Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7FEGBYFBHFBJH32.exe

Overview

General Information

Sample name:7FEGBYFBHFBJH32.exe
Analysis ID:1583097
MD5:5fd5700f4787f405bc2a0fc6e6233037
SHA1:ba4e438f6976803a6965fb5dd7187a9f0674e4c8
SHA256:a680029a0a1bd1aa336b5e4086104f21f2a97b054e6fb1b9fb122ed32786ce12
Tags:exeuser-aachum
Infos:

Detection

44Caliber Stealer, BlackGuard, Rags Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected 44Caliber Stealer
Yara detected BlackGuard
Yara detected Rags Stealer
AI detected suspicious sample
Contains functionality to capture screen (.Net source)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 7FEGBYFBHFBJH32.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe" MD5: 5FD5700F4787F405BC2A0FC6E6233037)
    • WerFault.exe (PID: 7580 cmdline: C:\Windows\system32\WerFault.exe -u -p 7416 -s 1700 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
{"Discord Webhook": "https://discord.com/api/webhooks/1324061351169101927/Upg-sOh6FXJYwbAsqIx2PTZdfYr6z3JtFkd-CN6KxlCaM74dpejrx9TbGUYSk03-Cb92\u0001123321"}
SourceRuleDescriptionAuthorStrings
7FEGBYFBHFBJH32.exeJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
    7FEGBYFBHFBJH32.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      7FEGBYFBHFBJH32.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        7FEGBYFBHFBJH32.exeJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
          7FEGBYFBHFBJH32.exeJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
              00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                  00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
                    00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
                    • 0x40faf:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
                    Click to see the 7 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpackJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
                      0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                        0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                          0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpackJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                            0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpackJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
                              Click to see the 5 entries
                              No Sigma rule has matched
                              No Suricata rule has matched

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: 7FEGBYFBHFBJH32.exeAvira: detected
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpackMalware Configuration Extractor: 44Caliber Stealer {"Discord Webhook": "https://discord.com/api/webhooks/1324061351169101927/Upg-sOh6FXJYwbAsqIx2PTZdfYr6z3JtFkd-CN6KxlCaM74dpejrx9TbGUYSk03-Cb92\u0001123321"}
                              Source: 7FEGBYFBHFBJH32.exeVirustotal: Detection: 71%Perma Link
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                              Source: 7FEGBYFBHFBJH32.exeJoe Sandbox ML: detected

                              Location Tracking

                              barindex
                              Source: unknownDNS query: name: freegeoip.app
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49730 version: TLS 1.2
                              Source: 7FEGBYFBHFBJH32.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: Binary string: System.Xml.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: mscorlib.pdb source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481EC2000.00000004.00000800.00020000.00000000.sdmp, WER525E.tmp.dmp.3.dr
                              Source: Binary string: Insidious.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.ni.pdbRSDS source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: C:\Users\ddtug\Downloads\44CALIBER-main\44CALIBER\obj\Debug\Insidious.pdb source: 7FEGBYFBHFBJH32.exe
                              Source: Binary string: mscorlib.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Core.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Configuration.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Xml.pdb#( source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Configuration.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: Insidious.pdb@w^ source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Xml.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Core.ni.pdbRSDS source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Core.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeCode function: 4x nop then jmp 00007FFD9B7E3D1Fh0_2_00007FFD9B7E3BCD
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeCode function: 4x nop then jmp 00007FFD9B7E668Ah0_2_00007FFD9B7E61C8
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeCode function: 4x nop then mov eax, dword ptr [ebp-24h]0_2_00007FFD9B7F4ED0
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeCode function: 4x nop then jmp 00007FFD9B7E88ABh0_2_00007FFD9B7E8581
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeCode function: 4x nop then mov edx, dword ptr [ebp-14h]0_2_00007FFD9B7E5B30

