763cefa1e4ff4fb3e058ab1fff83d87de0be24a017dad7d721f23e
                                        • Instruction Fuzzy Hash: 7E41E320B1E9811FE755BB7C589A3F567C1EF98755F6802BAE40CC72C7CD1CA84683A2
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF84919D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF84919D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff84919d000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1f504a0454006ee291379837a18d08b0a59951185b992d0b774a746eb597f86f
                                        • Instruction ID: 3c49bf979db5bc15f8bea14ebcc778c9d75f46524d03a0db64b7b0e8007fd354
                                        • Opcode Fuzzy Hash: 1f504a0454006ee291379837a18d08b0a59951185b992d0b774a746eb597f86f
                                        • Instruction Fuzzy Hash: CD31033A90DAC74FE7B9AA2C94542717BD0EF45398F1800B9E44FC7192DE1CE881CB41
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF84919D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF84919D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff84919d000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: faaf6a6bf80cf8444d3781e00bdb9ca286ffafd071010b057bd2b8289a65ee2b
                                        • Instruction ID: 64018bc5cfc017de9c475e957b7f36eb1e9c13aa3a9aefa713b23b187ddd6a51
                                        • Opcode Fuzzy Hash: faaf6a6bf80cf8444d3781e00bdb9ca286ffafd071010b057bd2b8289a65ee2b
                                        • Instruction Fuzzy Hash: 8911E53158E6C61FD3469B748C20AD27BE5DF8B15030901F6E089CB5A3C91D9987C760
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF84919D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF84919D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff84919d000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 44f4785671c574c58cdc6493cfae9f6c6336a1a52befbe551c6e0199e0b2ee28
                                        • Instruction ID: 0f4a966022b9ac0336604dd614d9ae88f7f0726e804dcc6b0f5ead3ce00c7959
                                        • Opcode Fuzzy Hash: 44f4785671c574c58cdc6493cfae9f6c6336a1a52befbe551c6e0199e0b2ee28
                                        • Instruction Fuzzy Hash: 15110225D1C99A5EF765AB6894153F9B7E0FF96384F4801B6E00CC71C3CF1CA80487A1
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF849193000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849193000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff849193000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4eb5374435182affc0fb00a9a24ddd2a380d71fbb80c29ffc271fed86c99ca9
                                        • Instruction ID: 2b1047b59fbf9ff2f4a89b1d7ea661da7aecb62fce23b2ecc2d0dbdd575ddbfc
                                        • Opcode Fuzzy Hash: a4eb5374435182affc0fb00a9a24ddd2a380d71fbb80c29ffc271fed86c99ca9
                                        • Instruction Fuzzy Hash: 1A014721A1CAC50FE366AB3CA4152767BE4EF42204F4D45FEC489CB1A3DE1CD8428741
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF849193000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849193000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff849193000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 70cf21d9e70ce76508cf83898484feef363597d488487a1893d6b1d777935134
                                        • Instruction ID: 684a1ce79898f5fbc51e78b3a0f55f7fb8d09b6de72f39530501dd7690f4f013
                                        • Opcode Fuzzy Hash: 70cf21d9e70ce76508cf83898484feef363597d488487a1893d6b1d777935134
                                        • Instruction Fuzzy Hash: B1F0A07190D60C6FDB18FF59EC4AAEB37A8FF85224F00013AF44D82192E6356863CB50
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.2319686448.00007FF84919D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF84919D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_7ff84919d000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad7705486695a753bf54c67e012976e655c186979cc5c4a06698369772894101
                                        • Instruction ID: 441ab12104a39798504e4bee3ef62e5711c222dadbdcee72ffac76d45b075d92
                                        • Opcode Fuzzy Hash: ad7705486695a753bf54c67e012976e655c186979cc5c4a06698369772894101
                                        • Instruction Fuzzy Hash: CFD0233555454C57C7147B65B4054D7B758FF8D35CF00057FF91CC5041D62795354392

                                        Execution Graph

                                        Execution Coverage:14.9%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:6
                                        Total number of Limit Nodes:0
                                        execution_graph 7555 7ff848f23569 7556 7ff848f23571 DeleteFileW 7555->7556 7558 7ff848f23616 7556->7558 7559 7ff848f23525 7560 7ff848f23531 DeleteFileW 7559->7560 7562 7ff848f23616 7560->7562

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 7ff8491993c1-7ff849199409 2 7ff84919940b-7ff849199419 0->2 3 7ff84919941a-7ff84919942c 0->3 5 7ff849199432-7ff849199442 3->5 6 7ff8491994af-7ff8491994b3 3->6 12 7ff849199448-7ff849199497 5->12 13 7ff84919972b-7ff849199761 5->13 7 7ff8491994b5-7ff8491994b9 6->7 8 7ff8491994cb-7ff8491994cf 6->8 14 7ff8491994c0-7ff8491994c4 7->14 10 7ff8491994d1-7ff8491994f8 8->10 11 7ff8491994fe-7ff849199502 8->11 10->11 21 7ff849199781-7ff8491997a1 10->21 15 7ff849199508-7ff84919950d 11->15 16 7ff84919971c-7ff84919972a 11->16 47 7ff8491994a4-7ff8491994a8 12->47 48 7ff849199499-7ff8491994a2 12->48 13->21 14->8 15->16 19 7ff849199513-7ff84919951d 15->19 27 7ff84919956b-7ff849199570 19->27 28 7ff84919951f-7ff849199531 19->28 39 7ff8491997a3-7ff8491997a8 21->39 40 7ff8491997a9-7ff849199808 21->40 30 7ff849199576-7ff849199580 27->30 31 7ff8491996f8-7ff8491996fd 27->31 28->27 35 7ff849199533-7ff84919955e 28->35 30->31 41 7ff849199586-7ff849199598 30->41 31->16 34 7ff8491996ff-7ff849199714 31->34 34->16 46 7ff849199716-7ff849199719 34->46 35->27 55 7ff849199560-7ff849199564 35->55 39->40 60 7ff849199dae-7ff849199dc0 40->60 61 7ff84919980e-7ff849199820 40->61 52 7ff84919968e-7ff8491996f1 41->52 53 7ff84919959e-7ff8491995c5 41->53 46->16 47->6 48->6 52->31 53->52 55->27 61->60 65 7ff849199826-7ff84919985f 61->65 65->60 71 7ff849199865-7ff8491998a6 65->71 75 7ff849199958-7ff84919996b 71->75 76 7ff8491998ac-7ff8491998c4 71->76 79 7ff8491999c0 75->79 80 7ff84919996d-7ff84919998e 75->80 81 7ff8491998ca-7ff8491998ea 76->81 82 7ff84919994c-7ff849199952 76->82 83 7ff8491999c2-7ff8491999c7 79->83 88 7ff849199990-7ff8491999b7 80->88 89 7ff8491999b9-7ff8491999be 80->89 81->82 93 7ff8491998ec-7ff8491998fe 81->93 82->75 82->76 85 7ff8491999c9-7ff8491999d0 83->85 86 7ff849199a0e-7ff849199a31 83->86 92 7ff8491999d7-7ff8491999f1 85->92 94 7ff849199b27-7ff849199b33 86->94 95 7ff849199a37-7ff849199a5f 86->95 88->83 89->83 92->86 99 7ff8491999f3-7ff849199a0c 92->99 93->82 102 7ff849199900-7ff849199904 93->102 94->60 97 7ff849199b39-7ff849199b4e 94->97 107 7ff849199a65-7ff849199a80 95->107 108 7ff849199b1b-7ff849199b21 95->108 99->86 104 7ff849199dc1-7ff849199e63 102->104 105 7ff84919990a-7ff84919991f 102->105 118 7ff849199f75-7ff849199fa8 104->118 119 7ff849199e69-7ff849199e6b 104->119 113 7ff849199926-7ff849199928 105->113 107->108 117 7ff849199a86-7ff849199a98 107->117 108->94 108->95 113->82 115 7ff84919992a-7ff849199948 call 7ff849194bb0 113->115 115->82 117->108 129 7ff849199a9e-7ff849199aa2 117->129 134 7ff849199faf-7ff849199fba 118->134 121 7ff849199e85-7ff849199e93 119->121 122 7ff849199e6d-7ff849199e7f 119->122 126 7ff849199e99-7ff849199eb0 121->126 127 7ff849199fe8-7ff84919a01b 121->127 122->121 122->134 144 7ff849199eb2-7ff849199ec4 126->144 145 7ff849199eca-7ff849199ecd 126->145 148 7ff84919a022-7ff84919a061 127->148 129->104 133 7ff849199aa8-7ff849199aeb 129->133 133->108 165 7ff849199aed-7ff849199b18 call 7ff849194bb0 133->165 140 7ff849199f41-7ff849199f42 134->140 141 7ff849199fbc-7ff849199fd1 134->141 151 7ff849199fd3 141->151 152 7ff849199fd6-7ff849199fe1 141->152 144->145 144->148 149 7ff849199ef6-7ff849199f12 call 7ff849197240 145->149 150 7ff849199ecf-7ff849199ee6 145->150 172 7ff84919a063-7ff84919a069 148->172 173 7ff84919a06d 148->173 166 7ff849199f43-7ff849199f47 149->166 167 7ff849199f14-7ff849199f40 149->167 150->149 168 7ff849199ee8-7ff849199eec 150->168 151->152 152->127 165->108 174 7ff849199f4e-7ff849199f74 166->174 167->140 175 7ff849199ef3-7ff849199ef4 168->175 178 7ff84919a071-7ff84919a0ac 172->178 179 7ff84919a06b 172->179 173->178 180 7ff84919a06f 173->180 175->149 184 7ff84919a0ef-7ff84919a122 178->184 185 7ff84919a0ae-7ff84919a0d5 178->185 179->173 180->178 192 7ff84919a129-7ff84919a171 184->192 185->192 193 7ff84919a0d7-7ff84919a0ee 185->193 199 7ff84919a173 192->199 200 7ff84919a175-7ff84919a197 192->200 199->200 201 7ff84919a1b5-7ff84919a1ba 199->201 203 7ff84919a27a-7ff84919a292 200->203 204 7ff84919a19d-7ff84919a1af 200->204 206 7ff84919a293-7ff84919a295 203->206 210 7ff84919a1b1-7ff84919a1b4 204->210 211 7ff84919a1bb-7ff84919a1d3 call 7ff8491938a0 204->211 208 7ff84919a297-7ff84919a2c3 206->208 209 7ff84919a2df-7ff84919a2e2 206->209 226 7ff84919a305 208->226 228 7ff84919a2c5-7ff84919a2dd 208->228 213 7ff84919a2e4-7ff84919a2f4 209->213 214 7ff84919a309-7ff84919a30b 209->214 210->201 222 7ff84919a1d5-7ff84919a206 211->222 223 7ff84919a237-7ff84919a240 211->223 218 7ff84919a2f5-7ff84919a2ff 213->218 216 7ff84919a30d-7ff84919a31b 214->216 217 7ff84919a31c-7ff84919a32c 214->217 218->214 221 7ff84919a301-7ff84919a302 218->221 221->226 232 7ff84919a231-7ff84919a235 222->232 233 7ff84919a208-7ff84919a22f 222->233 226->218 227 7ff84919a307 226->227 227->214 228->209 232->222 232->223 233->232 235 7ff84919a241-7ff84919a266 233->235 235->206 238 7ff84919a268-7ff84919a279 235->238
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH$HAH$HAH$HAH$HAH
                                        • API String ID: 0-4024470385
                                        • Opcode ID: 54497f807c746eb89b8f27ce05973f70ebd25580c1f2b701c8ac7da9022c6471
                                        • Instruction ID: b17dae8d6ac7da1f83734e09c82b966ff4d4463cee5e2cb651bea561fdf89862
                                        • Opcode Fuzzy Hash: 54497f807c746eb89b8f27ce05973f70ebd25580c1f2b701c8ac7da9022c6471
                                        • Instruction Fuzzy Hash: CB92F330A1C9894FEBA8EF2C9455A7577D1FF99394F0400BAD44EC7296DE2DAC42CB41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 499 7ff849194dc6-7ff849194dd8 501 7ff849194dda-7ff849194e33 499->501 502 7ff849194dbe-7ff849194dc3 499->502 504 7ff849194e84-7ff849194ebc call 7ff8491938a0 call 7ff849193730 501->504 505 7ff849194e35-7ff849194e40 501->505 514 7ff849194ed8-7ff849194ee0 504->514 515 7ff849194ebe-7ff849194ed3 call 7ff849194ae0 504->515 507 7ff849194e47-7ff849194e4a 505->507 507->504 509 7ff849194e4c-7ff849194e61 call 7ff849193730 507->509 509->504 518 7ff849194e63-7ff849194e7f call 7ff849193140 509->518 516 7ff849194ee2-7ff849194efa 514->516 517 7ff849194efc 514->517 515->514 520 7ff849194efe-7ff849194f05 516->520 517->520 518->504 523 7ff849194f07-7ff849194f17 520->523 524 7ff849194f18-7ff849194f5a 520->524 525 7ff849194f60-7ff849194f93 524->525 526 7ff849195a36-7ff849195a40 524->526 537 7ff849194f99-7ff849194fab 525->537 538 7ff8491951ee-7ff849195200 525->538 527 7ff849195a42-7ff849195a4d 526->527 528 7ff849195a58 526->528 529 7ff849195a5d-7ff849195a5f 527->529 528->529 531 7ff849195a61-7ff849195a73 529->531 532 7ff849195a7a-7ff849195a7f 529->532 531->532 534 7ff849195a81 532->534 535 7ff849195a84-7ff849195a95 532->535 534->535 540 7ff84919620e-7ff8491962be 535->540 537->538 546 7ff849194fb1-7ff849194fe3 537->546 544 7ff8491952c3-7ff8491952c5 538->544 545 7ff849195206-7ff849195232 538->545 548 7ff849195335-7ff849195347 544->548 549 7ff8491952c7-7ff8491952d9 544->549 545->544 556 7ff849195238-7ff84919523d 545->556 552 7ff849194fe5-7ff849195007 546->552 553 7ff849195016-7ff84919504a 546->553 560 7ff84919591b-7ff84919592d 548->560 561 7ff84919534d-7ff849195379 548->561 549->548 558 7ff8491952db-7ff8491952de 549->558 552->553 575 7ff84919504c-7ff84919506c 553->575 576 7ff84919507e-7ff8491950b5 553->576 556->544 562 7ff849195243-7ff849195246 556->562 565 7ff8491952e0-7ff8491952fb 558->565 566 7ff849195304-7ff849195332 call 7ff849194bb0 558->566 584 7ff84919599c-7ff8491959ae 560->584 585 7ff84919592f-7ff849195937 560->585 586 7ff84919537b-7ff849195384 561->586 587 7ff8491953af-7ff8491953c6 561->587 563 7ff849195248-7ff849195251 562->563 564 7ff84919526b-7ff849195274 562->564 563->564 572 7ff849195276-7ff849195299 564->572 573 7ff84919529b-7ff8491952c0 call 7ff849194bb0 564->573 565->566 566->548 572->573 573->544 575->576 594 7ff849195141-7ff84919516e 576->594 595 7ff8491950bb-7ff8491950d3 576->595 606 7ff8491959b0-7ff8491959ba 584->606 607 7ff849195a25-7ff849195a30 584->607 585->584 592 7ff849195939-7ff849195966 585->592 588 7ff849195386-7ff849195396 586->588 589 7ff8491953a8-7ff8491953a9 586->589 604 7ff8491954c2-7ff8491954ef 587->604 605 7ff8491953cc-7ff8491953f5 587->605 588->589 589->587 592->584 610 7ff849195968-7ff849195971 592->610 620 7ff849195170-7ff849195179 594->620 621 7ff8491951a4-7ff8491951ae 594->621 602 7ff8491950d5-7ff8491950e5 595->602 603 7ff849195138-7ff84919513f 595->603 614 7ff849195105-7ff849195136 602->614 603->614 623 7ff8491954f1-7ff84919551c 604->623 624 7ff84919551f-7ff849195548 604->624 605->560 628 7ff8491953fb-7ff84919541b 605->628 612 7ff8491959c0-7ff8491959ec 606->612 613 7ff849195a4f-7ff849195a56 606->613 607->525 607->526 617 7ff849195973-7ff849195983 610->617 618 7ff849195995-7ff849195996 610->618 612->607 635 7ff8491959ee-7ff8491959f7 612->635 613->607 614->621 617->618 618->584 630 7ff84919517b-7ff84919518b 620->630 631 7ff84919519d-7ff84919519e 620->631 621->540 626 7ff8491951b4-7ff8491951d5 621->626 623->624 645 7ff84919554e-7ff84919557d 624->645 646 7ff8491955df-7ff8491955f3 624->646 626->538 647 7ff8491951d7-7ff8491951e6 626->647 628->604 630->631 631->621 643 7ff8491959f9-7ff849195a09 635->643 644 7ff849195a1e-7ff849195a1f 635->644 643->644 644->607 645->646 653 7ff84919557f-7ff8491955ab 645->653 649 7ff8491955f5-7ff84919560c 646->649 647->538 654 7ff849195647-7ff849195674 649->654 655 7ff84919560e-7ff849195613 649->655 653->646 660 7ff8491955ad-7ff8491955dc 653->660 662 7ff849195676-7ff8491956c7 call 7ff849194ae0 654->662 663 7ff8491956cc-7ff8491956f8 654->663 655->654 656 7ff849195615-7ff849195637 655->656 656->649 665 7ff849195639-7ff849195644 656->665 660->646 662->663 670 7ff8491956fa-7ff849195738 call 7ff849194ae0 663->670 671 7ff84919573d-7ff849195769 663->671 665->654 670->671 677 7ff84919576b-7ff8491957a9 call 7ff849194ae0 671->677 678 7ff8491957ae-7ff8491957da 671->678 677->678 682 7ff849195842-7ff84919586f 678->682 683 7ff8491957dc-7ff8491957f0 678->683 689 7ff849195871-7ff8491958af call 7ff849194ae0 682->689 690 7ff8491958b4-7ff8491958e0 682->690 686 7ff8491957f1-7ff849195811 683->686 686->682 691 7ff849195813-7ff849195835 686->691 689->690 690->560 696 7ff8491958e2-7ff8491958eb 690->696 691->686 701 7ff849195837-7ff84919583a 691->701 699 7ff849195912-7ff849195913 696->699 700 7ff8491958ed-7ff849195910 696->700 699->560 700->699 701->682
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: ff7a04f008a6dfaa31fae753f9ab42b6b8381a2892a36e1da64e20f05b1fef6a
                                        • Instruction ID: b0f35c223a76b10070084a1c6c5dc645e12f308bae2cd01b0f75cd0b70a5dc47
                                        • Opcode Fuzzy Hash: ff7a04f008a6dfaa31fae753f9ab42b6b8381a2892a36e1da64e20f05b1fef6a
                                        • Instruction Fuzzy Hash: 0D92A570A1CA598FDF98EF18C494BA97BE2FF58344F5041A8D44ED7296CE39E885CB40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 704 7ff849195be1-7ff849195bfb 705 7ff849195bff-7ff849195c01 704->705 706 7ff849195ce7-7ff849195cf9 705->706 707 7ff849195c07-7ff849195c56 705->707 709 7ff849195cff-7ff849195d95 706->709 707->706 712 7ff849195c5c-7ff849195c97 707->712 719 7ff84919601e-7ff84919603b 709->719 717 7ff849195cc4-7ff849195cd5 712->717 718 7ff849195c99-7ff849195cc2 712->718 717->712 720 7ff849195cd7 717->720 718->717 735 7ff849195cd9-7ff849195ce1 718->735 721 7ff849196041-7ff849196044 719->721 722 7ff849195af5-7ff849195b2f 719->722 720->706 724 7ff849196066-7ff849196087 721->724 725 7ff849196046-7ff84919604a 721->725 722->719 740 7ff849195b35-7ff849195b7f 722->740 730 7ff8491960a6-7ff8491960ab 724->730 731 7ff849196089-7ff84919609f 724->731 725->724 726 7ff84919604c-7ff849196061 call 7ff849194ae0 725->726 726->724 733 7ff8491960ed-7ff8491960f4 730->733 734 7ff8491960ad-7ff8491960cb 730->734 731->730 738 7ff849196122-7ff849196127 733->738 739 7ff8491960f6-7ff849196102 733->739 734->733 744 7ff8491960cd-7ff8491960d9 734->744 735->706 742 7ff8491961fc-7ff84919620d 738->742 743 7ff84919612d-7ff849196135 738->743 749 7ff849196109-7ff84919610f 739->749 740->719 753 7ff849195b85-7ff849195b88 740->753 745 7ff849196287-7ff8491962be 742->745 743->745 746 7ff84919613b-7ff84919614b 743->746 747 7ff8491960e5-7ff8491960eb 744->747 748 7ff8491960db-7ff8491960e3 744->748 758 7ff84919615b-7ff849196163 746->758 759 7ff84919614d-7ff849196151 746->759 747->733 747->744 748->747 750 7ff849196111-7ff849196112 749->750 751 7ff84919611a-7ff849196120 749->751 750->751 751->738 751->739 756 7ff849195bb5-7ff849195bd3 753->756 757 7ff849195b8a-7ff849195baf 753->757 765 7ff849195bd9-7ff849195bdb 756->765 766 7ff849195d9a-7ff849195db3 756->766 757->719 757->756 758->745 763 7ff849196169-7ff849196179 758->763 759->745 761 7ff849196157-7ff849196158 759->761 761->758 772 7ff849196189-7ff849196191 763->772 773 7ff84919617b-7ff84919617f 763->773 765->704 765->719 770 7ff849195db9-7ff849195e00 766->770 771 7ff849195e8f-7ff849195ea8 766->771 784 7ff849195e02-7ff849195e15 770->784 785 7ff849195e1b-7ff849195e8a 770->785 771->719 777 7ff849195eae-7ff849195eb0 771->777 772->745 774 7ff849196197-7ff8491961a7 772->774 773->745 776 7ff849196185-7ff849196186 773->776 781 7ff8491961b7-7ff8491961bf 774->781 782 7ff8491961a9-7ff8491961ad 774->782 776->772 777->719 780 7ff849195eb6-7ff849195ed3 777->780 780->719 789 7ff849195ed9-7ff849195edd 780->789 781->745 787 7ff8491961c5-7ff8491961d5 781->787 782->745 786 7ff8491961b3-7ff8491961b4 782->786 784->719 784->785 785->719 786->781 794 7ff8491961e5-7ff8491961f5 787->794 795 7ff8491961d7-7ff8491961db 787->795 789->719 793 7ff849195ee3-7ff849195f06 789->793 797 7ff849195f0d-7ff849196013 793->797 794->742 795->745 796 7ff8491961e1-7ff8491961e2 795->796 796->794 797->719
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: *%I
                                        • API String ID: 0-3524644257
                                        • Opcode ID: 066bc1caf8eec335ed9e75dcbf7644bd0e862b27d4d78c86c66b199b559a0088
                                        • Instruction ID: 390f8b6335695ae481a6b199e7c05e7341210a243038ff895dfbff7271fb2c57
                                        • Opcode Fuzzy Hash: 066bc1caf8eec335ed9e75dcbf7644bd0e862b27d4d78c86c66b199b559a0088
                                        • Instruction Fuzzy Hash: 36325E30A18A598FEBA4EF18C8857A9B7E1FF98344F1045B9D44ED3295DB38E981CF41
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7f5bda45b1189fb04882d568003b545f52994106badf7420f34f1c4c5304df49
                                        • Instruction ID: 7040fd49d5733dea73bf1ed5e98a76f287c2d71736f74f5ece172468ba438e15
                                        • Opcode Fuzzy Hash: 7f5bda45b1189fb04882d568003b545f52994106badf7420f34f1c4c5304df49
                                        • Instruction Fuzzy Hash: 8562503061CA498FEB98EB2CC458B6977E1FF99344F1445BAE04DC72A6DE38E845CB41
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a020349a9039465b23e9a94da8cf95c24968d80ba27169833019ab3c19d77843
                                        • Instruction ID: ac7f2c3b7e0fdcaef41a0fa2009648e5c9de002fb25b73e02e82cd5c2f63948e
                                        • Opcode Fuzzy Hash: a020349a9039465b23e9a94da8cf95c24968d80ba27169833019ab3c19d77843
                                        • Instruction Fuzzy Hash: 8C228030A1CA494FEBA8EF1894957B973E2FF98344F1441BDD44ED3692DE39A842CB41

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH
                                        • API String ID: 0-4204409433
                                        • Opcode ID: 19e85c9436d9b736203a08f4336283d4e1d6b49912e354b9defc79d80990afc6
                                        • Instruction ID: d08766e77f8e7cf98d989dd998aa281d351caff3a22f0cca812371b8106cc17a
                                        • Opcode Fuzzy Hash: 19e85c9436d9b736203a08f4336283d4e1d6b49912e354b9defc79d80990afc6
                                        • Instruction Fuzzy Hash: BD61C171A2DD8A4FE6A9EB2CD45667563D2FF987D4B4800B9D00EC32D6DE2DAC02C750

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X!(I$`"(I$a&_H
                                        • API String ID: 0-2743432387
                                        • Opcode ID: 2f6be554e39ffe5b0b940c082e17de6ce9dead3fa9b6295eb0173b8a7a45fcba
                                        • Instruction ID: d85c1ea4ee8b84674dbd499e331d2457e23414a15258922e965f26f8dac5797c
                                        • Opcode Fuzzy Hash: 2f6be554e39ffe5b0b940c082e17de6ce9dead3fa9b6295eb0173b8a7a45fcba
                                        • Instruction Fuzzy Hash: D651D472F1CE8A5FE3A9EA2C50556B573D1FFA8794B50057AC08EC32C6DE2DA9428740

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 384 7ff84919a3d9-7ff84919a3fa 387 7ff84919a402-7ff84919a4d3 384->387 388 7ff84919a3fc-7ff84919a401 384->388 394 7ff84919a4db-7ff84919a4dd 387->394 395 7ff84919a4e9-7ff84919a4f5 394->395 396 7ff84919a4df-7ff84919a4e4 394->396 399 7ff84919a4fb-7ff84919a50d 395->399 400 7ff84919a59e-7ff84919a5ba 395->400 397 7ff84919a778-7ff84919a78b 396->397 399->400 403 7ff84919a513-7ff84919a532 399->403 404 7ff84919a6b1-7ff84919a6b5 400->404 405 7ff84919a5c0-7ff84919a5e4 400->405 416 7ff84919a565-7ff84919a575 403->416 417 7ff84919a534-7ff84919a538 403->417 406 7ff84919a6c1-7ff84919a6e6 404->406 407 7ff84919a6b7-7ff84919a6bc 404->407 412 7ff84919a6a5-7ff84919a6ab 405->412 413 7ff84919a5ea-7ff84919a617 405->413 414 7ff84919a76b-7ff84919a775 406->414 415 7ff84919a6ec-7ff84919a6f1 406->415 407->397 412->404 412->405 424 7ff84919a697-7ff84919a69e 413->424 425 7ff84919a619-7ff84919a622 413->425 414->397 415->397 422 7ff84919a577-7ff84919a588 416->422 423 7ff84919a599 416->423 417->400 418 7ff84919a53a-7ff84919a556 417->418 418->423 428 7ff84919a558-7ff84919a563 418->428 434 7ff84919a58f-7ff84919a594 422->434 423->400 424->412 425->412 427 7ff84919a628-7ff84919a62c 425->427 430 7ff84919a632-7ff84919a64f 427->430 431 7ff84919a6f6-7ff84919a764 427->431 428->416 428->434 430->423 437 7ff84919a655-7ff84919a667 430->437 431->414 434->397 437->412 440 7ff84919a669-7ff84919a680 437->440 440->423 444 7ff84919a686-7ff84919a692 440->444 444->424
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH
                                        • API String ID: 0-524784639
                                        • Opcode ID: e98e6935fd88886e856050975001293b3b5e554b1191fce2b1fcaf568aeea494
                                        • Instruction ID: 258e5f35d57c748949129334e41e417a750fe013c0daee3fd2e064e18f350db1
                                        • Opcode Fuzzy Hash: e98e6935fd88886e856050975001293b3b5e554b1191fce2b1fcaf568aeea494
                                        • Instruction Fuzzy Hash: 29C18130A1CA498FEBA8EF28D4457B9B7E1FF98344F54417AD04EC7292DE38A845CB41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 804 7ff849192c10-7ff849192c2c 805 7ff849192c34-7ff849192c48 804->805 806 7ff849192c2e-7ff849192c32 804->806 807 7ff849192c4b-7ff849192caa 805->807 806->805 806->807 814 7ff849192cf4-7ff849192d5e 807->814 815 7ff849192cac-7ff849192cf3 807->815 825 7ff849192d60-7ff849192d62 814->825 826 7ff849192dcf-7ff849192ddc 814->826 815->814 827 7ff849192d64 825->827 828 7ff849192dde-7ff849192de0 825->828 826->828 829 7ff849192e4d-7ff849192e56 826->829 830 7ff849192d66-7ff849192d6e 827->830 831 7ff849192dab 827->831 832 7ff849192de2 828->832 833 7ff849192e5c-7ff849192e64 828->833 839 7ff849192e58-7ff849192e59 829->839 835 7ff849192d70 830->835 836 7ff849192dea-7ff849192dec 830->836 840 7ff849192e2c-7ff849192e34 831->840 841 7ff849192dac 831->841 837 7ff849192de4 832->837 838 7ff849192e29-7ff849192e2a 832->838 842 7ff849192e65-7ff849192e67 833->842 844 7ff849192d72-7ff849192d9a 835->844 845 7ff849192db7-7ff849192dce 835->845 848 7ff849192e68-7ff849192e70 836->848 849 7ff849192dee 836->849 846 7ff849192de7 837->846 852 7ff849192e71-7ff849192e79 838->852 853 7ff849192e2b 838->853 839->833 847 7ff849192e35-7ff849192e4c 840->847 850 7ff849192df3-7ff849192e0a 841->850 851 7ff849192dad-7ff849192db6 841->851 842->848 863 7ff849192e0b-7ff849192e18 844->863 864 7ff849192d9c-7ff849192d9e 844->864 845->826 846->839 854 7ff849192de9 846->854 847->829 848->852 849->847 855 7ff849192df0 849->855 850->863 851->845 862 7ff849192e81-7ff849192e87 852->862 853->840 854->836 855->850 865 7ff849192e89-7ff849192e92 862->865 863->865 867 7ff849192e1a-7ff849192e1c 863->867 866 7ff849192da0 864->866 864->867 868 7ff849192e98-7ff849192e9d 865->868 866->846 869 7ff849192da2-7ff849192daa 866->869 867->868 870 7ff849192e1e 867->870 871 7ff849192ee7-7ff849192f31 868->871 872 7ff849192e9f-7ff849192ec2 868->872 869->831 873 7ff849192e26-7ff849192e28 869->873 870->842 874 7ff849192e20-7ff849192e25 870->874 878 7ff849192fe0-7ff849193038 871->878 879 7ff849192f37-7ff849192f3a 871->879 873->838 874->873 889 7ff84919303f-7ff849193055 878->889 879->878 880 7ff849192f40-7ff849192fcf 879->880 898 7ff849192fd6-7ff849192fdf 880->898 893 7ff849193057-7ff84919306a 889->893 894 7ff84919306b-7ff849193071 889->894 893->894
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: 90362f7d69ce5d55f293471b8a471eb926667a952c9c0587dc993aaa54e65d3e
                                        • Instruction ID: f860ea690d7e4190a417a2a761cb42bb4c11ec8e7d188b05deeadbbe3def6b70
                                        • Opcode Fuzzy Hash: 90362f7d69ce5d55f293471b8a471eb926667a952c9c0587dc993aaa54e65d3e
                                        • Instruction Fuzzy Hash: 5EE13632E1D9CA4FE7B5FA2C98592B57BD0EF95394F0405BAD049C7292DE2CAC06CB41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 899 7ff849193f19-7ff849193f1b 900 7ff849193f65-7ff849193fa6 899->900 901 7ff849193f1d-7ff849193f47 899->901 906 7ff849193fa8-7ff849193fa9 900->906 907 7ff849193fab-7ff849193fbd 900->907 901->900 906->907 910 7ff84919400d-7ff84919400e 907->910 911 7ff849193fbf-7ff849193fc7 907->911 917 7ff849194015-7ff84919401d 910->917 913 7ff849194002-7ff849194008 911->913 914 7ff849193fc9-7ff849193fcc 911->914 916 7ff849194513-7ff849194525 913->916 914->913 915 7ff849193fce-7ff849193ffd 914->915 920 7ff849194526-7ff849194539 915->920 916->920 918 7ff849194038-7ff84919403e 917->918 919 7ff84919401f-7ff849194034 917->919 922 7ff849194044-7ff849194058 918->922 923 7ff849194379-7ff849194380 918->923 919->918 922->923 924 7ff849194382-7ff849194385 923->924 925 7ff849194387-7ff849194393 923->925 927 7ff849194395-7ff849194398 924->927 925->927 929 7ff8491943a5-7ff8491943ad 927->929 930 7ff84919439a-7ff8491943a0 927->930 932 7ff8491943b3-7ff8491943d0 929->932 933 7ff84919450d 929->933 930->920 935 7ff8491943d2-7ff8491943e2 call 7ff849193020 932->935 936 7ff8491943f7-7ff849194402 932->936 933->916 935->936 944 7ff8491943e4-7ff8491943f2 935->944 938 7ff8491944c2-7ff8491944c5 936->938 939 7ff849194408-7ff84919440d 936->939 938->933 943 7ff8491944c7-7ff8491944cd 938->943 941 7ff849194414-7ff849194417 939->941 942 7ff84919440f 939->942 945 7ff849194427-7ff84919442a 941->945 946 7ff849194419-7ff849194423 941->946 942->941 947 7ff8491944d6 943->947 948 7ff8491944cf-7ff8491944d4 943->948 944->936 949 7ff84919447a-7ff84919447d 945->949 950 7ff84919442c-7ff84919442f 945->950 946->945 951 7ff8491944db-7ff84919450b 947->951 948->951 952 7ff84919448a-7ff84919448f 949->952 953 7ff84919447f-7ff849194488 949->953 954 7ff849194451-7ff849194454 950->954 955 7ff849194431-7ff84919444b 950->955 951->920 958 7ff849194493-7ff8491944c0 952->958 953->958 959 7ff849194464-7ff84919446a 954->959 960 7ff849194456-7ff84919445c 954->960 955->954 966 7ff84919453a-7ff849194561 955->966 958->920 959->949 962 7ff84919446c-7ff849194476 959->962 960->959 961 7ff84919445e-7ff849194461 960->961 961->959 962->949 970 7ff849194563-7ff849194576 966->970 971 7ff849194578-7ff84919459c 966->971 974 7ff84919459e-7ff849194614 970->974 971->974 979 7ff849194616-7ff849194618 974->979 980 7ff849194619-7ff849194653 974->980 979->980 982 7ff849194664-7ff849194676 980->982 983 7ff849194655-7ff84919465d 980->983 986 7ff849194683-7ff84919468c 982->986 987 7ff849194678-7ff849194682 982->987 983->982 985 7ff84919465f 983->985 988 7ff8491946fc-7ff849194701 985->988 986->988
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: d4cf159aaa712aec40fd9e5950ce9941e75b5412caed245cbbddaab39bde9b4d
                                        • Instruction ID: ab0d109ae7b96c04a5a892ba54f6f795ff88421ba80cb14c7de0d65d2a0f93d8
                                        • Opcode Fuzzy Hash: d4cf159aaa712aec40fd9e5950ce9941e75b5412caed245cbbddaab39bde9b4d
                                        • Instruction Fuzzy Hash: 25E10731A0DA9A4FE7A5AF28985537837D1EF56354F0402BAD48EC72D2DE1CAC46C782

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 990 7ff848f23525-7ff848f2352f 991 7ff848f23571-7ff848f235d8 990->991 992 7ff848f23531-7ff848f23562 990->992 998 7ff848f235da-7ff848f235df 991->998 999 7ff848f235e2-7ff848f23614 DeleteFileW 991->999 992->991 998->999 1000 7ff848f2361c-7ff848f2364a 999->1000 1001 7ff848f23616 999->1001 1001->1000
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2434963323.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff848f20000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 356bcca52e024e458a46cbfa30e0c339fccf2b0fe96adf2154da091da73d907f
                                        • Instruction ID: f7c89c329cd51cee99be934b3161f555ed2f2c10135a02a5b14e7b184b064749
                                        • Opcode Fuzzy Hash: 356bcca52e024e458a46cbfa30e0c339fccf2b0fe96adf2154da091da73d907f
                                        • Instruction Fuzzy Hash: 0A41F37180DB8C5FDB05DB6C98496E9BFF0EF56310F0441ABC049C71A2DB2968058792