                              Networking

                              barindex
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: freegeoip.app
                              Source: cert9.db.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                              Source: cert9.db.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                              Source: cert9.db.0.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                              Source: cert9.db.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                              Source: cert9.db.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                              Source: cert9.db.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                              Source: cert9.db.0.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481CBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.app
                              Source: cert9.db.0.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: cert9.db.0.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481E6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
                              Source: cert9.db.0.drString found in binary or memory: http://x1.c.lencr.org/0
                              Source: cert9.db.0.drString found in binary or memory: http://x1.i.lencr.org/0
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.vimeworld.ru/user/name/
                              Source: 7FEGBYFBHFBJH32.exeString found in binary or memory: https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                              Source: 7FEGBYFBHFBJH32.exeString found in binary or memory: https://discord.com/api/webhooks/1324061351169101927/Upg-sOh6FXJYwbAsqIx2PTZdfYr6z3JtFkd-CN6KxlCaM74
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481C81000.00000004.00000800.00020000.00000000.sdmp, 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481C99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/
                              Source: 7FEGBYFBHFBJH32.exeString found in binary or memory: https://steamcommunity.com/profiles/ASOFTWARE
                              Source: tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org
                              Source: tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                              Source: tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://www.ecosia.org/newtab/
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                              Source: tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org
                              Source: tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                              Source: tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D48000.00000004.00000800.00020000.00000000.sdmp, tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                              Source: tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D48000.00000004.00000800.00020000.00000000.sdmp, tmp4FED.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49730 version: TLS 1.2

                              Key, Mouse, Clipboard, Microphone and Screen Capturing

                              barindex
                              Source: 7FEGBYFBHFBJH32.exe, Screen.cs.Net Code: GetScreen

                              E-Banking Fraud

                              barindex
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY

                              System Summary

                              barindex
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: Finds samples of the 44Caliber stealer Author: Sekoia.io
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: Detects A310Logger Author: ditekSHen
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: Finds samples of the 44Caliber stealer Author: Sekoia.io
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                              Source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: 00000000.00000002.1817698372.0000022481D4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: Process Memory Space: 7FEGBYFBHFBJH32.exe PID: 7416, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7416 -s 1700
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInsidious.exe6 vs 7FEGBYFBHFBJH32.exe
                              Source: 7FEGBYFBHFBJH32.exeBinary or memory string: OriginalFilenameInsidious.exe6 vs 7FEGBYFBHFBJH32.exe
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: infostealer_win_44caliber author = Sekoia.io, description = Finds samples of the 44Caliber stealer, creation_date = 2022-03-08, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/razexgod/44CALIBER, id = 44e5bbc1-f442-47d3-8431-25182f38439d
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                              Source: 7FEGBYFBHFBJH32.exe, type: SAMPLEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_44caliber author = Sekoia.io, description = Finds samples of the 44Caliber stealer, creation_date = 2022-03-08, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/razexgod/44CALIBER, id = 44e5bbc1-f442-47d3-8431-25182f38439d
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                              Source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                              Source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: 00000000.00000002.1817698372.0000022481D4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: Process Memory Space: 7FEGBYFBHFBJH32.exe PID: 7416, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: 7FEGBYFBHFBJH32.exe, Help.csSuspicious URL: 'https://api.vimeworld.ru/user/name/'
                              Source: classification engineClassification label: mal100.troj.spyw.winEXE@2/15@1/1
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile created: C:\Users\user\AppData\Roaming\44Jump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeMutant created: NULL
                              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7416
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4FED.tmpJump to behavior
                              Source: 7FEGBYFBHFBJH32.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: 7FEGBYFBHFBJH32.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481E51000.00000004.00000800.00020000.00000000.sdmp, tmp505C.tmp.dat.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                              Source: 7FEGBYFBHFBJH32.exeVirustotal: Detection: 71%
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile read: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe "C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe"
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7416 -s 1700
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: rasapi32.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: rasman.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: rtutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: secur32.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeSection loaded: schannel.dllJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                              Source: 7FEGBYFBHFBJH32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                              Source: 7FEGBYFBHFBJH32.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: 7FEGBYFBHFBJH32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: System.Xml.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: mscorlib.pdb source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481EC2000.00000004.00000800.00020000.00000000.sdmp, WER525E.tmp.dmp.3.dr
                              Source: Binary string: Insidious.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.ni.pdbRSDS source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: C:\Users\ddtug\Downloads\44CALIBER-main\44CALIBER\obj\Debug\Insidious.pdb source: 7FEGBYFBHFBJH32.exe
                              Source: Binary string: mscorlib.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Core.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Configuration.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Xml.pdb#( source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Configuration.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: Insidious.pdb@w^ source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Xml.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.pdb source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Core.ni.pdbRSDS source: WER525E.tmp.dmp.3.dr
                              Source: Binary string: System.Core.ni.pdb source: WER525E.tmp.dmp.3.dr
                              Source: 7FEGBYFBHFBJH32.exeStatic PE information: 0xFF0F76A5 [Sat Aug 8 19:38:13 2105 UTC]
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeCode function: 0_2_00007FFD9B7E021D push E95E4598h; ret 0_2_00007FFD9B7E0259
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeCode function: 0_2_00007FFD9B7E00AD pushad ; iretd 0_2_00007FFD9B7E00C1
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeMemory allocated: 224803C0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeMemory allocated: 22499C80000 memory reserve | memory write watchJump to behavior
                              Source: Amcache.hve.3.drBinary or memory string: VMware
                              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
                              Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
                              Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
                              Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
                              Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                              Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                              Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                              Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                              Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                              Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                              Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1819342876.000002249A518000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: Amcache.hve.3.drBinary or memory string: vmci.sys
                              Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                              Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
                              Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
                              Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                              Source: Amcache.hve.3.drBinary or memory string: VMware20,1
                              Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
                              Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
                              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                              Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                              Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                              Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                              Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
                              Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
                              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
                              Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                              Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeMemory allocated: page read and write | page guardJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeQueries volume information: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                              Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                              Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
                              Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                              Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