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1003 7ff848f23569-7ff848f235d8 1008 7ff848f235da-7ff848f235df 1003->1008 1009 7ff848f235e2-7ff848f23614 DeleteFileW 1003->1009 1008->1009 1010 7ff848f2361c-7ff848f2364a 1009->1010 1011 7ff848f23616 1009->1011 1011->1010
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2434963323.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff848f20000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: b51026900f1a9d45003930fd8a7e91c0bc3b4642b71aca276bb4c147c750b69d
                                        • Instruction ID: abc54ccf21843c473a4d7dff86577630fd02a3549c39ea79b2012866f3849d86
                                        • Opcode Fuzzy Hash: b51026900f1a9d45003930fd8a7e91c0bc3b4642b71aca276bb4c147c750b69d
                                        • Instruction Fuzzy Hash: 1131F07180CB5C9FDB19DB5888496E9BBF0FF65310F04426BC049D3292DB79A846CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1013 7ff849193451-7ff84919345b 1014 7ff849193462-7ff849193473 1013->1014 1015 7ff84919345d 1013->1015 1017 7ff849193475 1014->1017 1018 7ff84919347a-7ff8491934a7 1014->1018 1015->1014 1016 7ff84919345f 1015->1016 1016->1014 1017->1018 1019 7ff849193477 1017->1019 1021 7ff8491934d5-7ff8491934e2 1018->1021 1022 7ff8491934a9-7ff8491934b3 1018->1022 1019->1018 1023 7ff8491934b5-7ff8491934cc 1022->1023 1024 7ff8491934ee-7ff849193552 1022->1024 1027 7ff8491934e3-7ff8491934ed 1023->1027 1028 7ff8491934ce-7ff8491934d3 1023->1028 1030 7ff849193559-7ff84919355b 1024->1030 1031 7ff849193554 call 7ff849193490 1024->1031 1028->1021 1028->1022 1032 7ff84919355d-7ff849193577 1030->1032 1033 7ff84919359f-7ff8491935b0 1030->1033 1031->1030 1037 7ff849193590-7ff84919359e 1032->1037 1038 7ff849193579-7ff849193586 1032->1038 1034 7ff8491935b2 1033->1034 1035 7ff8491935b7-7ff8491935e0 call 7ff849193490 1033->1035 1034->1035 1044 7ff849193622-7ff849193629 1035->1044 1045 7ff8491935e2-7ff8491935fc 1035->1045 1038->1037 1043 7ff849193588-7ff84919358e 1038->1043 1043->1037 1048 7ff849193630-7ff849193632 1044->1048 1049 7ff849193615-7ff84919361d 1045->1049 1050 7ff8491935fe-7ff84919360b 1045->1050 1051 7ff849193634-7ff849193636 1048->1051 1052 7ff849193638-7ff849193659 1048->1052 1054 7ff8491936a7-7ff8491936be call 7ff8491936bf 1049->1054 1050->1049 1059 7ff84919360d-7ff849193613 1050->1059 1055 7ff849193663-7ff849193666 1051->1055 1056 7ff849193660-7ff849193661 1052->1056 1057 7ff8491936a3-7ff8491936a4 1055->1057 1058 7ff849193668-7ff84919369c 1055->1058 1056->1055 1057->1054 1058->1057 1059->1049
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: &_L
                                        • API String ID: 0-1440118532
                                        • Opcode ID: ff1960e8e4781e58522cc102acb852d82b69a1fe7802ea4e595728add7a5f398
                                        • Instruction ID: 6f875869870a7ce240c5e81b8151a5fcccdea0b51b9c8d1f9e387755c2af6925
                                        • Opcode Fuzzy Hash: ff1960e8e4781e58522cc102acb852d82b69a1fe7802ea4e595728add7a5f398
                                        • Instruction Fuzzy Hash: 38910830A0DA894FDBA6EF2894546B577E1FF59354F0501BAD04EC32A2DE2DE846CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1093 7ff849196e69-7ff849196e88 1096 7ff849196e8d-7ff849196ec1 1093->1096 1100 7ff849196ec3 1096->1100 1101 7ff849196ec5-7ff849196ef9 1096->1101 1100->1101 1102 7ff849196f05-7ff849196f35 1100->1102 1101->1096 1104 7ff849196f37-7ff849196f3e 1102->1104 1105 7ff849196f3f-7ff849196f42 1102->1105 1106 7ff849196f44-7ff849196f4e 1105->1106 1107 7ff849196f4f-7ff849196f6c 1105->1107 1108 7ff849196f72-7ff849196f74 1107->1108 1109 7ff849196f76-7ff849196f7c 1108->1109 1110 7ff849196fbc-7ff849196fc3 1108->1110 1109->1110 1111 7ff849196f7e-7ff849196fbb 1109->1111
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: 8ba7df710a571bbf3ecb28fa0b4a6abb733e788cfcd32e9feb03630017c10618
                                        • Instruction ID: e0689052aa82c02ff15ac8e87c6a607890b564495be8fdbed7f108446e3a131e
                                        • Opcode Fuzzy Hash: 8ba7df710a571bbf3ecb28fa0b4a6abb733e788cfcd32e9feb03630017c10618
                                        • Instruction Fuzzy Hash: C2412721A1EAC54FE796AB3C98686757FE1DFA6384B0804FAD089C71A3D91D9885C701
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #'_^
                                        • API String ID: 0-523350721
                                        • Opcode ID: a68f6a4d155a22a7a8b8a276832db89bf8ccd5e1a83d65d87693ad4d2f399088
                                        • Instruction ID: f50f03f9b3e44deff4f7b11bc3b965d452f695278f4a653962641dd99ad1012f
                                        • Opcode Fuzzy Hash: a68f6a4d155a22a7a8b8a276832db89bf8ccd5e1a83d65d87693ad4d2f399088
                                        • Instruction Fuzzy Hash: C5410E37E1A5269EC311BEBDF4864D9B3B0EF85379B084677C188CE093DB1C544586E9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #'_^
                                        • API String ID: 0-523350721
                                        • Opcode ID: 4353d0f64cd12f256ff529f136eee8590acb820d8c7326c83fc37952cfb31047
                                        • Instruction ID: 8896d64552868fc34030e801095ad9f07f2a7e3fb9bed2cb6d469f7f411aafae
                                        • Opcode Fuzzy Hash: 4353d0f64cd12f256ff529f136eee8590acb820d8c7326c83fc37952cfb31047
                                        • Instruction Fuzzy Hash: 63313D27F1E5259ED310BEBDF4864EAB3A0EF85379B0C4677C188CE083DA1C644586E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #'_^
                                        • API String ID: 0-523350721
                                        • Opcode ID: 1440e92d59acee66dcdaa225e1b4764738056750ca014c3e2a00b8d7b4c33023
                                        • Instruction ID: a7d5dbeb470b70c4e61a75ed4f64e325159e7a837f88e226ad12b0c94fe1a245
                                        • Opcode Fuzzy Hash: 1440e92d59acee66dcdaa225e1b4764738056750ca014c3e2a00b8d7b4c33023
                                        • Instruction Fuzzy Hash: DF310D27E5E52A9EC311BEBDF4864E9B3A0EF85379B0C4677C188CE183DA1C544586E4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `"(I
                                        • API String ID: 0-1945562383
                                        • Opcode ID: 450a14919b0a85711d6fffc8e02c4a5ee4438a6b7ae98420067902bdbbc9e71d
                                        • Instruction ID: 858f33006d9b2d037623cc0ecc49c5ef280719a9ceeb9d757b1f0a4a23fb0cc5
                                        • Opcode Fuzzy Hash: 450a14919b0a85711d6fffc8e02c4a5ee4438a6b7ae98420067902bdbbc9e71d
                                        • Instruction Fuzzy Hash: BD2128A2B1DDCA1FE399EA3C44553B567E1FFA8350B0401BAC08EC72C7DD1CA8058350
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 70c938bba84fa454388760a35a01f900b893883e5ff1dabfaaa061b725f30838
                                        • Instruction ID: 1aa06618bae1e800e7a4a1bb868a5bd9497b0162ef16d31210bcd38e5ba52fab
                                        • Opcode Fuzzy Hash: 70c938bba84fa454388760a35a01f900b893883e5ff1dabfaaa061b725f30838
                                        • Instruction Fuzzy Hash: 30D15B306189498FEB98FF2CD498A7977E1FF59345B1140B9E44EC72A6DE28EC42CB41
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 10b5bef49c079c955d6d1713269456e16c77009c6b5ad80976b1a1b4436c3284
                                        • Instruction ID: 4d401b7cc95ed74bd32082dc43378ba526c41b4cb7fd43cf21e4a424af939489
                                        • Opcode Fuzzy Hash: 10b5bef49c079c955d6d1713269456e16c77009c6b5ad80976b1a1b4436c3284
                                        • Instruction Fuzzy Hash: 8CC1BF30A0CA4A4FEB68EB2C94557B877D1FF54388F1441B9D48EC32D2DE2DA846CB04
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a16761cb02dd1c747294f361130a90a7fc4cecd6b1a9fe3889604aa48af3b0fe
                                        • Instruction ID: 5508b77d12e66e9be78164e66db3f99f1e6e0911376a042d118b622dc342f5d7
                                        • Opcode Fuzzy Hash: a16761cb02dd1c747294f361130a90a7fc4cecd6b1a9fe3889604aa48af3b0fe
                                        • Instruction Fuzzy Hash: E5A15E31A1CA498FDBA8EF28D4516B973E1FF88359F504179E45ED32D2DE39E8028B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eb34d3eab57c055c55021b98d6fa814297e86bac616b4a98cbb897949f4c1071
                                        • Instruction ID: c73a8b2370d1310728800952199d5c676b44006d66ca3050b10f04b6c123cedc
                                        • Opcode Fuzzy Hash: eb34d3eab57c055c55021b98d6fa814297e86bac616b4a98cbb897949f4c1071
                                        • Instruction Fuzzy Hash: 4BA1A030A0CA494FEB68EB2D94557B877D2FF58388F5041BCD48EC36D2DE2DA8468B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2521b7ed1834c5afc1ebd35477304fc87ec8b437f4b2b81f0e100d097689835f
                                        • Instruction ID: bb4c6f542e8c1897e21fcaf5b5d58688ffc3582f23288a821d190d0dccf30184
                                        • Opcode Fuzzy Hash: 2521b7ed1834c5afc1ebd35477304fc87ec8b437f4b2b81f0e100d097689835f
                                        • Instruction Fuzzy Hash: E9A19F30A0C9494FEB68EB2D94957B877D2FF58388F5041B8D48EC36D2DE2DA846CB44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b0e7e948f9915b340881ba12a7bc188f2e69f372b2878073e8bcddcd6f3dddd3
                                        • Instruction ID: 522bfaa97c18043705893669e516fbdb8c5b16851ab9a323d8c47e16cdae14b3
                                        • Opcode Fuzzy Hash: b0e7e948f9915b340881ba12a7bc188f2e69f372b2878073e8bcddcd6f3dddd3
                                        • Instruction Fuzzy Hash: 22915F30B0C9494FEBA8EB2D94957B873D2FF98388F544179D48EC36D2DE2DA8458B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8369dc4c924da404c608ef82c524a4c97f1073982047613a950a5af200b7fc26
                                        • Instruction ID: 18dab5bc5c3381d504c2f18d090d56719605417e80dc2187be6a6b068e3ad3d6
                                        • Opcode Fuzzy Hash: 8369dc4c924da404c608ef82c524a4c97f1073982047613a950a5af200b7fc26
                                        • Instruction Fuzzy Hash: BE915F30A0C9494FEBA8EB2D94957B873D2FF98388F504179D48EC36D2DE2DA8458B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e53d01a5c098e2712728b86f2d9d287a54b5945c69da8cc0f36f613127e3f0c4
                                        • Instruction ID: 7e0d9f02fc7f8f230edf975374de00551b17b448c72eac890a5500c940daa18e
                                        • Opcode Fuzzy Hash: e53d01a5c098e2712728b86f2d9d287a54b5945c69da8cc0f36f613127e3f0c4
                                        • Instruction Fuzzy Hash: 72915030A0C9494FEB68EB2D94957B973D2FF98388F504179D48EC36D2DE2DA8458B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ff36df14e63908c02b29c4dbbfebc07b373324652fa23b5d4ac60283d5e353fb
                                        • Instruction ID: 01b0436794557ed9192c90ccd31a4945ec663459551cac3af05e5828ed5d66e7
                                        • Opcode Fuzzy Hash: ff36df14e63908c02b29c4dbbfebc07b373324652fa23b5d4ac60283d5e353fb
                                        • Instruction Fuzzy Hash: 18915F30B0C9494FEBA8EB2D94957B873D2FF98388F504179D48EC36D2DE2DA8458B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6c8c15a7389cdd08743fbf92fe48d09872a35d5afa9ba6c1cfd05fac2778fc7
                                        • Instruction ID: 9249fdceca46973e6be753cd31afa346cd989f249c7238741fdf740e127900f2
                                        • Opcode Fuzzy Hash: f6c8c15a7389cdd08743fbf92fe48d09872a35d5afa9ba6c1cfd05fac2778fc7
                                        • Instruction Fuzzy Hash: 80914030A0C9494FEB68EB1D94957B873D2FF98388F544179D48EC36D3DE2DA8458B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a670bf6f19e394127730b2dece79e846ac108fad8218000dcecb56cd48a50c2f
                                        • Instruction ID: 10baed4cfcdce20fcee6ea21131a08dee875fc8223aefa2191c495d28ad49c9a
                                        • Opcode Fuzzy Hash: a670bf6f19e394127730b2dece79e846ac108fad8218000dcecb56cd48a50c2f
                                        • Instruction Fuzzy Hash: 8D915030A0C9494FEB68EB1D94957B873D2FF98388F5441B9D48EC36D3DE2DA8458B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 175d94df8599f7f07a522a7faf149e8b5f06d5d458e46078b1deccdff8b75e32
                                        • Instruction ID: acdde2d0245e010ad57c965410febbd1438f30c952d0c0cbc94be99297a2dbca
                                        • Opcode Fuzzy Hash: 175d94df8599f7f07a522a7faf149e8b5f06d5d458e46078b1deccdff8b75e32
                                        • Instruction Fuzzy Hash: 3A915130A0C9494FEB68EB1D94957B877D2FF98384F5041B9D48EC36C3DE2DA8458B44
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ea9948ad3aacac184cdb053a5724f8c0ceaa091bf209c1b6a54c9ea67e5901a4
                                        • Instruction ID: fc4a0a4e82893be7bedb6586efd57d664ae38073bc4f66947d709f61e8f344e9
                                        • Opcode Fuzzy Hash: ea9948ad3aacac184cdb053a5724f8c0ceaa091bf209c1b6a54c9ea67e5901a4
                                        • Instruction Fuzzy Hash: 1A713731B1C9494FEBA8FB2CE84967577D1EF9A364B0401BAD44EC7293DD29EC428781
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c4f2793b29e5584eb4f40a84076a15a9decac33aa45aca25812a63c563ff25e6
                                        • Instruction ID: 383230f02c8d0683c7fe8c3851fa43c044624480137a7d3a4c21aa32ab0ee216
                                        • Opcode Fuzzy Hash: c4f2793b29e5584eb4f40a84076a15a9decac33aa45aca25812a63c563ff25e6
                                        • Instruction Fuzzy Hash: 29619230A4DA898FEBA5EF28D858AB577E1FF45348F0504BAD45DC71A2DA2CEC41CB41
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d512e089c6ede56ed40b7c44241e2ae29bcc924d3ed8247d5ac03aeea5036bbd