                              Stealing of Sensitive Information

                              barindex
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: 7FEGBYFBHFBJH32.exe PID: 7416, type: MEMORYSTR
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1817698372.0000022481CBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: 7FEGBYFBHFBJH32.exe PID: 7416, type: MEMORYSTR
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Electrum
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481D4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: JaxxDir
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: ExodusDir
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: 7FEGBYFBHFBJH32.exe, 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\Jump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                              Source: C:\Users\user\Desktop\7FEGBYFBHFBJH32.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\Jump to behavior
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1817698372.0000022481D4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: 7FEGBYFBHFBJH32.exe PID: 7416, type: MEMORYSTR

                              Remote Access Functionality

                              barindex
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: 7FEGBYFBHFBJH32.exe PID: 7416, type: MEMORYSTR
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 7FEGBYFBHFBJH32.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.7FEGBYFBHFBJH32.exe.22480030000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1817698372.0000022481CBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: 7FEGBYFBHFBJH32.exe PID: 7416, type: MEMORYSTR
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                              DLL Side-Loading
                              1
                              Process Injection
                              1
                              Masquerading
                              1
                              OS Credential Dumping
                              21
                              Security Software Discovery
                              Remote Services1
                              Screen Capture
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                              DLL Side-Loading
                              2
                              Virtualization/Sandbox Evasion
                              LSASS Memory2
                              Virtualization/Sandbox Evasion
                              Remote Desktop Protocol3
                              Data from Local System
                              1
                              Non-Application Layer Protocol
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                              Disable or Modify Tools
                              Security Account Manager1
                              Process Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive2
                              Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                              Process Injection
                              NTDS12
                              System Information Discovery
                              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                              Obfuscated Files or Information
                              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                              Timestomp
                              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                              DLL Side-Loading
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              7FEGBYFBHFBJH32.exe72%VirustotalBrowse
                              7FEGBYFBHFBJH32.exe100%AviraHEUR/AGEN.1307065
                              7FEGBYFBHFBJH32.exe100%Joe Sandbox ML
                              No Antivirus matches
                              No Antivirus matches
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              https://api.vimeworld.ru/user/name/0%Avira URL Cloudsafe
                              https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/0%Avira URL Cloudsafe
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              freegeoip.app
                              188.114.96.3
                              truefalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://freegeoip.app/xml/7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481C81000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/chrome_newtab7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                    high
                                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFtmp4FED.tmp.tmpdb.0.drfalse
                                      high
                                      https://duckduckgo.com/ac/?q=7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.ico7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                          high
                                          https://steamcommunity.com/profiles/ASOFTWARE7FEGBYFBHFBJH32.exefalse
                                            high
                                            https://freegeoip.app7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481C81000.00000004.00000800.00020000.00000000.sdmp, 7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481C99000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                                high
                                                http://crl.rootca1.amazontrust.com/rootca1.crl0cert9.db.0.drfalse
                                                  high
                                                  http://upx.sf.netAmcache.hve.3.drfalse
                                                    high
                                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                                      high
                                                      http://ocsp.rootca1.amazontrust.com0:cert9.db.0.drfalse
                                                        high
                                                        https://www.ecosia.org/newtab/7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                                          high
                                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmp4FED.tmp.tmpdb.0.drfalse
                                                            high
                                                            https://ac.ecosia.org/autocomplete?q=7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                                              high
                                                              http://x1.c.lencr.org/0cert9.db.0.drfalse
                                                                high
                                                                http://x1.i.lencr.org/0cert9.db.0.drfalse
                                                                  high
                                                                  https://discord.com/api/webhooks/1324061351169101927/Upg-sOh6FXJYwbAsqIx2PTZdfYr6z3JtFkd-CN6KxlCaM747FEGBYFBHFBJH32.exefalse
                                                                    high
                                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                                                      high
                                                                      http://crt.rootca1.amazontrust.com/rootca1.cer0?cert9.db.0.drfalse
                                                                        high
                                                                        https://api.vimeworld.ru/user/name/7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481C81000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/7FEGBYFBHFBJH32.exefalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://support.mozilla.orgtmp4FED.tmp.tmpdb.0.drfalse
                                                                          high
                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481E6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=7FEGBYFBHFBJH32.exe, 00000000.00000002.1818258957.0000022491D26000.00000004.00000800.00020000.00000000.sdmp, tmp506D.tmp.dat.0.dr, tmp502C.tmp.dat.0.drfalse
                                                                              high
                                                                              http://freegeoip.app7FEGBYFBHFBJH32.exe, 00000000.00000002.1817698372.0000022481CBF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                • No. of IPs < 25%
                                                                                • 25% < No. of IPs < 50%
                                                                                • 50% < No. of IPs < 75%
                                                                                • 75% < No. of IPs
                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                188.114.96.3
                                                                                freegeoip.appEuropean Union
                                                                                13335CLOUDFLARENETUSfalse
                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                Analysis ID:1583097
                                                                                Start date and time:2025-01-01 22:10:08 +01:00
                                                                                Joe Sandbox product:CloudBasic
                                                                                Overall analysis duration:0h 4m 29s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                Number of analysed new started processes analysed:8
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:0
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Sample name:7FEGBYFBHFBJH32.exe
                                                                                Detection:MAL
                                                                                Classification:mal100.troj.spyw.winEXE@2/15@1/1
                                                                                EGA Information:Failed
                                                                                HCA Information:
                                                                                • Successful, ratio: 99%
                                                                                • Number of executed functions: 105
                                                                                • Number of non-executed functions: 2
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .exe
                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                • Excluded IPs from analysis (whitelisted): 20.42.73.29, 40.126.31.71, 172.202.163.200, 13.107.246.45
                                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                • Execution Graph export aborted for target 7FEGBYFBHFBJH32.exe, PID 7416 because it is empty
                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                TimeTypeDescription
                                                                                16:11:14API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                188.114.96.3QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • filetransfer.io/data-package/u7ghXEYp/download
                                                                                CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                                • www.mffnow.info/1a34/
                                                                                A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                • www.mydreamdeal.click/1ag2/
                                                                                SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                • www.questmatch.pro/ipd6/
                                                                                QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • filetransfer.io/data-package/I7fmQg9d/download
                                                                                need quotations.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rtpwslot888gol.sbs/jmkz/