                                        • Instruction ID: d7eec369e0cbaa2ad0daf6646d5c0d8b2069bd14f40728be77eb499b1c158c0a
                                        • Opcode Fuzzy Hash: d512e089c6ede56ed40b7c44241e2ae29bcc924d3ed8247d5ac03aeea5036bbd
                                        • Instruction Fuzzy Hash: 26511672D0CACA4FE379EE2CA8151B57BD0EF556D4B04427AC48EC71D2DD1DA885C781
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4dcaa0a27e35bfe53f793c3933bdef1cd2efbe62e5cace63d88465434c92716b
                                        • Instruction ID: 28e17837f1213ac985cd79ed8d67861fdce928b7108f453edbae97dddcb9a73c
                                        • Opcode Fuzzy Hash: 4dcaa0a27e35bfe53f793c3933bdef1cd2efbe62e5cace63d88465434c92716b
                                        • Instruction Fuzzy Hash: 29519B71F0CE8A9FE3E4EA7C90556B473D2EF98794B5005BEC44EC328ADD296842CB40
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 304ab8356a6c5b1f86c220e4a1ac67d147a5b7dd09643e54504a25e05a2b6f76
                                        • Instruction ID: f85f84dd477cffac1ce2ceb69c8c8bf8805aca2517ffceed43b99fdc6cce281a
                                        • Opcode Fuzzy Hash: 304ab8356a6c5b1f86c220e4a1ac67d147a5b7dd09643e54504a25e05a2b6f76
                                        • Instruction Fuzzy Hash: B251193161CA894FEB69FB2898446757BD0EF563A8F10027ED48DC31E6DE1DA803C781
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c087af8b41cf4509bff42b1acadf65d118fb99a62e5abbd125129193609d9f9
                                        • Instruction ID: c36a23b7d907b4d3cb7776c374f962d4969ea66999f66b645150eab33646cb2e
                                        • Opcode Fuzzy Hash: 9c087af8b41cf4509bff42b1acadf65d118fb99a62e5abbd125129193609d9f9
                                        • Instruction Fuzzy Hash: 0041F020B1EA851FE755BB7858563F5B7D1EF88759F2402BAE00CC72C7CD1CA94683A2
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 009ff547ca569072ca22c790e683832eb389fca30f1914ee23a92a8a79fd980f
                                        • Instruction ID: ff2236e7ee3b372051be6da2d068f9bc8c425c9e7225e52c929b55b6ee6821aa
                                        • Opcode Fuzzy Hash: 009ff547ca569072ca22c790e683832eb389fca30f1914ee23a92a8a79fd980f
                                        • Instruction Fuzzy Hash: 9B317A3291EAC65FE39AAB7C94556B13BE1EF5B25470840FAC009CB293DD2D9C46C740
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eab287bc9e1aa4306483b4bcd6bcdcc27a2f26016ccb13f5cdb7d578e542039a
                                        • Instruction ID: 9b61d896aa20b1e372329eb12d7a9cb457b470a1cee6ad9a03b800c0a915662d
                                        • Opcode Fuzzy Hash: eab287bc9e1aa4306483b4bcd6bcdcc27a2f26016ccb13f5cdb7d578e542039a
                                        • Instruction Fuzzy Hash: A731E021A2EA9A4FE765BB2894A11F67BF0EF69344F4004B7D04AC31C7DE2D6806C791
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a1aad9c95e6c528db9509f01a723ffb62f138bfadc2777f60ea4e092e6fc0b32
                                        • Instruction ID: b892379636a314858c55813e00c09955a2e2e6ddea6e8972fa6c3e610775a224
                                        • Opcode Fuzzy Hash: a1aad9c95e6c528db9509f01a723ffb62f138bfadc2777f60ea4e092e6fc0b32
                                        • Instruction Fuzzy Hash: 9731D73161C9095FEB98FF28D44967533C1EF99398B00027DD44EC32A6EE2DE8028781
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f59c7e32f42ddda215a422e0c57aaa673234c74ab745ed574e6e75dd41a2d76e
                                        • Instruction ID: 4f52a1b5030c24363f3671c6f9defaa1ca82727ae98b2494f0e6404bac53b05d
                                        • Opcode Fuzzy Hash: f59c7e32f42ddda215a422e0c57aaa673234c74ab745ed574e6e75dd41a2d76e
                                        • Instruction Fuzzy Hash: AF31F310B2E9455FF794FB6C589A3B8A2C2EF98744F6401B9D00CC32C7CD2CAC058751
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f853f2670ac78b683cea1c34d0b72235c83fd7fac0cbc4eef035b73b17560d61
                                        • Instruction ID: 3c49bf979db5bc15f8bea14ebcc778c9d75f46524d03a0db64b7b0e8007fd354
                                        • Opcode Fuzzy Hash: f853f2670ac78b683cea1c34d0b72235c83fd7fac0cbc4eef035b73b17560d61
                                        • Instruction Fuzzy Hash: CD31033A90DAC74FE7B9AA2C94542717BD0EF45398F1800B9E44FC7192DE1CE881CB41
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c5f20176eab9b213672abddc3069fc86d3b620a8c67c1a989393514d4eb2d18
                                        • Instruction ID: 59b572fc492cc3fa5b961acc1297b83cd9b91388b694a9f279fe28e5cf703416
                                        • Opcode Fuzzy Hash: 7c5f20176eab9b213672abddc3069fc86d3b620a8c67c1a989393514d4eb2d18
                                        • Instruction Fuzzy Hash: D9113A33F1ED4A5FF2B8A91C68495B537D1EFE87A475502BAD00DC3286ED1CAC42C690
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1900c9f719cc786196f8fbd1c52e83487252c989b305b8f28043ec6f7632bb0
                                        • Instruction ID: 7850ac01ab72677ded1304e7fda9d57b9a2ab5068d47de1d80998dac5be151bb
                                        • Opcode Fuzzy Hash: c1900c9f719cc786196f8fbd1c52e83487252c989b305b8f28043ec6f7632bb0
                                        • Instruction Fuzzy Hash: F021BC31A18A4D8FDB98EF28D4456AA77E1FF99319F10017EE40ED3292CB35E852CB40
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4cc23f08f062537f57da25aa846b3bd4b5b6b8f580fa459cdc76326926ae3f0b
                                        • Instruction ID: f9632734babef89120cfc4a56455d58702f02a6fd1ee84b9a917fb85ef0d7222
                                        • Opcode Fuzzy Hash: 4cc23f08f062537f57da25aa846b3bd4b5b6b8f580fa459cdc76326926ae3f0b
                                        • Instruction Fuzzy Hash: 9A112932F1DD4A1FF2B8A91CA84A5B537D1EFE97A475502BAD00DC3286ED1CBC42C690
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ca8d749adcc35a90960060d05e621b05a4eb57cceac6aa0f1f7cb931412474c2
                                        • Instruction ID: e1344c576649195c80d93808864a628027ea46dd323f1e1b0aaf89acf08b42cd
                                        • Opcode Fuzzy Hash: ca8d749adcc35a90960060d05e621b05a4eb57cceac6aa0f1f7cb931412474c2
                                        • Instruction Fuzzy Hash: ED216A3061CA498FDB98EF1DD4456A9B7E1FF98321F10117EE48AD32A1CA35E842CB41
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 30e3c9fd302e7ce5f1e32d101ac83386c64d8d65977a4f3d027c69550898d1ec
                                        • Instruction ID: e285601e8082b6f5d3ca7456fba95ec737e4e21e235793dac843f88e1a438a57
                                        • Opcode Fuzzy Hash: 30e3c9fd302e7ce5f1e32d101ac83386c64d8d65977a4f3d027c69550898d1ec
                                        • Instruction Fuzzy Hash: D921322691C99D5FE765BB6894017FAB7E0FF96354F0802B6E00CC30C2CF1CA91487A1
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4422135fe55d461c073a4ac22034e713e5ef0ecb133e16fc2b933d76f0c99349
                                        • Instruction ID: 6dfdafdf28b04abc4c87a2983ca5bdc9c4c0db32ca0895fa127906615269ab60
                                        • Opcode Fuzzy Hash: 4422135fe55d461c073a4ac22034e713e5ef0ecb133e16fc2b933d76f0c99349
                                        • Instruction Fuzzy Hash: 50219F31B3995A4EE754BB28E0922FA73E1FB98344F40457AD44FC32C7DE2DA8068781
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d792c8d9aef292c09483306f629f6585f39e1eb00a5ada8237da4251aebc96b
                                        • Instruction ID: 7a60b093814248407e2ba58531f15bdd10abc521fe368aa144e7a07e0ca66db1
                                        • Opcode Fuzzy Hash: 2d792c8d9aef292c09483306f629f6585f39e1eb00a5ada8237da4251aebc96b
                                        • Instruction Fuzzy Hash: 1011A31148FAC61FE34A67B44C295E23FE5DF9B19071D42E7E085CB4E3D84C498AC3A1
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6b3ab37509013dbb28f4d79e09bf09d107131f5b7017feb43c0a7c1f9b6e6089
                                        • Instruction ID: 64018bc5cfc017de9c475e957b7f36eb1e9c13aa3a9aefa713b23b187ddd6a51
                                        • Opcode Fuzzy Hash: 6b3ab37509013dbb28f4d79e09bf09d107131f5b7017feb43c0a7c1f9b6e6089
                                        • Instruction Fuzzy Hash: 8911E53158E6C61FD3469B748C20AD27BE5DF8B15030901F6E089CB5A3C91D9987C760
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e5b6144f56f62c1c387eee4af0ca33d5553a35507711995fa8bde62e1c27bc2
                                        • Instruction ID: ed5af7a951412cc8892b731cd215e1446897622b8b22b8714ce2f3b9f275bb1c
                                        • Opcode Fuzzy Hash: 8e5b6144f56f62c1c387eee4af0ca33d5553a35507711995fa8bde62e1c27bc2
                                        • Instruction Fuzzy Hash: 4811023291E7C94FD356AB3498690E97FB0EF46210B4A05FBD144CB1A3DF2C594AC751
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72b696eae5d1eaf2eef2a038486d4e18549afe1804d9243e9717e0cb412aeda0
                                        • Instruction ID: 2991edce58318fe24afe76c9aa8fdf45d9c10673b2fbded0936309cb47e91d12
                                        • Opcode Fuzzy Hash: 72b696eae5d1eaf2eef2a038486d4e18549afe1804d9243e9717e0cb412aeda0
                                        • Instruction Fuzzy Hash: CC01F53190DA954FE752E72894452A97FD1DF85264F080A6ED088C61E2CA684A86C386
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2810148862be4b688bf6a00ffed140f4ce2697349f270415701889c8bfd8f338
                                        • Instruction ID: e86b5e9a0364c31c8028279c91daab019c8a51c5801e059092d04ff7b6b8b825
                                        • Opcode Fuzzy Hash: 2810148862be4b688bf6a00ffed140f4ce2697349f270415701889c8bfd8f338
                                        • Instruction Fuzzy Hash: 11F0C23180DACC2FEB51AB7894596EABFF0EF46300F4544E7D848DA193CE286645CB51
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 008e25f5b8e082badb337c0a234f77ff7680e7e58a5e89e42d955fa0517cd11e
                                        • Instruction ID: bb41a19233668a7f786590f8999e9994f1899deac7c237ed25a497f227ce3109
                                        • Opcode Fuzzy Hash: 008e25f5b8e082badb337c0a234f77ff7680e7e58a5e89e42d955fa0517cd11e
                                        • Instruction Fuzzy Hash: EB01D671E1DEC64FE3A8FE3844515BA63E2FFD8684B444578C04EC3286CE1DB9068B10
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 101badfb939290e4272dba7a2347a3336ba70ca66ac3b914a9317be90a2dac1f
                                        • Instruction ID: aca2c59662c9e666fb17bb8fb00c30c55683654bea72ad0605772e343720c6a1
                                        • Opcode Fuzzy Hash: 101badfb939290e4272dba7a2347a3336ba70ca66ac3b914a9317be90a2dac1f
                                        • Instruction Fuzzy Hash: 02F0542778DD4E0FD364BD9D7CC15F17380F780379B58013ACA1EC3585D54D68664290
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 49138bda0a58c861e825fb19f86c2fa74a8dfd61baf0aca26c4ae1dcb5d84b13
                                        • Instruction ID: f9288b2d012b362c74ebd4f7b897d01ac920a468624749927c4a1c21f2951529
                                        • Opcode Fuzzy Hash: 49138bda0a58c861e825fb19f86c2fa74a8dfd61baf0aca26c4ae1dcb5d84b13
                                        • Instruction Fuzzy Hash: 7BF0E920E6C9490BE754BB3C640527573D5EF45309F5409B9D84DC71E5DF29DC524781
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b43d43b492d4213959e61bb28802a0fa943040318bce010ea734979e5beae78
                                        • Instruction ID: 684a1ce79898f5fbc51e78b3a0f55f7fb8d09b6de72f39530501dd7690f4f013
                                        • Opcode Fuzzy Hash: 2b43d43b492d4213959e61bb28802a0fa943040318bce010ea734979e5beae78
                                        • Instruction Fuzzy Hash: B1F0A07190D60C6FDB18FF59EC4AAEB37A8FF85224F00013AF44D82192E6356863CB50
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c34db2c87c02bdc3fa2be3b67f77d40251e855d98913ab74af7c4a9abfe9530f
                                        • Instruction ID: 09fe943120623a5550ef0c4316288c454063daa7019782820bc016c59263a29e
                                        • Opcode Fuzzy Hash: c34db2c87c02bdc3fa2be3b67f77d40251e855d98913ab74af7c4a9abfe9530f
                                        • Instruction Fuzzy Hash: 2CD05E53B9C58E0BE590B94878911F1A380EB542B9B500373C58D830C6CD2F65464641
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21d46be57608a414555087a9ff69b87ce9620efef7e9042b253813855672e1df
                                        • Instruction ID: 8e66ae1f85a45fcdc88f96f552331475f1a95b3ad1d0e0bdb1f1df88fcdd09f1
                                        • Opcode Fuzzy Hash: 21d46be57608a414555087a9ff69b87ce9620efef7e9042b253813855672e1df
                                        • Instruction Fuzzy Hash: 23D02331C0D589CFD348BB3C40051643650FF08388F5404BDD00ECB1D1D557540EC302
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000012.00000002.2437325823.00007FF849192000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849192000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_18_2_7ff849192000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH$HAH$HAH$HAH$r&_H
                                        • API String ID: 0-1577230237
                                        • Opcode ID: 06a66dc94931d93841925e24eaf39bf81f151a6b9969a87eb5adea60a59f5f04
                                        • Instruction ID: be846a6027a42d52494a3028f75d70838d4bd7f5308db5d5e6f1f7d848a68569
                                        • Opcode Fuzzy Hash: 06a66dc94931d93841925e24eaf39bf81f151a6b9969a87eb5adea60a59f5f04
                                        • Instruction Fuzzy Hash: 4B914821E1D98A4FE794EB38A459AB477D1FF98694B0841BAC04EC7293EE1CAC47C741