                                                                                QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • filetransfer.io/data-package/Bh1Kj4RD/download
                                                                                http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                • kklk16.bsyo45ksda.top/favicon.ico
                                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                • filetransfer.io/data-package/XrlEIxYp/download
                                                                                QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                • filetransfer.io/data-package/XrlEIxYp/download
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                freegeoip.apptyPafmiT0t.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                                                • 188.114.96.3
                                                                                vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                                                                • 188.114.97.3
                                                                                VegaStealer_v2.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                                • 172.67.160.84
                                                                                SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA Stealer, XmrigBrowse
                                                                                • 172.67.160.84
                                                                                SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                                • 104.21.73.97
                                                                                ypauPrrA08.exeGet hashmaliciousAdes Stealer, BlackGuard, VEGA StealerBrowse
                                                                                • 188.114.97.3
                                                                                Loader.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                                                • 188.114.97.3
                                                                                Nursultan.exeGet hashmalicious44Caliber Stealer, BlackGuard, Blank Grabber, Rags Stealer, Umbral Stealer, XWormBrowse
                                                                                • 188.114.97.3
                                                                                External.exeGet hashmaliciousAdes Stealer, BlackGuard, VEGA StealerBrowse
                                                                                • 188.114.96.3
                                                                                Insidious_protected.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                                                • 188.114.96.3
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                CLOUDFLARENETUS16oApcahEa.exeGet hashmaliciousBabuk, DjvuBrowse
                                                                                • 104.21.32.1
                                                                                UhsjR3ZFTD.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.32.1
                                                                                544WP3NHaP.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 172.67.220.198
                                                                                KRNL.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.157.254
                                                                                01012025.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                • 104.17.25.14
                                                                                Setup.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.198.102
                                                                                SET_UP.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.112.1
                                                                                test.doc.bin.docGet hashmaliciousUnknownBrowse
                                                                                • 104.21.21.16
                                                                                test.doc.bin.docGet hashmaliciousUnknownBrowse
                                                                                • 104.21.21.16
                                                                                web44.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                • 188.114.96.3
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                3b5074b1b5d032e5620f69f9f700ff0etest.doc.bin.docGet hashmaliciousUnknownBrowse
                                                                                • 188.114.96.3
                                                                                web44.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                • 188.114.96.3
                                                                                test.doc.bin.docGet hashmaliciousUnknownBrowse
                                                                                • 188.114.96.3
                                                                                eP6sjvTqJa.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 188.114.96.3
                                                                                YGk3y6Tdix.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 188.114.96.3
                                                                                1.ps1Get hashmaliciousUnknownBrowse
                                                                                • 188.114.96.3
                                                                                Let's_20Compress.exeGet hashmaliciousUnknownBrowse
                                                                                • 188.114.96.3
                                                                                YJaaZuNHwI.exeGet hashmaliciousQuasarBrowse
                                                                                • 188.114.96.3