                                        Execution Graph

                                        Execution Coverage:10.1%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:3
                                        Total number of Limit Nodes:0
                                        execution_graph 11271 7ff848f33569 11272 7ff848f33571 DeleteFileW 11271->11272 11274 7ff848f33616 11272->11274

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 65 7ff8491a93c1-7ff8491a9409 67 7ff8491a941a-7ff8491a942c 65->67 68 7ff8491a940b-7ff8491a9419 65->68 70 7ff8491a9432-7ff8491a9442 67->70 71 7ff8491a94af-7ff8491a94b3 67->71 77 7ff8491a972b-7ff8491a9761 70->77 78 7ff8491a9448-7ff8491a9497 70->78 72 7ff8491a94b5-7ff8491a94b9 71->72 73 7ff8491a94cb-7ff8491a94cf 71->73 79 7ff8491a94c0-7ff8491a94c4 72->79 75 7ff8491a94d1-7ff8491a94f8 73->75 76 7ff8491a94fe-7ff8491a9502 73->76 75->76 86 7ff8491a9781-7ff8491a9799 75->86 80 7ff8491a9508-7ff8491a950d 76->80 81 7ff8491a971c-7ff8491a972a 76->81 114 7ff8491a94a4-7ff8491a94a8 78->114 115 7ff8491a9499-7ff8491a94a2 78->115 79->73 80->81 84 7ff8491a9513-7ff8491a951d 80->84 92 7ff8491a956b-7ff8491a9570 84->92 93 7ff8491a951f-7ff8491a9531 84->93 102 7ff8491a97a5 86->102 103 7ff8491a979b-7ff8491a97a1 86->103 95 7ff8491a9576-7ff8491a9580 92->95 96 7ff8491a96f8-7ff8491a96fd 92->96 93->92 104 7ff8491a9533-7ff8491a955e 93->104 95->96 108 7ff8491a9586-7ff8491a9598 95->108 96->81 98 7ff8491a96ff-7ff8491a9714 96->98 98->81 110 7ff8491a9716-7ff8491a9719 98->110 105 7ff8491a97a7 102->105 106 7ff8491a97a9-7ff8491a9808 102->106 103->106 109 7ff8491a97a3 103->109 104->92 122 7ff8491a9560-7ff8491a9564 104->122 105->106 127 7ff8491a9dae-7ff8491a9dc0 106->127 128 7ff8491a980e-7ff8491a9820 106->128 119 7ff8491a968e-7ff8491a96f1 108->119 120 7ff8491a959e-7ff8491a95c5 108->120 109->102 110->81 114->71 115->71 119->96 122->92 128->127 132 7ff8491a9826-7ff8491a985f 128->132 132->127 138 7ff8491a9865-7ff8491a98a6 132->138 142 7ff8491a9958-7ff8491a996b 138->142 143 7ff8491a98ac-7ff8491a98c4 138->143 146 7ff8491a99c0 142->146 147 7ff8491a996d-7ff8491a998e 142->147 148 7ff8491a98ca-7ff8491a98ea 143->148 149 7ff8491a994c-7ff8491a9952 143->149 150 7ff8491a99c2-7ff8491a99c7 146->150 155 7ff8491a9990-7ff8491a99b7 147->155 156 7ff8491a99b9-7ff8491a99be 147->156 148->149 163 7ff8491a98ec-7ff8491a98fe 148->163 149->142 149->143 152 7ff8491a99c9-7ff8491a99d0 150->152 153 7ff8491a9a0e-7ff8491a9a31 150->153 158 7ff8491a99d7-7ff8491a99f1 152->158 160 7ff8491a9b27-7ff8491a9b33 153->160 161 7ff8491a9a37-7ff8491a9a5f 153->161 155->150 156->150 158->153 168 7ff8491a99f3-7ff8491a9a0c 158->168 160->127 164 7ff8491a9b39-7ff8491a9b4e 160->164 174 7ff8491a9a65-7ff8491a9a80 161->174 175 7ff8491a9b1b-7ff8491a9b21 161->175 163->149 169 7ff8491a9900-7ff8491a9904 163->169 164->127 168->153 171 7ff8491a9dc1-7ff8491a9e63 169->171 172 7ff8491a990a-7ff8491a991f 169->172 185 7ff8491a9f75-7ff8491a9fa8 171->185 186 7ff8491a9e69-7ff8491a9e6b 171->186 180 7ff8491a9926-7ff8491a9928 172->180 174->175 187 7ff8491a9a86-7ff8491a9a98 174->187 175->160 175->161 180->149 181 7ff8491a992a-7ff8491a9948 call 7ff8491a4bb0 180->181 181->149 200 7ff8491a9faf-7ff8491a9fba 185->200 190 7ff8491a9e85-7ff8491a9e93 186->190 191 7ff8491a9e6d-7ff8491a9e7f 186->191 187->175 197 7ff8491a9a9e-7ff8491a9aa2 187->197 193 7ff8491a9fe8-7ff8491aa01b 190->193 194 7ff8491a9e99-7ff8491a9eb0 190->194 191->190 191->200 215 7ff8491aa022-7ff8491aa061 193->215 212 7ff8491a9eb2-7ff8491a9ec4 194->212 213 7ff8491a9eca-7ff8491a9ecd 194->213 197->171 202 7ff8491a9aa8-7ff8491a9aeb 197->202 209 7ff8491a9f41-7ff8491a9f42 200->209 210 7ff8491a9fbc-7ff8491a9fd1 200->210 202->175 231 7ff8491a9aed-7ff8491a9b18 call 7ff8491a4bb0 202->231 218 7ff8491a9fd3-7ff8491a9fd5 210->218 219 7ff8491a9fd6-7ff8491a9fe1 210->219 212->213 212->215 216 7ff8491a9ef6-7ff8491a9f12 call 7ff8491a7240 213->216 217 7ff8491a9ecf-7ff8491a9ee6 213->217 240 7ff8491aa063-7ff8491aa069 215->240 241 7ff8491aa06d 215->241 233 7ff8491a9f43-7ff8491a9f47 216->233 234 7ff8491a9f14-7ff8491a9f40 216->234 217->216 235 7ff8491a9ee8-7ff8491a9eec 217->235 218->219 219->193 231->175 242 7ff8491a9f4e-7ff8491a9f74 233->242 234->209 238 7ff8491a9ef3-7ff8491a9ef4 235->238 238->216 244 7ff8491aa071-7ff8491aa0ac 240->244 245 7ff8491aa06b 240->245 241->244 247 7ff8491aa06f 241->247 251 7ff8491aa0ae-7ff8491aa0d5 244->251 252 7ff8491aa0ef-7ff8491aa122 244->252 245->241 247->244 258 7ff8491aa129-7ff8491aa144 251->258 261 7ff8491aa0d7-7ff8491aa0ee 251->261 252->258 262 7ff8491aa146-7ff8491aa171 258->262 263 7ff8491aa18e-7ff8491aa197 258->263 279 7ff8491aa173 262->279 280 7ff8491aa175-7ff8491aa18a 262->280 266 7ff8491aa27a-7ff8491aa291 263->266 267 7ff8491aa19d-7ff8491aa1af 263->267 271 7ff8491aa292-7ff8491aa2c3 266->271 272 7ff8491aa1b1-7ff8491aa1b4 267->272 273 7ff8491aa1bb-7ff8491aa1d3 call 7ff8491a38a0 267->273 287 7ff8491aa305 271->287 288 7ff8491aa2c5-7ff8491aa2e2 271->288 275 7ff8491aa1b5-7ff8491aa1ba 272->275 282 7ff8491aa237-7ff8491aa240 273->282 283 7ff8491aa1d5-7ff8491aa206 273->283 279->275 279->280 280->263 299 7ff8491aa231-7ff8491aa235 283->299 300 7ff8491aa208-7ff8491aa22f 283->300 289 7ff8491aa307 287->289 290 7ff8491aa2f5-7ff8491aa2ff 287->290 292 7ff8491aa2e4-7ff8491aa2f4 288->292 293 7ff8491aa309-7ff8491aa30b 288->293 289->293 290->293 294 7ff8491aa301-7ff8491aa302 290->294 292->290 296 7ff8491aa31c-7ff8491aa32c 293->296 297 7ff8491aa30d-7ff8491aa31b 293->297 294->287 299->282 299->283 300->299 302 7ff8491aa241-7ff8491aa266 300->302 302->271 305 7ff8491aa268-7ff8491aa279 302->305
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH$HAH$HAH$HAH
                                        • API String ID: 0-3722465034
                                        • Opcode ID: 29244ca1ad97f6ee60d7cc69d914ce20ef1553c8309b456c90c583f138a5a927
                                        • Instruction ID: 6186a3b371ec01e0cc9a36aa6dd1c8abc855991897a807009cb06b4614e5ebce
                                        • Opcode Fuzzy Hash: 29244ca1ad97f6ee60d7cc69d914ce20ef1553c8309b456c90c583f138a5a927
                                        • Instruction Fuzzy Hash: 8392F631B1CA894FEBA8EF2C945977577D1FF99360F1400BAD44EC7296DE28AC428B41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 410 7ff8491a4dc6-7ff8491a4dd8 412 7ff8491a4dda-7ff8491a4e33 410->412 413 7ff8491a4dbe-7ff8491a4dc3 410->413 416 7ff8491a4e35-7ff8491a4e40 412->416 417 7ff8491a4e84-7ff8491a4ebc call 7ff8491a38a0 call 7ff8491a3730 412->417 419 7ff8491a4e47-7ff8491a4e4a 416->419 425 7ff8491a4ed8-7ff8491a4ee0 417->425 426 7ff8491a4ebe-7ff8491a4ed3 call 7ff8491a4ae0 417->426 419->417 421 7ff8491a4e4c-7ff8491a4e61 call 7ff8491a3730 419->421 421->417 431 7ff8491a4e63-7ff8491a4e7f call 7ff8491a3140 421->431 429 7ff8491a4ee2-7ff8491a4efa 425->429 430 7ff8491a4efc 425->430 426->425 432 7ff8491a4efe-7ff8491a4f05 429->432 430->432 431->417 435 7ff8491a4f07-7ff8491a4f17 432->435 436 7ff8491a4f18-7ff8491a4f5a 432->436 437 7ff8491a4f60-7ff8491a4f93 436->437 438 7ff8491a5a36-7ff8491a5a40 436->438 448 7ff8491a4f99-7ff8491a4fab 437->448 449 7ff8491a51ee-7ff8491a5200 437->449 439 7ff8491a5a42-7ff8491a5a4d 438->439 440 7ff8491a5a58 438->440 441 7ff8491a5a5d-7ff8491a5a5f 439->441 440->441 443 7ff8491a5a61-7ff8491a5a73 441->443 444 7ff8491a5a7a-7ff8491a5a7f 441->444 443->444 445 7ff8491a5a81 444->445 446 7ff8491a5a84-7ff8491a5a95 444->446 445->446 453 7ff8491a620e-7ff8491a62be 446->453 448->449 455 7ff8491a4fb1-7ff8491a4fe3 448->455 457 7ff8491a52c3-7ff8491a52c5 449->457 458 7ff8491a5206-7ff8491a5232 449->458 466 7ff8491a4fe5-7ff8491a5007 455->466 467 7ff8491a5016-7ff8491a504a 455->467 459 7ff8491a5335-7ff8491a5347 457->459 460 7ff8491a52c7-7ff8491a52d9 457->460 458->457 464 7ff8491a5238-7ff8491a523d 458->464 470 7ff8491a591b-7ff8491a592d 459->470 471 7ff8491a534d-7ff8491a5379 459->471 460->459 473 7ff8491a52db-7ff8491a52de 460->473 464->457 472 7ff8491a5243-7ff8491a5246 464->472 466->467 488 7ff8491a504c-7ff8491a506c 467->488 489 7ff8491a507e-7ff8491a50b5 467->489 491 7ff8491a599c-7ff8491a59ae 470->491 492 7ff8491a592f-7ff8491a5937 470->492 493 7ff8491a537b-7ff8491a5384 471->493 494 7ff8491a53af-7ff8491a53c6 471->494 475 7ff8491a5248-7ff8491a5251 472->475 476 7ff8491a526b-7ff8491a5274 472->476 477 7ff8491a52e0-7ff8491a52fb 473->477 478 7ff8491a5304-7ff8491a5332 call 7ff8491a4bb0 473->478 475->476 485 7ff8491a5276-7ff8491a5299 476->485 486 7ff8491a529b-7ff8491a52c0 call 7ff8491a4bb0 476->486 477->478 478->459 485->486 486->457 488->489 506 7ff8491a5141-7ff8491a516e 489->506 507 7ff8491a50bb-7ff8491a50d3 489->507 519 7ff8491a59b0-7ff8491a59ba 491->519 520 7ff8491a5a25-7ff8491a5a30 491->520 492->491 500 7ff8491a5939-7ff8491a5966 492->500 502 7ff8491a5386-7ff8491a5396 493->502 503 7ff8491a53a8-7ff8491a53a9 493->503 517 7ff8491a54c2-7ff8491a54ef 494->517 518 7ff8491a53cc-7ff8491a53f5 494->518 500->491 524 7ff8491a5968-7ff8491a5971 500->524 502->503 503->494 529 7ff8491a5170-7ff8491a5179 506->529 530 7ff8491a51a4-7ff8491a51ae 506->530 515 7ff8491a50d5-7ff8491a50e5 507->515 516 7ff8491a5138-7ff8491a513f 507->516 528 7ff8491a5105-7ff8491a5136 515->528 516->528 539 7ff8491a54f1-7ff8491a551c 517->539 540 7ff8491a551f-7ff8491a5548 517->540 518->470 544 7ff8491a53fb-7ff8491a541b 518->544 526 7ff8491a59c0-7ff8491a59ec 519->526 527 7ff8491a5a4f-7ff8491a5a56 519->527 520->437 520->438 533 7ff8491a5973-7ff8491a5983 524->533 534 7ff8491a5995-7ff8491a5996 524->534 526->520 546 7ff8491a59ee-7ff8491a59f7 526->546 527->520 528->530 536 7ff8491a517b-7ff8491a518b 529->536 537 7ff8491a519d-7ff8491a519e 529->537 530->453 542 7ff8491a51b4-7ff8491a51d5 530->542 533->534 534->491 536->537 537->530 539->540 558 7ff8491a55df-7ff8491a55f3 540->558 559 7ff8491a554e-7ff8491a557d 540->559 542->449 560 7ff8491a51d7-7ff8491a51e6 542->560 544->517 551 7ff8491a59f9-7ff8491a5a09 546->551 552 7ff8491a5a1e-7ff8491a5a1f 546->552 551->552 552->520 561 7ff8491a55f5-7ff8491a560c 558->561 559->558 565 7ff8491a557f-7ff8491a55ab 559->565 560->449 566 7ff8491a5647-7ff8491a5674 561->566 567 7ff8491a560e-7ff8491a5613 561->567 565->558 570 7ff8491a55ad-7ff8491a55dc 565->570 575 7ff8491a5676-7ff8491a56c7 call 7ff8491a4ae0 566->575 576 7ff8491a56cc-7ff8491a56f8 566->576 567->566 568 7ff8491a5615-7ff8491a5637 567->568 568->561 579 7ff8491a5639-7ff8491a5644 568->579 570->558 575->576 583 7ff8491a56fa-7ff8491a5738 call 7ff8491a4ae0 576->583 584 7ff8491a573d-7ff8491a5769 576->584 579->566 583->584 589 7ff8491a576b-7ff8491a57a9 call 7ff8491a4ae0 584->589 590 7ff8491a57ae-7ff8491a57da 584->590 589->590 595 7ff8491a5842-7ff8491a586f 590->595 596 7ff8491a57dc-7ff8491a57f0 590->596 601 7ff8491a5871-7ff8491a58af call 7ff8491a4ae0 595->601 602 7ff8491a58b4-7ff8491a58e0 595->602 598 7ff8491a57f1-7ff8491a5811 596->598 598->595 604 7ff8491a5813-7ff8491a5835 598->604 601->602 602->470 609 7ff8491a58e2-7ff8491a58eb 602->609 604->598 613 7ff8491a5837-7ff8491a583a 604->613 611 7ff8491a5912-7ff8491a5913 609->611 612 7ff8491a58ed-7ff8491a5910 609->612 611->470 612->611 613->595
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: 048da489551c56ac34d5025cc19fbf0f19615e6cb661caedb92a3b5bd30d3487
                                        • Instruction ID: cf6b3f47bf71c3345e2366a0a7ec85fca93c702ce66b606623a31f78e3f887ac
                                        • Opcode Fuzzy Hash: 048da489551c56ac34d5025cc19fbf0f19615e6cb661caedb92a3b5bd30d3487
                                        • Instruction Fuzzy Hash: 56929270A1CA598FDBA8EF18C494BB977E2FF58350F5041A8D04ED7296DA39EC85CB40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 616 7ff8491a5be1-7ff8491a5bfb 617 7ff8491a5bff-7ff8491a5c01 616->617 618 7ff8491a5ce7-7ff8491a5cf9 617->618 619 7ff8491a5c07-7ff8491a5c56 617->619 621 7ff8491a5cff-7ff8491a5d95 618->621 619->618 624 7ff8491a5c5c-7ff8491a5c97 619->624 631 7ff8491a601e-7ff8491a603b 621->631 629 7ff8491a5cc4-7ff8491a5cd5 624->629 630 7ff8491a5c99-7ff8491a5cc2 624->630 629->624 632 7ff8491a5cd7 629->632 630->629 646 7ff8491a5cd9-7ff8491a5ce1 630->646 633 7ff8491a6041-7ff8491a6044 631->633 634 7ff8491a5af5-7ff8491a5b2f 631->634 632->618 636 7ff8491a6066-7ff8491a6081 633->636 637 7ff8491a6046-7ff8491a604a 633->637 634->631 650 7ff8491a5b35-7ff8491a5b7f 634->650 642 7ff8491a6082-7ff8491a6087 636->642 637->636 640 7ff8491a604c-7ff8491a6061 call 7ff8491a4ae0 637->640 640->636 644 7ff8491a60a6-7ff8491a60ab 642->644 645 7ff8491a6089-7ff8491a609f 642->645 648 7ff8491a60ed-7ff8491a60f4 644->648 649 7ff8491a60ad-7ff8491a60c0 644->649 645->644 646->618 652 7ff8491a6122-7ff8491a6127 648->652 653 7ff8491a60f6-7ff8491a6102 648->653 649->642 657 7ff8491a60c2-7ff8491a60cb 649->657 650->631 665 7ff8491a5b85-7ff8491a5b88 650->665 655 7ff8491a612d-7ff8491a6135 652->655 656 7ff8491a61fc-7ff8491a620d 652->656 658 7ff8491a6109-7ff8491a610f 653->658 660 7ff8491a6287-7ff8491a62be 655->660 661 7ff8491a613b-7ff8491a614b 655->661 657->648 662 7ff8491a60cd-7ff8491a60d9 657->662 663 7ff8491a6111-7ff8491a6112 658->663 664 7ff8491a611a-7ff8491a6120 658->664 674 7ff8491a615b-7ff8491a6163 661->674 675 7ff8491a614d-7ff8491a6151 661->675 666 7ff8491a60e5-7ff8491a60eb 662->666 667 7ff8491a60db-7ff8491a60e3 662->667 663->664 664->652 664->653 669 7ff8491a5bb5-7ff8491a5bd3 665->669 670 7ff8491a5b8a-7ff8491a5baf 665->670 666->648 666->662 667->666 677 7ff8491a5bd9-7ff8491a5bdb 669->677 678 7ff8491a5d9a-7ff8491a5db3 669->678 670->631 670->669 674->660 680 7ff8491a6169-7ff8491a6179 674->680 675->660 679 7ff8491a6157-7ff8491a6158 675->679 677->616 677->631 683 7ff8491a5db9-7ff8491a5e00 678->683 684 7ff8491a5e8f-7ff8491a5ea8 678->684 679->674 687 7ff8491a6189-7ff8491a6191 680->687 688 7ff8491a617b-7ff8491a617f 680->688 699 7ff8491a5e02-7ff8491a5e15 683->699 700 7ff8491a5e1b-7ff8491a5e8a 683->700 684->631 691 7ff8491a5eae-7ff8491a5eb0 684->691 687->660 690 7ff8491a6197-7ff8491a61a7 687->690 688->660 689 7ff8491a6185-7ff8491a6186 688->689 689->687 696 7ff8491a61b7-7ff8491a61bf 690->696 697 7ff8491a61a9-7ff8491a61ad 690->697 691->631 693 7ff8491a5eb6-7ff8491a5ed3 691->693 693->631 703 7ff8491a5ed9-7ff8491a5edd 693->703 696->660 702 7ff8491a61c5-7ff8491a61d5 696->702 697->660 701 7ff8491a61b3-7ff8491a61b4 697->701 699->631 699->700 700->631 701->696 708 7ff8491a61e5-7ff8491a61f5 702->708 709 7ff8491a61d7-7ff8491a61db 702->709 703->631 706 7ff8491a5ee3-7ff8491a5f06 703->706 710 7ff8491a5f0d-7ff8491a6013 706->710 708->656 709->660 711 7ff8491a61e1-7ff8491a61e2 709->711 710->631 711->708
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: *&I
                                        • API String ID: 0-4181237346
                                        • Opcode ID: 38065f91226c57ad1dd128193f98670896fc267315acd3559d92d736e2330ed5
                                        • Instruction ID: b297ee8ce16ce8f060fb4445012b1811537122632911612750183f6a8bf6ce53
                                        • Opcode Fuzzy Hash: 38065f91226c57ad1dd128193f98670896fc267315acd3559d92d736e2330ed5
                                        • Instruction Fuzzy Hash: 9A323D70A18A598FDBA4EF18C8857B9B7E1FFA8350F1045A9D44ED3295DB38AD818F40
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a3ea080657ca5beb55bf34ece674243f506e0718d63b5e2b6a95f068875cd891
                                        • Instruction ID: 1661aaf3d3541519e7eeaa108d79660e7c91b3e837819369c02c6f4a2f413e14
                                        • Opcode Fuzzy Hash: a3ea080657ca5beb55bf34ece674243f506e0718d63b5e2b6a95f068875cd891
                                        • Instruction Fuzzy Hash: A8624030608A498FDBA8EB2CC458B7577E2FF99350F1445B9E44DC72A6DE39EC418B41
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6309f2768fdae4b08af34c25a68d1fbe8018f14f5073adc2ebd4d3adae01cb26
                                        • Instruction ID: b15c8ebcec3ed2ece811f821f60f958459e7367334c39d771f1b3e86f01d59d6
                                        • Opcode Fuzzy Hash: 6309f2768fdae4b08af34c25a68d1fbe8018f14f5073adc2ebd4d3adae01cb26
                                        • Instruction Fuzzy Hash: 58228130A1CA498FEB68EB2884557B977E2FF98350F5441BDD44ED36D2DE38AC428B44

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH
                                        • API String ID: 0-4204409433
                                        • Opcode ID: c6a9b0e1febbe08603a0310e4d05ef84b26f093ec338fd333098e299d1b37eef
                                        • Instruction ID: c9ad8a0cb53a237ed6923fccee2473c0727a28034e95359ab0f8b1499140c646
                                        • Opcode Fuzzy Hash: c6a9b0e1febbe08603a0310e4d05ef84b26f093ec338fd333098e299d1b37eef
                                        • Instruction Fuzzy Hash: 1961C571A1DE8A8FE6A9FB28945567567D2FF997E0B4400B9D04EC32D6CE2DBC028740

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X!)I$`")I$a%_H
                                        • API String ID: 0-2618395969
                                        • Opcode ID: b923755593ebd2cc6645a2c00ad186949a2dc2b7640ad55d0d3c8ed11eef2063
                                        • Instruction ID: 41ce7b025eaa35de2c084b7853b01e418df975f2c879e6c79fe7cc7ed4a6bf3a
                                        • Opcode Fuzzy Hash: b923755593ebd2cc6645a2c00ad186949a2dc2b7640ad55d0d3c8ed11eef2063
                                        • Instruction Fuzzy Hash: 8551E532E2CE8A5FE3A9EA2894516B573D1FFD87A0F54047EC04EC3296DE2DAD064740

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 386 7ff8491acace-7ff8491acad3 387 7ff8491acb15-7ff8491acb38 386->387 388 7ff8491acad5-7ff8491acafe 386->388 397 7ff8491acb3f-7ff8491acb46 387->397 392 7ff8491acb00-7ff8491acb13 388->392 393 7ff8491acb47-7ff8491acb8c 388->393 392->387 401 7ff8491acbcb-7ff8491acbcf 393->401 402 7ff8491acb8e-7ff8491acb92 393->402 404 7ff8491acc05-7ff8491acc0b 401->404 405 7ff8491acbd1-7ff8491acc00 401->405 403 7ff8491acb94-7ff8491acbc6 402->403 402->404 403->401 405->404
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CI$CI
                                        • API String ID: 0-4134897263
                                        • Opcode ID: ae821c6734400aa61ce5f9ff757019b40c3dbd010e47390c38b43993f1e82c9f
                                        • Instruction ID: 190f7dc9eb9664cc06f58c0b61d377131c6697d7c61867bab4483c6a3bb3c480
                                        • Opcode Fuzzy Hash: ae821c6734400aa61ce5f9ff757019b40c3dbd010e47390c38b43993f1e82c9f
                                        • Instruction Fuzzy Hash: BB411432D1DBCA4FD379DF2898552A57BE0EF957A0B0881BEC049C7193DE2D6C898781

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 718 7ff8491a2c10-7ff8491a2c2c 720 7ff8491a2c34-7ff8491a2c48 718->720 721 7ff8491a2c2e-7ff8491a2c32 718->721 722 7ff8491a2c4b-7ff8491a2caa 720->722 721->720 721->722 729 7ff8491a2cf4-7ff8491a2d5e 722->729 730 7ff8491a2cac-7ff8491a2cf3 722->730 740 7ff8491a2d60-7ff8491a2d62 729->740 741 7ff8491a2dcf-7ff8491a2ddc 729->741 730->729 742 7ff8491a2d64 740->742 743 7ff8491a2dde-7ff8491a2de0 740->743 741->743 744 7ff8491a2e4d-7ff8491a2e56 741->744 745 7ff8491a2d66-7ff8491a2d6e 742->745 746 7ff8491a2dab 742->746 747 7ff8491a2de2 743->747 748 7ff8491a2e5c-7ff8491a2e64 743->748 750 7ff8491a2e58-7ff8491a2e59 744->750 754 7ff8491a2d70 745->754 755 7ff8491a2dea-7ff8491a2dec 745->755 751 7ff8491a2e2c-7ff8491a2e34 746->751 752 7ff8491a2dac 746->752 756 7ff8491a2de4 747->756 757 7ff8491a2e29 747->757 753 7ff8491a2e65-7ff8491a2e67 748->753 750->748 766 7ff8491a2e35-7ff8491a2e4c 751->766 758 7ff8491a2df3-7ff8491a2e0a 752->758 759 7ff8491a2dad-7ff8491a2db6 752->759 760 7ff8491a2e68-7ff8491a2e70 753->760 763 7ff8491a2d72-7ff8491a2d9a 754->763 764 7ff8491a2db7-7ff8491a2dce 754->764 755->760 767 7ff8491a2dee 755->767 765 7ff8491a2de7 756->765 761 7ff8491a2eaa-7ff8491a2ec2 757->761 762 7ff8491a2e2a 757->762 777 7ff8491a2e0b-7ff8491a2e18 758->777 759->764 769 7ff8491a2e71-7ff8491a2e79 760->769 762->769 770 7ff8491a2e2b 762->770 763->777 780 7ff8491a2d9c-7ff8491a2d9e 763->780 764->741 765->750 771 7ff8491a2de9 765->771 766->744 767->766 772 7ff8491a2df0 767->772 779 7ff8491a2e81-7ff8491a2e87 769->779 770->751 771->755 772->758 781 7ff8491a2e89-7ff8491a2e92 777->781 782 7ff8491a2e1a-7ff8491a2e1c 777->782 779->781 780->782 783 7ff8491a2da0 780->783 784 7ff8491a2e98-7ff8491a2e9d 782->784 785 7ff8491a2e1e 782->785 783->765 786 7ff8491a2da2-7ff8491a2daa 783->786 789 7ff8491a2ee7-7ff8491a2f31 784->789 790 7ff8491a2e9f-7ff8491a2ea3 784->790 785->753 788 7ff8491a2e20-7ff8491a2e25 785->788 786->746 787 7ff8491a2e26-7ff8491a2e28 786->787 787->757 792 7ff8491a2ea4-7ff8491a2ea8 787->792 788->787 795 7ff8491a2fe0-7ff8491a3038 789->795 796 7ff8491a2f37-7ff8491a2f3a 789->796 790->792 792->761 808 7ff8491a303f-7ff8491a3055 795->808 796->795 797 7ff8491a2f40-7ff8491a2f41 796->797 799 7ff8491a2f42-7ff8491a2f4b 797->799 804 7ff8491a2f4d-7ff8491a2fa2 799->804 817 7ff8491a2fa4-7ff8491a2fcf 804->817 818 7ff8491a2fd6-7ff8491a2fdf 804->818 812 7ff8491a3057-7ff8491a3069 808->812 813 7ff8491a306b-7ff8491a3071 808->813 812->813 817->818
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: b511630e707a7693f847672f1ec9bbf150090dd7c9a9a7b95f28c0ea5f6a3703
                                        • Instruction ID: aa8c5f12f1d4d630bd186ff43eee0d6aa5c6d29a92917c3abd924cd1e594814e
                                        • Opcode Fuzzy Hash: b511630e707a7693f847672f1ec9bbf150090dd7c9a9a7b95f28c0ea5f6a3703
                                        • Instruction Fuzzy Hash: 94E12531F1DACA4FE7B5AE2888556B577D0FF943A0F0405BAD049C7297DE2CAC468B41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 820 7ff8491a3f19-7ff8491a3f1b 821 7ff8491a3f65-7ff8491a3fa6 820->821 822 7ff8491a3f1d-7ff8491a3f47 820->822 827 7ff8491a3fa8-7ff8491a3fa9 821->827 828 7ff8491a3fab-7ff8491a3fbd 821->828 822->821 827->828 832 7ff8491a400d-7ff8491a400e 828->832 833 7ff8491a3fbf-7ff8491a3fc7 828->833 837 7ff8491a4015-7ff8491a401d 832->837 834 7ff8491a4002-7ff8491a4008 833->834 835 7ff8491a3fc9-7ff8491a3fcc 833->835 836 7ff8491a4513-7ff8491a4525 834->836 835->834 838 7ff8491a3fce-7ff8491a3ffd 835->838 842 7ff8491a4526-7ff8491a4539 836->842 840 7ff8491a4038-7ff8491a403e 837->840 841 7ff8491a401f-7ff8491a4034 837->841 838->842 843 7ff8491a4044-7ff8491a4058 840->843 844 7ff8491a4379-7ff8491a4380 840->844 841->840 843->844 846 7ff8491a4382-7ff8491a4385 844->846 847 7ff8491a4387-7ff8491a4393 844->847 848 7ff8491a4395-7ff8491a4398 846->848 847->848 850 7ff8491a43a5-7ff8491a43ad 848->850 851 7ff8491a439a-7ff8491a43a0 848->851 853 7ff8491a43b3-7ff8491a43d0 850->853 854 7ff8491a450d 850->854 851->842 856 7ff8491a43d2-7ff8491a43e2 call 7ff8491a3020 853->856 857 7ff8491a43f7-7ff8491a4402 853->857 854->836 856->857 869 7ff8491a43e4-7ff8491a43f2 856->869 859 7ff8491a44c2-7ff8491a44c5 857->859 860 7ff8491a4408-7ff8491a440d 857->860 859->854 861 7ff8491a44c7-7ff8491a44cd 859->861 863 7ff8491a4414-7ff8491a4417 860->863 864 7ff8491a440f 860->864 867 7ff8491a44d6 861->867 868 7ff8491a44cf-7ff8491a44d4 861->868 865 7ff8491a4427-7ff8491a442a 863->865 866 7ff8491a4419-7ff8491a4423 863->866 864->863 870 7ff8491a447a-7ff8491a447d 865->870 871 7ff8491a442c-7ff8491a442f 865->871 866->865 872 7ff8491a44db-7ff8491a450b 867->872 868->872 869->857 876 7ff8491a448a-7ff8491a448f 870->876 877 7ff8491a447f-7ff8491a4488 870->877 873 7ff8491a4451-7ff8491a4454 871->873 874 7ff8491a4431-7ff8491a444b 871->874 872->842 878 7ff8491a4464-7ff8491a446a 873->878 879 7ff8491a4456-7ff8491a445c 873->879 874->873 886 7ff8491a453a-7ff8491a4561 874->886 881 7ff8491a4493-7ff8491a44c0 876->881 877->881 878->870 885 7ff8491a446c-7ff8491a4476 878->885 879->878 884 7ff8491a445e-7ff8491a4461 879->884 881->842 884->878 885->870 891 7ff8491a4563-7ff8491a4576 886->891 892 7ff8491a4578-7ff8491a459c 886->892 895 7ff8491a459e-7ff8491a4614 891->895 892->895 900 7ff8491a4616-7ff8491a4618 895->900 901 7ff8491a4619-7ff8491a4653 895->901 900->901 904 7ff8491a4655-7ff8491a465d 901->904 905 7ff8491a4664-7ff8491a4676 901->905 904->905 907 7ff8491a465f 904->907 908 7ff8491a4683-7ff8491a468c 905->908 909 7ff8491a4678-7ff8491a4682 905->909 910 7ff8491a46fc-7ff8491a4701 907->910 908->910
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: 3a996dcfe3d6328d0eeac9602f88d0ad9d18346a776163fbc8660a2c5ad1475f
                                        • Instruction ID: 446f301d0f40c8631f11bd36b6bda4ef2d38121efbd607814aac45470f4af444
                                        • Opcode Fuzzy Hash: 3a996dcfe3d6328d0eeac9602f88d0ad9d18346a776163fbc8660a2c5ad1475f
                                        • Instruction Fuzzy Hash: A3E13931A0DB8A4FE7A5AF28985537977D1EF96360F0401BAD48EC72D3DE1CAC468742

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 912 7ff8491aa3d9-7ff8491aa3fa 915 7ff8491aa402-7ff8491aa41d 912->915 916 7ff8491aa3fc-7ff8491aa401 912->916 918 7ff8491aa467-7ff8491aa4d3 915->918 919 7ff8491aa41f-7ff8491aa464 915->919 922 7ff8491aa4db-7ff8491aa4dd 918->922 919->918 924 7ff8491aa4e9-7ff8491aa4f5 922->924 925 7ff8491aa4df-7ff8491aa4e4 922->925 930 7ff8491aa4fb-7ff8491aa50d 924->930 931 7ff8491aa59e-7ff8491aa5ba 924->931 926 7ff8491aa778-7ff8491aa78b 925->926 930->931 936 7ff8491aa513-7ff8491aa532 930->936 934 7ff8491aa5c0-7ff8491aa5e4 931->934 935 7ff8491aa6b1-7ff8491aa6b5 931->935 941 7ff8491aa6a5-7ff8491aa6ab 934->941 942 7ff8491aa5ea-7ff8491aa617 934->942 937 7ff8491aa6c1-7ff8491aa6e6 935->937 938 7ff8491aa6b7-7ff8491aa6bc 935->938 947 7ff8491aa564-7ff8491aa575 936->947 948 7ff8491aa534-7ff8491aa538 936->948 945 7ff8491aa76b-7ff8491aa775 937->945 946 7ff8491aa6ec-7ff8491aa6f1 937->946 938->926 941->934 941->935 956 7ff8491aa697-7ff8491aa69f 942->956 957 7ff8491aa619-7ff8491aa622 942->957 945->926 946->926 954 7ff8491aa577-7ff8491aa588 947->954 955 7ff8491aa599 947->955 948->931 949 7ff8491aa53a-7ff8491aa556 948->949 949->955 958 7ff8491aa558-7ff8491aa563 949->958 966 7ff8491aa58f-7ff8491aa594 954->966 955->931 956->941 957->941 959 7ff8491aa628-7ff8491aa62c 957->959 958->947 958->966 961 7ff8491aa632-7ff8491aa64f 959->961 962 7ff8491aa6f6-7ff8491aa764 959->962 961->955 968 7ff8491aa655-7ff8491aa667 961->968 962->945 966->926 968->941 971 7ff8491aa669-7ff8491aa680 968->971 971->955 975 7ff8491aa686-7ff8491aa692 971->975 975->956
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: a5a0799fdf966b0de03ca0fbfdc4214739ea6eea38308f67aa20b8c91749a4fa
                                        • Instruction ID: 1ace4d561a9d7bfe8146c6925216dabec060fb79ecf60ad5a3622735c2652da2
                                        • Opcode Fuzzy Hash: a5a0799fdf966b0de03ca0fbfdc4214739ea6eea38308f67aa20b8c91749a4fa
                                        • Instruction Fuzzy Hash: F6D18331A1CA498FDBA8EF28C449BB977E2FF59350F14017AD04DC7292DE39AC458B41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 977 7ff848f33525-7ff848f3352f 978 7ff848f33571-7ff848f335d8 977->978 979 7ff848f33531-7ff848f33562 977->979 985 7ff848f335da-7ff848f335df 978->985 986 7ff848f335e2-7ff848f33614 DeleteFileW 978->986 979->978 985->986 987 7ff848f3361c-7ff848f3364a 986->987 988 7ff848f33616 986->988 988->987
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2556496286.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff848f30000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: b742b37146af7085c845524516b51c341dee0820e43295434aedba5ebe6be307
                                        • Instruction ID: 79350d9df3012dd2aa46b89b75ea8d646a242ae2e76b1a5572531b40cc4afdd6
                                        • Opcode Fuzzy Hash: b742b37146af7085c845524516b51c341dee0820e43295434aedba5ebe6be307
                                        • Instruction Fuzzy Hash: 6241043180DA8C4FDB49EB6898496E97BF0FF66310F0442AFC049C7692CB286849C751

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 990 7ff848f33569-7ff848f335d8 995 7ff848f335da-7ff848f335df 990->995 996 7ff848f335e2-7ff848f33614 DeleteFileW 990->996 995->996 997 7ff848f3361c-7ff848f3364a 996->997 998 7ff848f33616 996->998 998->997
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2556496286.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff848f30000_Client.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: bfec3d625e78c3da83f510080a6d6a75eac4ef45dae89aad96faee4dbade8b26
                                        • Instruction ID: 7f4b1f95c06e1596796736c6721584225933cf985fac8b31601228cd0322d648
                                        • Opcode Fuzzy Hash: bfec3d625e78c3da83f510080a6d6a75eac4ef45dae89aad96faee4dbade8b26
                                        • Instruction Fuzzy Hash: 3C31F03180DB5C8FDB59DB6888496E9BBF0FF65310F04426BC049D3692CB78A845CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1000 7ff8491a3451-7ff8491a345b 1001 7ff8491a3462-7ff8491a3473 1000->1001 1002 7ff8491a345d 1000->1002 1004 7ff8491a3475 1001->1004 1005 7ff8491a347a-7ff8491a34a7 1001->1005 1002->1001 1003 7ff8491a345f 1002->1003 1003->1001 1004->1005 1006 7ff8491a3477 1004->1006 1008 7ff8491a34d5-7ff8491a34e2 1005->1008 1009 7ff8491a34a9-7ff8491a34b3 1005->1009 1006->1005 1010 7ff8491a34b5-7ff8491a34cc 1009->1010 1011 7ff8491a34ee-7ff8491a355b call 7ff8491a3490 1009->1011 1015 7ff8491a34e3-7ff8491a34ed 1010->1015 1016 7ff8491a34ce-7ff8491a34d3 1010->1016 1020 7ff8491a355d-7ff8491a3577 1011->1020 1021 7ff8491a359f-7ff8491a35b0 1011->1021 1016->1008 1016->1009 1026 7ff8491a3590-7ff8491a359e 1020->1026 1027 7ff8491a3579-7ff8491a3586 1020->1027 1022 7ff8491a35b2 1021->1022 1023 7ff8491a35b7-7ff8491a35e0 call 7ff8491a3490 1021->1023 1022->1023 1032 7ff8491a3622-7ff8491a3629 1023->1032 1033 7ff8491a35e2-7ff8491a35fc 1023->1033 1027->1026 1031 7ff8491a3588-7ff8491a358e 1027->1031 1031->1026 1035 7ff8491a3630-7ff8491a3632 1032->1035 1039 7ff8491a3615-7ff8491a361d 1033->1039 1040 7ff8491a35fe-7ff8491a360b 1033->1040 1037 7ff8491a3634-7ff8491a3636 1035->1037 1038 7ff8491a3638-7ff8491a3659 1035->1038 1042 7ff8491a3663-7ff8491a3666 1037->1042 1045 7ff8491a3660-7ff8491a3661 1038->1045 1041 7ff8491a36a7-7ff8491a36be call 7ff8491a36bf 1039->1041 1040->1039 1048 7ff8491a360d-7ff8491a3613 1040->1048 1046 7ff8491a36a3-7ff8491a36a4 1042->1046 1047 7ff8491a3668-7ff8491a369c 1042->1047 1045->1042 1046->1041 1047->1046 1048->1039
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %_L
                                        • API String ID: 0-1469106525
                                        • Opcode ID: f64cc20fc6107c59cb66ae1d2a6a31258ac07cdc509650468564d70ab9110ddb
                                        • Instruction ID: e087d4579ee0ff50866f9ad33c48ea47444a917a5ab4290b0c007ca3df0f49d5
                                        • Opcode Fuzzy Hash: f64cc20fc6107c59cb66ae1d2a6a31258ac07cdc509650468564d70ab9110ddb
                                        • Instruction Fuzzy Hash: F391E731A0DB894FDBA6EF2898546B5B7E1EF55360F0405BAD04DC3292DE2DEC46CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: 0f213612ac3de815fd9430a277a30fd5f7666cfac3c645b195e8ee83c645926b
                                        • Instruction ID: 115dc6fcf252307066101fac26ca0e1b8fd2f6086724d9a29303f43b6f888693
                                        • Opcode Fuzzy Hash: 0f213612ac3de815fd9430a277a30fd5f7666cfac3c645b195e8ee83c645926b
                                        • Instruction Fuzzy Hash: FF410621A1EBC54FE7A6EB3C98686717FD0EFA6290F0804FED089C71A3D91D9C858701
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #&_^
                                        • API String ID: 0-519297270
                                        • Opcode ID: 200e970312005fcf518977cce66d7c75a7d141aab53f3730baa680644546c32a
                                        • Instruction ID: 82123a636f80e561dbb2257518de3d0d6a04941473d806df436a2b5c069783a4
                                        • Opcode Fuzzy Hash: 200e970312005fcf518977cce66d7c75a7d141aab53f3730baa680644546c32a
                                        • Instruction Fuzzy Hash: B7311937B1A6259ED310BE7DF4814E97360EF8577AB188677C18CCE093DB2C648586E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #&_^
                                        • API String ID: 0-519297270
                                        • Opcode ID: 22dafbf509e7a2e571f3d6eb15d3004b4732fed38fad322d1b1bdf1988db9f53
                                        • Instruction ID: f6ac40f8cef86617793e76f023063ae498744575d84dc57d79961d7061730ded
                                        • Opcode Fuzzy Hash: 22dafbf509e7a2e571f3d6eb15d3004b4732fed38fad322d1b1bdf1988db9f53
                                        • Instruction Fuzzy Hash: EB312A37B1E6299ED310BE7DF4814E973A0EF8577AB084677C1C8CE083DA1C648586E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #&_^
                                        • API String ID: 0-519297270
                                        • Opcode ID: 1f89d46a2c3f5cdfb6ea6adac76dd2cf3c2aad182014ea3a569d81d3df566f2d
                                        • Instruction ID: 26880b046c88f92125a92d535d083f8246fe3a254b9eadb80c183e8ffc4355cf
                                        • Opcode Fuzzy Hash: 1f89d46a2c3f5cdfb6ea6adac76dd2cf3c2aad182014ea3a569d81d3df566f2d
                                        • Instruction Fuzzy Hash: C1313D37B1D6199EC310BE7DF4814E97390EF85779B184777C188CE083DA1C648586E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `")I
                                        • API String ID: 0-1793973326
                                        • Opcode ID: 3551a8ccfe2ecf46f06ca00c83f444b5f95f55febe99f3358aa64e675f4714f8
                                        • Instruction ID: 210bd8389c400de6566c5b917653409b9912ef7276f4d3a721e8565e079d335b
                                        • Opcode Fuzzy Hash: 3551a8ccfe2ecf46f06ca00c83f444b5f95f55febe99f3358aa64e675f4714f8
                                        • Instruction Fuzzy Hash: C021F562E2DECA1FE39AAB3844566B567E1FFA9350F4444BAD04EC3283DD1CE9054351
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9ed79e1d0f64948779f75a7e6943f2541f8ffb05b9106e4efb13e336d3cafbbd
                                        • Instruction ID: d4c480cb00e29e0b51f35acf7a24e1c1f9d314c1c9db3d9a4794c9ca8d91504b
                                        • Opcode Fuzzy Hash: 9ed79e1d0f64948779f75a7e6943f2541f8ffb05b9106e4efb13e336d3cafbbd
                                        • Instruction Fuzzy Hash: 83D17F3061CA498FDB98FF6CD458A7977E1FF59350B1101B9E44EC72A6DE28EC828B41
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e1a5d197882fc00244eb837aef49c43630a815eae78038cf5c11caff774fc9fd
                                        • Instruction ID: cb516d9bf2d1341c5a45e17fe6439f1bdb75ad1a582c5fe8e24499f1a42b9c44
                                        • Opcode Fuzzy Hash: e1a5d197882fc00244eb837aef49c43630a815eae78038cf5c11caff774fc9fd
                                        • Instruction Fuzzy Hash: FCE1F531A0DA894FE765AB2884557B877D1FF653A0F1401BDD48EC76D3DE2CAC868B01
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 121026580900e06750e3b696038214758a5af93176baedf85b485f104b12ae3b
                                        • Instruction ID: d329db85edf56e3a73d8c37ab49edae34b0b30558bdcd72b342d553ae191f333
                                        • Opcode Fuzzy Hash: 121026580900e06750e3b696038214758a5af93176baedf85b485f104b12ae3b
                                        • Instruction Fuzzy Hash: 14C1D530A0CA894FE769AB2884557B977D1FF65390F5441BDD48EC76D3DE2CAC868B00
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3a4d8ef4697b6810f931da3fdf42cbcae98d2221acdd5f4aa4175283eacdfdf1
                                        • Instruction ID: 3cd015a756e130f9b32a8dd3e851572e7bbbdbc9c3bbb7fa75d8e90b76bfcbf0
                                        • Opcode Fuzzy Hash: 3a4d8ef4697b6810f931da3fdf42cbcae98d2221acdd5f4aa4175283eacdfdf1
                                        • Instruction Fuzzy Hash: 6BA16F31A1CA498FDB98EF2894516B973E1FF98365F50417AE45ED3282DF39AC028B44
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ef057590f4ab1db16470e69491b4a24c095672c8cc7f8ba1c801a23c81593250
                                        • Instruction ID: 7bc2477f5cb9eed683245cb974a724a5c7f3e406db6d906147acc7a7e272ffa5
                                        • Opcode Fuzzy Hash: ef057590f4ab1db16470e69491b4a24c095672c8cc7f8ba1c801a23c81593250
                                        • Instruction Fuzzy Hash: DEA16130A0CA494FEB69EB2884557B977D2FF58390F5440B9D48EC36D3DE2DAC858B44
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d01d9e5b8dcfa7778220715a33ce27321b226b58954a2f09656b849fd5806b0
                                        • Instruction ID: ed34c675858a3a2c2d52d27637c340058e78ffa7b2ad16a18248445d00636349
                                        • Opcode Fuzzy Hash: 8d01d9e5b8dcfa7778220715a33ce27321b226b58954a2f09656b849fd5806b0
                                        • Instruction Fuzzy Hash: 0B915F30A0CA494FEBA8FB1884957B873D2FF98390F5040B9D44ED36D3DE29AC858B44
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a98da1651b1c4eeabc1d829cffff45b125d8b70d23f8b23ff9bdb8178af8f59
                                        • Instruction ID: 1316773b56a26edb80351bcd00f1d85bb84a35d32c76cfd63ff672500c5b251e
                                        • Opcode Fuzzy Hash: 9a98da1651b1c4eeabc1d829cffff45b125d8b70d23f8b23ff9bdb8178af8f59
                                        • Instruction Fuzzy Hash: D0914130A0CA494FEB68EB2984957B873D2FF98394F544079D48EC36D7DE2DAC858B44
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c4665a895935cf55ebfdbabc5ce0cdbd2b9f948deae33c523de130305a17b00
                                        • Instruction ID: df00c716d7d45a92f81206837121fc4a38a20f01df4c226f5b4fb0ed6d6a80d3
                                        • Opcode Fuzzy Hash: 3c4665a895935cf55ebfdbabc5ce0cdbd2b9f948deae33c523de130305a17b00
                                        • Instruction Fuzzy Hash: 38915130A0CA494FEB68EB6984557B877D2FF98390F5040B9D48EC36C7DE29AC858B44
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b01a5c1f9b87e14270c3fbd17d1277e7bfc10eb215977fe4587a670f868c75d8
                                        • Instruction ID: 54b6624441958d90cffc55dfa0897c66d73ca93ff650c425e3e1622f4074ce14
                                        • Opcode Fuzzy Hash: b01a5c1f9b87e14270c3fbd17d1277e7bfc10eb215977fe4587a670f868c75d8
                                        • Instruction Fuzzy Hash: 0C711731B1DA494FE798FB2CE8596B577D1EF9A360B0400BAD04EC7293DD29AC428781
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f7854c28487398981fe5db05d7848089be49496bcbfb26e2513ab4d13938fa7b
                                        • Instruction ID: b7d0a212b0c277fa70a178e705bd638fc0bb87ba49f8e5f6e0cb9343fa351d8d
                                        • Opcode Fuzzy Hash: f7854c28487398981fe5db05d7848089be49496bcbfb26e2513ab4d13938fa7b
                                        • Instruction Fuzzy Hash: 2761BF30A4DBC94FEBA1EF289858AB577E1EF49354F0904BAD45DC71A2DA2CAC45CB40
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c3bada29e038aa7bad8e699d52d1a92b17c3048dfdc24ac2063b4772a6ef1fab
                                        • Instruction ID: c05100575b7e5fe3f260650b5245309ad2892c962ad0682e95cff1a6767d7627
                                        • Opcode Fuzzy Hash: c3bada29e038aa7bad8e699d52d1a92b17c3048dfdc24ac2063b4772a6ef1fab
                                        • Instruction Fuzzy Hash: EA518971F1DE8A9FE7A8AB3894516B56392FF94784F5004BDC40EC3297DE2DAC528B40
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 690d0f01ac2d05da8f0732da6c4479b5bc28d55d85f333e748463396227b8139
                                        • Instruction ID: c89c5badea04e6bfea437b912d36c9d2294378362c07388c23fed08861b03df1
                                        • Opcode Fuzzy Hash: 690d0f01ac2d05da8f0732da6c4479b5bc28d55d85f333e748463396227b8139
                                        • Instruction Fuzzy Hash: F451043051C7894FEB65BB2898457767BD1EF463B4F10067ED48DC3196EE2DAC428781
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0224dc6704d44d275d62debe63b701012d0e4d551da3635a00f29182f9cb7b9
                                        • Instruction ID: c737842deaf53a7a32f28c1ecf9760705d5ec6773112968594ddd291906967e7
                                        • Opcode Fuzzy Hash: a0224dc6704d44d275d62debe63b701012d0e4d551da3635a00f29182f9cb7b9
                                        • Instruction Fuzzy Hash: 9041E120B1EA425FE754BB7C58967F567C1EF98760F6401BAD00CC32C7CE5CA8464362
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9868d5829b869be51da94a18e36e594dfafb10e7c91ad903801546c6751d9f8a
                                        • Instruction ID: 3def4d38effc4d2515c7a775a78f6ff1eb1c329c4ca3634d0c4e1dcbd205a31b
                                        • Opcode Fuzzy Hash: 9868d5829b869be51da94a18e36e594dfafb10e7c91ad903801546c6751d9f8a
                                        • Instruction Fuzzy Hash: 43311371A2DB9A4FE765BB2988A16F677B0EF59350F4004BBD04AC31C7CE2C6C068751
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 964104cfcbb4c50815ab291b1335f988846c916390a15f5a3f924a4d79751d15
                                        • Instruction ID: ca3b1602147d4b01ce1f394e259635f29db0d3d74fa04f76a58c0370b7cbf69f
                                        • Opcode Fuzzy Hash: 964104cfcbb4c50815ab291b1335f988846c916390a15f5a3f924a4d79751d15
                                        • Instruction Fuzzy Hash: 5E314631E1DAC64FE7AAAB3898556B177E1EF96760B0444BAC009C7287DD2DAC46C740
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9c3959e61aa6622d6911662863c56bdc2793ef9f0fa9e9957c81098fc273308
                                        • Instruction ID: a8d34f8294c426a2b14b25a8536c36355529f61e5cc83f85f611ea89c38a16c1
                                        • Opcode Fuzzy Hash: b9c3959e61aa6622d6911662863c56bdc2793ef9f0fa9e9957c81098fc273308
                                        • Instruction Fuzzy Hash: 3D31C53161CA095FEB98FF28984977633C1EF993B0B000679E84DC3296EE29AC024780
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a7a3d3b27a36b1421509a906a1a651f59d832e22a2634218312533e733484636
                                        • Instruction ID: 54dcae6d5ef031f8ec7fb0de949a2e1e3d1648829ed2bf888680a422b92c2692
                                        • Opcode Fuzzy Hash: a7a3d3b27a36b1421509a906a1a651f59d832e22a2634218312533e733484636
                                        • Instruction Fuzzy Hash: 8F31E03890DFC64FE3B9AA28985427176D0EF653A0F1800BAD48EC7192DD5CEC81CB81
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01d8e86f1ee699348e9b5b105a381c4a734663fad6ddf543edab0a5b6a4cdd5e
                                        • Instruction ID: 02ee78872d4f78db334ed2ecfde4047ec63fee706940b8320aa25d342d4f8d2f
                                        • Opcode Fuzzy Hash: 01d8e86f1ee699348e9b5b105a381c4a734663fad6ddf543edab0a5b6a4cdd5e
                                        • Instruction Fuzzy Hash: 71215B32F1EF4D0FF2A8A96C68456B137D1EFE46B075501BAD00DC3287DD1CAC424680
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a86ded2d7f9f9486436386a7495664c89fdfbcdf2e3466c88129ee93c35f3f7
                                        • Instruction ID: a5220b948b5f875bd6d804c6ee6d1ec9b685bdbbd37db5be843dd33a3ce11e60
                                        • Opcode Fuzzy Hash: 8a86ded2d7f9f9486436386a7495664c89fdfbcdf2e3466c88129ee93c35f3f7
                                        • Instruction Fuzzy Hash: 0A217A31A18A4D8FDB98EF28C4456B977E1FF99325F10417AE40ED3282DB35E852CB40
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2cb717bb101a9ab0bbb35a099876a5444eb1e63caaf316cdcb19e409d6b584e7
                                        • Instruction ID: 67a63c98ed7b81ec7fe1338878f1c4422457069421cec10f9c7d5fadc8bda84b
                                        • Opcode Fuzzy Hash: 2cb717bb101a9ab0bbb35a099876a5444eb1e63caaf316cdcb19e409d6b584e7
                                        • Instruction Fuzzy Hash: 23113632F1EE4E1FF2A8A92CA8466B137D1EFE86B075501B9D00DC3286ED1CAC424690
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c6e854a7e41222b2545d0c7cc2205b189aeb6d67004c17be77cbc35690bb9f99
                                        • Instruction ID: a9d3c9de20ddd79589e49051e25517fc7c808f62e9dfece0b02a4d6eee57ff41
                                        • Opcode Fuzzy Hash: c6e854a7e41222b2545d0c7cc2205b189aeb6d67004c17be77cbc35690bb9f99
                                        • Instruction Fuzzy Hash: 19217C3061CA498FDB98EF1CD4556B9B7E1FF98321F10117EE48AD32A1CB35E8428B81
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a1d51d815191919874bc16415d8a51683a2c6cf317b46b95216809f0037fb8e7
                                        • Instruction ID: 3cd187b7df24498400f4bc08e5a1882d5be1abd8ddc68323ff489e2af1f4b1d0
                                        • Opcode Fuzzy Hash: a1d51d815191919874bc16415d8a51683a2c6cf317b46b95216809f0037fb8e7
                                        • Instruction Fuzzy Hash: AE21C631B39A5A4EE758BB19D4526FA72E1FB58740F90447AD04FC32C7CE6CB8068781
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 780c8c4583fd9940caad1ede06a9a1898ab258868ca1d51b9f08ca8859943b38
                                        • Instruction ID: 96ad55891345f2ae7236ab7b9b89e87b5d49d31142e49aca100e99b58c8dfe7f
                                        • Opcode Fuzzy Hash: 780c8c4583fd9940caad1ede06a9a1898ab258868ca1d51b9f08ca8859943b38
                                        • Instruction Fuzzy Hash: AB11A13158EBC65FC346EBB48810AD17BE1EF9B26030941FAD089CB5A3C96C9887C761
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be0cf0630a8f7db4aeecc630f77a1b5b41364fcd8edf279c6607527ce0980cf4
                                        • Instruction ID: 99fe2326b856724d965a1010d8ef0f74751bda88c937eb3f097cc7dbf2026753
                                        • Opcode Fuzzy Hash: be0cf0630a8f7db4aeecc630f77a1b5b41364fcd8edf279c6607527ce0980cf4
                                        • Instruction Fuzzy Hash: A611E02192DEDA1EE725A76884163F9BBE1FF96350F4801B6E01CC71C3CF9CA8048791
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 46a073dc20d32ec079d175f2ec304c6f8e338748b37a1f145fc08e8e22e72e2a
                                        • Instruction ID: ea4da275d07b716dfe4cf7d9991621c73e8d18056446480323aa094ab210edc4
                                        • Opcode Fuzzy Hash: 46a073dc20d32ec079d175f2ec304c6f8e338748b37a1f145fc08e8e22e72e2a
                                        • Instruction Fuzzy Hash: 0801283190DB854FE752F72884452B97FD1DF852A0F080A7ED08CC60E2CE6C4AC68387
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c6f50ef5583df024a8a699f0d7f0714b5ae2b5762f05f43d7bf90e2e73f3730
                                        • Instruction ID: 0e58e850d071c041e63abbe8e7ffb8af42c46f1fd6c844168e6f22e633f6b68f
                                        • Opcode Fuzzy Hash: 9c6f50ef5583df024a8a699f0d7f0714b5ae2b5762f05f43d7bf90e2e73f3730
                                        • Instruction Fuzzy Hash: AEF0C23190DBC86FEB51AB78A4496EA7FF0EF46310F4540E7D848C6193CA286A448751
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15732fa373726e0b409f5150805c96c2a3afe194d7cd747f751b555beb2e9ce3
                                        • Instruction ID: 9194586a674ecaccc4644b47623761bb3886e25f8c25040bedec124b64f6f147
                                        • Opcode Fuzzy Hash: 15732fa373726e0b409f5150805c96c2a3afe194d7cd747f751b555beb2e9ce3
                                        • Instruction Fuzzy Hash: 7C019E7290C7C44FC305DF24980509ABBE0FF98318F0506AFE48CE7252E738DA048B46
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 68e8b33ac0916296b0b1e243b698f21a6bfe545b4ae653fc3de0ff188f298f90
                                        • Instruction ID: 096ba66ba7fe5582b15b88ce58e46f505999e657f6192aef6e26176ef93818ef
                                        • Opcode Fuzzy Hash: 68e8b33ac0916296b0b1e243b698f21a6bfe545b4ae653fc3de0ff188f298f90
                                        • Instruction Fuzzy Hash: FD01D621E1DEC64FE3A9BE3804515BA63E2FFD8690B444578C01EC3286CE1CBD064B00
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 661d4936121daadac5bd82c783e91257b57969dda92c66c892dcfa0e7e256f8f
                                        • Instruction ID: 589aa5eed8a789aafdc40865d14c50e856b1ca542387bfb3c56eacf63fc62402
                                        • Opcode Fuzzy Hash: 661d4936121daadac5bd82c783e91257b57969dda92c66c892dcfa0e7e256f8f
                                        • Instruction Fuzzy Hash: 0CF0272674DA8E1FE254BD9EA8815F17380EB903B1B58053BCA19C3585D98DAC5646D0
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6d891e50198a1775eca7f256dc60b595658a2e831b3f318b200f606aeb6065c
                                        • Instruction ID: afade6051220a857c140917519fca8ac67a0c303f751d24dbb2552a94df3b4f2
                                        • Opcode Fuzzy Hash: a6d891e50198a1775eca7f256dc60b595658a2e831b3f318b200f606aeb6065c
                                        • Instruction Fuzzy Hash: 25F0E230A2CA8A0BE794BA3CA80027673C5EB45215F5408BAD88EC7292DF2CDC424685
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 941f5675cf9d1ef454ba200793267cfeefcfdd47a07dee31eb961beef55fdbbc
                                        • Instruction ID: 4f900576b4e559874844ccca99620f789fcbf771a39dcc36193c3baebdcccf7f
                                        • Opcode Fuzzy Hash: 941f5675cf9d1ef454ba200793267cfeefcfdd47a07dee31eb961beef55fdbbc
                                        • Instruction Fuzzy Hash: A5F0FF71E1D6C84FE755AB74881A0ED7FF0EF56210F4505E7D448C7092EA3859458300
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 70cf21d9e70ce76508cf83898484feef363597d488487a1893d6b1d777935134
                                        • Instruction ID: cf83029328f4ad40a8db66ae19be38369b9181fa82c86dbc3ac0179cdc805d59
                                        • Opcode Fuzzy Hash: 70cf21d9e70ce76508cf83898484feef363597d488487a1893d6b1d777935134
                                        • Instruction Fuzzy Hash: C3F0A07190D60D6FDB18FF59EC46AEB37A8FF85220F00013AF44D82192E6396863CB50
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 63aa23a1fa6cc2cccf89fae32ac6cfe61300b7a543a0e8d8f78fb944fe6f840e
                                        • Instruction ID: b3edaa4ee85b6341bd7da06291d6f53c6a84272208a0e25c77faae9fe5cad784
                                        • Opcode Fuzzy Hash: 63aa23a1fa6cc2cccf89fae32ac6cfe61300b7a543a0e8d8f78fb944fe6f840e
                                        • Instruction Fuzzy Hash: B8F0827290F2C54FC3429B7888559957F90AE1355030988FAC048CF1A2D15848098751
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 817952ee2949c7e6433a5911bbc7d752ad0a81915d740191ac18c33f324af9b5
                                        • Instruction ID: 368dcea47f75652f9bdadaaae0a44fcb5cc4408dfafc32f12603e442acae19e5
                                        • Opcode Fuzzy Hash: 817952ee2949c7e6433a5911bbc7d752ad0a81915d740191ac18c33f324af9b5
                                        • Instruction Fuzzy Hash: 6BD05E53B6C68E0EE590790878910B1A380EB952B5B5002B3C44992186CD2F99460641
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50bfb1e22a99aa11d7b1ec7850d2932b67863802919bd0c3bf2843e862db3bdc
                                        • Instruction ID: 441ab12104a39798504e4bee3ef62e5711c222dadbdcee72ffac76d45b075d92
                                        • Opcode Fuzzy Hash: 50bfb1e22a99aa11d7b1ec7850d2932b67863802919bd0c3bf2843e862db3bdc
                                        • Instruction Fuzzy Hash: CFD0233555454C57C7147B65B4054D7B758FF8D35CF00057FF91CC5041D62795354392
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000018.00000002.2560822111.00007FF8491A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_24_2_7ff8491a0000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH$HAH$HAH$HAH$r%_H
                                        • API String ID: 0-1547968964
                                        • Opcode ID: bd1a2cc51f303322ddd99de37bfaf6ec3495fdab60b201192d5a35134b0c7690
                                        • Instruction ID: c21c52a9c0edbea478a5fe07eee70e8dd9bc98445c7d9db1cfa985eb275f0e73
                                        • Opcode Fuzzy Hash: bd1a2cc51f303322ddd99de37bfaf6ec3495fdab60b201192d5a35134b0c7690
                                        • Instruction Fuzzy Hash: 30912A31E4DACB4FE795EB389455A747BD1FFA52A0B0441BAC04DC7297DE1CAC468740

                                        Execution Graph

                                        Execution Coverage:15.2%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:6
                                        Total number of Limit Nodes:0
                                        execution_graph 7336 7ff848f33569 7337 7ff848f33571 DeleteFileW 7336->7337 7339 7ff848f33616 7337->7339 7340 7ff848f33525 7341 7ff848f33531 DeleteFileW 7340->7341 7343 7ff848f33616 7341->7343
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be168dd7dfad30cd2f0e263a8893726f1dd29dcce9239a40ce839003f71d7eaf
                                        • Instruction ID: bd3b624ebf14299c8539b736d658e57aa7ed0e62c846d28f45075ef804551301
                                        • Opcode Fuzzy Hash: be168dd7dfad30cd2f0e263a8893726f1dd29dcce9239a40ce839003f71d7eaf
                                        • Instruction Fuzzy Hash: 75227030A1CA494FEBA8EF2884557B977E2FF98350F1441BDD44ED36D2DE28AC428B45

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH$HAH$HAH$HAH
                                        • API String ID: 0-4204409433
                                        • Opcode ID: 1d825e109899288bd89873e952c42f41bf2f008ba78127ccf089743bb6641825
                                        • Instruction ID: 0484302daf71525ba80157f0158ffab7ae14a63b117c01548780b106d34dc8a8
                                        • Opcode Fuzzy Hash: 1d825e109899288bd89873e952c42f41bf2f008ba78127ccf089743bb6641825
                                        • Instruction Fuzzy Hash: A661C671A1DE8A4FE6A9EB2C945567567D2FF997E0B4400B9D04EC32D6CE2DBC028740

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 384 7ff8491acace-7ff8491acad3 385 7ff8491acb15-7ff8491acb38 384->385 386 7ff8491acad5-7ff8491acafe 384->386 393 7ff8491acb3f-7ff8491acb46 385->393 390 7ff8491acb00-7ff8491acb13 386->390 391 7ff8491acb47-7ff8491acb8c 386->391 390->385 399 7ff8491acbcb-7ff8491acbcf 391->399 400 7ff8491acb8e-7ff8491acb92 391->400 402 7ff8491acc05-7ff8491acc0b 399->402 403 7ff8491acbd1-7ff8491acc00 399->403 401 7ff8491acb94-7ff8491acbc6 400->401 400->402 401->399 403->402
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CI$CI
                                        • API String ID: 0-4134897263
                                        • Opcode ID: ae821c6734400aa61ce5f9ff757019b40c3dbd010e47390c38b43993f1e82c9f
                                        • Instruction ID: 190f7dc9eb9664cc06f58c0b61d377131c6697d7c61867bab4483c6a3bb3c480
                                        • Opcode Fuzzy Hash: ae821c6734400aa61ce5f9ff757019b40c3dbd010e47390c38b43993f1e82c9f
                                        • Instruction Fuzzy Hash: BB411432D1DBCA4FD379DF2898552A57BE0EF957A0B0881BEC049C7193DE2D6C898781

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 716 7ff8491a2c10-7ff8491a2c2c 718 7ff8491a2c34-7ff8491a2c48 716->718 719 7ff8491a2c2e-7ff8491a2c32 716->719 720 7ff8491a2c4b-7ff8491a2caa 718->720 719->718 719->720 727 7ff8491a2cf4-7ff8491a2d5e 720->727 728 7ff8491a2cac-7ff8491a2cf3 720->728 738 7ff8491a2d60-7ff8491a2d62 727->738 739 7ff8491a2dcf-7ff8491a2ddc 727->739 728->727 740 7ff8491a2d64 738->740 741 7ff8491a2dde-7ff8491a2de0 738->741 739->741 742 7ff8491a2e4d-7ff8491a2e56 739->742 744 7ff8491a2d66-7ff8491a2d6e 740->744 745 7ff8491a2dab 740->745 746 7ff8491a2de2 741->746 747 7ff8491a2e5c-7ff8491a2e64 741->747 748 7ff8491a2e58-7ff8491a2e59 742->748 752 7ff8491a2d70 744->752 753 7ff8491a2dea-7ff8491a2dec 744->753 749 7ff8491a2e2c-7ff8491a2e34 745->749 750 7ff8491a2dac 745->750 754 7ff8491a2de4 746->754 755 7ff8491a2e29-7ff8491a2e2a 746->755 751 7ff8491a2e65-7ff8491a2e67 747->751 748->747 759 7ff8491a2e35-7ff8491a2e4c 749->759 762 7ff8491a2df3-7ff8491a2e0a 750->762 763 7ff8491a2dad-7ff8491a2db6 750->763 760 7ff8491a2e68-7ff8491a2e70 751->760 756 7ff8491a2d72-7ff8491a2d9a 752->756 757 7ff8491a2db7-7ff8491a2dce 752->757 753->760 761 7ff8491a2dee 753->761 758 7ff8491a2de7 754->758 768 7ff8491a2e71-7ff8491a2e79 755->768 769 7ff8491a2e2b 755->769 775 7ff8491a2e0b-7ff8491a2e18 756->775 776 7ff8491a2d9c-7ff8491a2d9e 756->776 757->739 758->748 765 7ff8491a2de9 758->765 759->742 760->768 761->759 766 7ff8491a2df0 761->766 762->775 763->757 765->753 766->762 774 7ff8491a2e81-7ff8491a2e87 768->774 769->749 778 7ff8491a2e89-7ff8491a2e92 774->778 775->778 780 7ff8491a2e1a-7ff8491a2e1c 775->780 779 7ff8491a2da0 776->779 776->780 781 7ff8491a2e98-7ff8491a2e9d 778->781 779->758 782 7ff8491a2da2-7ff8491a2daa 779->782 780->781 783 7ff8491a2e1e 780->783 786 7ff8491a2ee7-7ff8491a2f31 781->786 787 7ff8491a2e9f-7ff8491a2ec2 781->787 782->745 784 7ff8491a2e26-7ff8491a2e28 782->784 783->751 785 7ff8491a2e20-7ff8491a2e25 783->785 784->755 785->784 791 7ff8491a2fe0-7ff8491a3038 786->791 792 7ff8491a2f37-7ff8491a2f3a 786->792 803 7ff8491a303f-7ff8491a3055 791->803 792->791 794 7ff8491a2f40-7ff8491a2fa2 792->794 811 7ff8491a2fa4-7ff8491a2fcf 794->811 812 7ff8491a2fd6-7ff8491a2fdf 794->812 807 7ff8491a3057-7ff8491a3069 803->807 808 7ff8491a306b-7ff8491a3071 803->808 807->808 811->812
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: 73ed8f92a1aadabcf08bec2315d6b90432c11c6316edd73cd1158613e0cb7a25
                                        • Instruction ID: 6e6c62c46f1a6570fa4834b9c3bfb8b87dfd1cf306a979072c8e2a8e4fba6247
                                        • Opcode Fuzzy Hash: 73ed8f92a1aadabcf08bec2315d6b90432c11c6316edd73cd1158613e0cb7a25
                                        • Instruction Fuzzy Hash: BFE12731F1DACA4FE779AE2888556A977D0FF943A0F0405BAD049C72D7DE2CAC468B41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 994 7ff8491a3451-7ff8491a345b 995 7ff8491a3462-7ff8491a3473 994->995 996 7ff8491a345d 994->996 998 7ff8491a3475 995->998 999 7ff8491a347a-7ff8491a34a7 995->999 996->995 997 7ff8491a345f 996->997 997->995 998->999 1000 7ff8491a3477 998->1000 1002 7ff8491a34d5-7ff8491a34e2 999->1002 1003 7ff8491a34a9-7ff8491a34b3 999->1003 1000->999 1004 7ff8491a34b5-7ff8491a34cc 1003->1004 1005 7ff8491a34ee-7ff8491a3552 1003->1005 1008 7ff8491a34e3-7ff8491a34ed 1004->1008 1009 7ff8491a34ce-7ff8491a34d3 1004->1009 1012 7ff8491a3559-7ff8491a355b 1005->1012 1013 7ff8491a3554 call 7ff8491a3490 1005->1013 1009->1002 1009->1003 1014 7ff8491a355d-7ff8491a3577 1012->1014 1015 7ff8491a359f-7ff8491a35b0 1012->1015 1013->1012 1020 7ff8491a3590-7ff8491a359e 1014->1020 1021 7ff8491a3579-7ff8491a3586 1014->1021 1016 7ff8491a35b2 1015->1016 1017 7ff8491a35b7-7ff8491a35e0 call 7ff8491a3490 1015->1017 1016->1017 1026 7ff8491a3622-7ff8491a3629 1017->1026 1027 7ff8491a35e2-7ff8491a35fc 1017->1027 1021->1020 1025 7ff8491a3588-7ff8491a358e 1021->1025 1025->1020 1029 7ff8491a3630-7ff8491a3632 1026->1029 1033 7ff8491a3615-7ff8491a361d 1027->1033 1034 7ff8491a35fe-7ff8491a360b 1027->1034 1031 7ff8491a3634-7ff8491a3636 1029->1031 1032 7ff8491a3638-7ff8491a3659 1029->1032 1036 7ff8491a3663-7ff8491a3666 1031->1036 1039 7ff8491a3660-7ff8491a3661 1032->1039 1035 7ff8491a36a7-7ff8491a36be call 7ff8491a36bf 1033->1035 1034->1033 1042 7ff8491a360d-7ff8491a3613 1034->1042 1040 7ff8491a36a3-7ff8491a36a4 1036->1040 1041 7ff8491a3668-7ff8491a369c 1036->1041 1039->1036 1040->1035 1041->1040 1042->1033
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %_L
                                        • API String ID: 0-1469106525
                                        • Opcode ID: 41b3599a423284019766557c10a07eca0fabe03a5f52f9213f4280dd0b9f1592
                                        • Instruction ID: b73b686a0934bd706e3b1ae2ed2d80c4b84a081b5cd9108e69c5ae2680efa368
                                        • Opcode Fuzzy Hash: 41b3599a423284019766557c10a07eca0fabe03a5f52f9213f4280dd0b9f1592
                                        • Instruction Fuzzy Hash: 0391E831A0DB894FDBA6EF2898546B5B7E1EF55360F0405BAD04DC3292DE2DEC46CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: HAH
                                        • API String ID: 0-1579723087
                                        • Opcode ID: abf6fe504b77a01f38d24001f6d5a89b2f8cad49e15714b04d0a873ad8f5382f
                                        • Instruction ID: 115dc6fcf252307066101fac26ca0e1b8fd2f6086724d9a29303f43b6f888693
                                        • Opcode Fuzzy Hash: abf6fe504b77a01f38d24001f6d5a89b2f8cad49e15714b04d0a873ad8f5382f
                                        • Instruction Fuzzy Hash: FF410621A1EBC54FE7A6EB3C98686717FD0EFA6290F0804FED089C71A3D91D9C858701
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #&_^
                                        • API String ID: 0-519297270
                                        • Opcode ID: b32b56c0d75ce5aca5b7ed8271907fbb2b8e41c7cd616c9ef6ec58b979e1e19f
                                        • Instruction ID: 82123a636f80e561dbb2257518de3d0d6a04941473d806df436a2b5c069783a4
                                        • Opcode Fuzzy Hash: b32b56c0d75ce5aca5b7ed8271907fbb2b8e41c7cd616c9ef6ec58b979e1e19f
                                        • Instruction Fuzzy Hash: B7311937B1A6259ED310BE7DF4814E97360EF8577AB188677C18CCE093DB2C648586E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #&_^
                                        • API String ID: 0-519297270
                                        • Opcode ID: a6eff21ba5dfdfdabf2352c9ba2b94f9dcb555f9390d13526a1b3891fc05ef9e
                                        • Instruction ID: f6ac40f8cef86617793e76f023063ae498744575d84dc57d79961d7061730ded
                                        • Opcode Fuzzy Hash: a6eff21ba5dfdfdabf2352c9ba2b94f9dcb555f9390d13526a1b3891fc05ef9e
                                        • Instruction Fuzzy Hash: EB312A37B1E6299ED310BE7DF4814E973A0EF8577AB084677C1C8CE083DA1C648586E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #&_^
                                        • API String ID: 0-519297270
                                        • Opcode ID: 9b0c7fef596edb3c8386e05273ec449e2895266679207ed8150d3dcbe20a771e
                                        • Instruction ID: 26880b046c88f92125a92d535d083f8246fe3a254b9eadb80c183e8ffc4355cf
                                        • Opcode Fuzzy Hash: 9b0c7fef596edb3c8386e05273ec449e2895266679207ed8150d3dcbe20a771e
                                        • Instruction Fuzzy Hash: C1313D37B1D6199EC310BE7DF4814E97390EF85779B184777C188CE083DA1C648586E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `")I
                                        • API String ID: 0-1793973326
                                        • Opcode ID: 3551a8ccfe2ecf46f06ca00c83f444b5f95f55febe99f3358aa64e675f4714f8
                                        • Instruction ID: 210bd8389c400de6566c5b917653409b9912ef7276f4d3a721e8565e079d335b
                                        • Opcode Fuzzy Hash: 3551a8ccfe2ecf46f06ca00c83f444b5f95f55febe99f3358aa64e675f4714f8
                                        • Instruction Fuzzy Hash: C021F562E2DECA1FE39AAB3844566B567E1FFA9350F4444BAD04EC3283DD1CE9054351
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a56615419f640f8c1e5684faa5163a5a164f27dc28ac72161d229dc515737506
                                        • Instruction ID: c7bdc43b9eda057e176326822920543f2d7e61eba0e1f12d722b42c6ea93d823
                                        • Opcode Fuzzy Hash: a56615419f640f8c1e5684faa5163a5a164f27dc28ac72161d229dc515737506
                                        • Instruction Fuzzy Hash: EEC1C430A0DA894FEB69AB2884557B977D1FF553A0F1441BDD48EC76D3DE2CAC868B00
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 905b3197de8260afea0939a2676687a8111ab570b160fa6ad52370c3ffe58331
                                        • Instruction ID: ccc5ec4b3b33d26783f270e7ff4b957fffd265e53a5644985a7adfc37d67fc64
                                        • Opcode Fuzzy Hash: 905b3197de8260afea0939a2676687a8111ab570b160fa6ad52370c3ffe58331
                                        • Instruction Fuzzy Hash: 42510130A1CB894FEB69BB6898446757BD0EF563B4F10067ED489C31D6EE2DAC428781
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f9d71d3ef52cd3413589b02d3452de98066093687836a43d1859ecdd25e97536
                                        • Instruction ID: 025d4ac75d192779b0381d654e8f74d4cfb60d233dea56a34dca46c5a7aa56bb
                                        • Opcode Fuzzy Hash: f9d71d3ef52cd3413589b02d3452de98066093687836a43d1859ecdd25e97536
                                        • Instruction Fuzzy Hash: A7311531A2EB8A4FE765BB2984A15F677B0EF59350F4004BBD04AC31C7CE2C6C098791
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 29744506ea32a50abf3a92b43b9db6619d9a0d31b8839b096ae50dd2be34e5be
                                        • Instruction ID: 19f8165248b0ed7c27b3b791cc197cf0a468b023d93ce811ff0f638d87d4a875
                                        • Opcode Fuzzy Hash: 29744506ea32a50abf3a92b43b9db6619d9a0d31b8839b096ae50dd2be34e5be
                                        • Instruction Fuzzy Hash: 58314B31E1DAC64FE7AAAB3858916B17BD1EF96650B0444FEC009C71D7DD2D9C4AC740
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d3ed3f99e450ee0c6c5583ddc547a3aa78a92824f750dec26e79978f87e7f730
                                        • Instruction ID: a7e9f33e93e36eb77213bf40401a81fb89c5d40773748d69b8cb43ee7b110090
                                        • Opcode Fuzzy Hash: d3ed3f99e450ee0c6c5583ddc547a3aa78a92824f750dec26e79978f87e7f730
                                        • Instruction Fuzzy Hash: BE11C11148FAC60FE30767B44C295E63FA4DFC71A071D42EBE085CB4A3D84C498A83A1
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be0cf0630a8f7db4aeecc630f77a1b5b41364fcd8edf279c6607527ce0980cf4
                                        • Instruction ID: 99fe2326b856724d965a1010d8ef0f74751bda88c937eb3f097cc7dbf2026753
                                        • Opcode Fuzzy Hash: be0cf0630a8f7db4aeecc630f77a1b5b41364fcd8edf279c6607527ce0980cf4
                                        • Instruction Fuzzy Hash: A611E02192DEDA1EE725A76884163F9BBE1FF96350F4801B6E01CC71C3CF9CA8048791
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0f48486e0e806d9afaaf0c2851b708b4d285b118231a2cf2c470de0864f158c7
                                        • Instruction ID: ea4da275d07b716dfe4cf7d9991621c73e8d18056446480323aa094ab210edc4
                                        • Opcode Fuzzy Hash: 0f48486e0e806d9afaaf0c2851b708b4d285b118231a2cf2c470de0864f158c7
                                        • Instruction Fuzzy Hash: 0801283190DB854FE752F72884452B97FD1DF852A0F080A7ED08CC60E2CE6C4AC68387
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e35814de0922080f1f2f796079a1793e22542d9157df5dd8de2eaae7d4a2d7f4
                                        • Instruction ID: cae0ef97af6e49aaecf91dd711cfaa00adfd5c5e62dd37b112fefe949fcccba4
                                        • Opcode Fuzzy Hash: e35814de0922080f1f2f796079a1793e22542d9157df5dd8de2eaae7d4a2d7f4
                                        • Instruction Fuzzy Hash: F8F0C23190DBC96FEB51AB7894496EA7FF0EF46310F4540E7D848C6197CE286A448752
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6d891e50198a1775eca7f256dc60b595658a2e831b3f318b200f606aeb6065c
                                        • Instruction ID: afade6051220a857c140917519fca8ac67a0c303f751d24dbb2552a94df3b4f2
                                        • Opcode Fuzzy Hash: a6d891e50198a1775eca7f256dc60b595658a2e831b3f318b200f606aeb6065c
                                        • Instruction Fuzzy Hash: 25F0E230A2CA8A0BE794BA3CA80027673C5EB45215F5408BAD88EC7292DF2CDC424685
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e43572c15f9bf6d66c3a8ae478f32cb39d2340bfe34c3b6f581f34960a02a278
                                        • Instruction ID: bb6bc8316e5dfea319dbc76bff7b8b675262b4c2f74db6fc5ced53000debc3cb
                                        • Opcode Fuzzy Hash: e43572c15f9bf6d66c3a8ae478f32cb39d2340bfe34c3b6f581f34960a02a278
                                        • Instruction Fuzzy Hash: 9CF0FF31E1D6C84FE755AF78885A0ED7FB0EF55210F4905E7D448C7092EE2859498300
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 70cf21d9e70ce76508cf83898484feef363597d488487a1893d6b1d777935134
                                        • Instruction ID: cf83029328f4ad40a8db66ae19be38369b9181fa82c86dbc3ac0179cdc805d59
                                        • Opcode Fuzzy Hash: 70cf21d9e70ce76508cf83898484feef363597d488487a1893d6b1d777935134
                                        • Instruction Fuzzy Hash: C3F0A07190D60D6FDB18FF59EC46AEB37A8FF85220F00013AF44D82192E6396863CB50
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 817952ee2949c7e6433a5911bbc7d752ad0a81915d740191ac18c33f324af9b5
                                        • Instruction ID: 368dcea47f75652f9bdadaaae0a44fcb5cc4408dfafc32f12603e442acae19e5
                                        • Opcode Fuzzy Hash: 817952ee2949c7e6433a5911bbc7d752ad0a81915d740191ac18c33f324af9b5
                                        • Instruction Fuzzy Hash: 6BD05E53B6C68E0EE590790878910B1A380EB952B5B5002B3C44992186CD2F99460641
                                        Memory Dump Source
                                        • Source File: 0000001D.00000002.2682666279.00007FF8491A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491A2000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_29_2_7ff8491a2000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50bfb1e22a99aa11d7b1ec7850d2932b67863802919bd0c3bf2843e862db3bdc
                                        • Instruction ID: 441ab12104a39798504e4bee3ef62e5711c222dadbdcee72ffac76d45b075d92
                                        • Opcode Fuzzy Hash: 50bfb1e22a99aa11d7b1ec7850d2932b67863802919bd0c3bf2843e862db3bdc
                                        • Instruction Fuzzy Hash: CFD0233555454C57C7147B65B4054D7B758FF8D35CF00057FF91CC5041D62795354392