                                                                                Etqq32Yuw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 188.114.96.3
                                                                                OPRfEWLTto.jsGet hashmaliciousUnknownBrowse
                                                                                • 188.114.96.3
                                                                                No context
                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):65536
                                                                                Entropy (8bit):1.1212416592746164
                                                                                Encrypted:false
                                                                                SSDEEP:192:5coFU6ZTc809c0jQaWBTGlSeZBzuiF4AZ24lO8E:+omc49c0jQam0SmBzuiF4AY4lO8E
                                                                                MD5:55BE31223299FA1015C329F2F11AC5CE
                                                                                SHA1:30E92C3390586657012F6CB8D40A7AEF322D10F6
                                                                                SHA-256:8AB88962F5BA1622D3B66C50497110281CA9EF381D8C06ECEBF0D3341EDFECBA
                                                                                SHA-512:5AB1101589413CD384804634CE5295F55C18B74838EDED1EB6035E380188AA765637D3A5D5B54DE95F5142B50D8E78C7C7D3D6840E21BDE3205467A55F8EF9FE
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.2.3.9.4.5.8.8.4.7.0.8.3.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.2.3.9.4.6.0.4.0.9.5.8.0.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.e.1.2.d.5.2.9.-.6.2.c.e.-.4.8.d.f.-.8.4.2.2.-.c.e.8.4.9.1.2.8.0.8.d.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.e.9.c.d.0.d.a.-.4.4.b.a.-.4.c.3.5.-.8.d.3.5.-.b.8.5.7.c.b.f.2.e.3.f.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.7.F.E.G.B.Y.F.B.H.F.B.J.H.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.n.s.i.d.i.o.u.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.f.8.-.0.0.0.1.-.0.0.1.4.-.b.6.5.9.-.f.1.a.6.9.1.5.c.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.1.1.8.6.e.c.8.a.7.1.b.7.6.8.8.5.0.a.d.2.d.f.e.6.a.d.f.3.7.6.7.0.0.0.0.0.0.0.0.!.0.0.0.0.b.a.4.e.4.3.8.f.6.9.7.6.8.0.3.a.6.9.6.5.f.b.5.d.d.7.1.8.7.a.9.f.0.6.7.4.e.4.c.8.!.7.F.E.G.B.
                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                File Type:Mini DuMP crash report, 16 streams, Wed Jan 1 21:10:59 2025, 0x1205a4 type
                                                                                Category:dropped
                                                                                Size (bytes):559552
                                                                                Entropy (8bit):3.352435239785875
                                                                                Encrypted:false
                                                                                SSDEEP:3072:ljJ7waDSHp3+vWp7wXiADvMooVmfyBOXpIymdSZxgRNiAb2k4t/t90JJV2Pv0cSz:1BwaCp3QWKXrvMPniAbtlEw/xlq4
                                                                                MD5:A5AD888A6E2FA423A0B0F2FCC6807C69
                                                                                SHA1:8B436CFBA71865DE6108FB6D6D45FD076EBC434D
                                                                                SHA-256:9B36132D8B486C7EDA110DF8F0DC56D14552D454E07B6F0330E5D3A09203C99F
                                                                                SHA-512:22BAD0FF518371D9B11A676A373C301DCC0B5E256173EEB57DDED6376BAA1EEBE64D5B0694645879B299A2B0810B295DDB28E145DE19B3DAFB9982E4C322F3C1
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:MDMP..a..... .......c.ug........................,...$.......<...P$......t....$.......Z..............l.......8...........T...........pE..PD...........7...........8..............................................................................eJ.......9......Lw......................T...........a.ug.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):8628
                                                                                Entropy (8bit):3.7042267822364794
                                                                                Encrypted:false
                                                                                SSDEEP:192:R6l7wVeJWy+6Y9vBZgmfZbiYprj89bZKGf8Tm:R6lXJb+6YFBZgmf1iJZTfl
                                                                                MD5:52C6BB81284F870AD2A0937EAD87D794
                                                                                SHA1:15DFEC2057F4ED2102BAB641E2C8598395FE82AB
                                                                                SHA-256:79AEFD62E56B48A4CCFC48F70E90B0AB6CFA0DA4AC45245A379E2B9629F53C75
                                                                                SHA-512:DEF30B6C52ED1081927AE6F8E2486589CB1116B245CAECE837B928CFF124C25AC1E08F7E20B0FF6FF3FFB196CD9D943EBB646C0A086FDA03653BB5CC457425EC
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.1.6.<./.P.i.
                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):4829
                                                                                Entropy (8bit):4.509380163844644
                                                                                Encrypted:false
                                                                                SSDEEP:48:cvIwWl8zsDSmJg771I9liWpW8VY8Ym8M4JNEoFwyq8v4EnXCpBn4Gd:uIjfO8I72j7VoJmxWVnXCpeGd
                                                                                MD5:A98334A580FD1E75D694B9EA98B6F969
                                                                                SHA1:847363084DCABB687E023B355CB6C7BA50E93FE8
                                                                                SHA-256:080B21057B11B896A52E7F53F4C1F0D18BB83F3F5DE15EBCF457F874C76E0FE3
                                                                                SHA-512:2EC696F73B4DFBC0454E080E9B6C07A2100B5F0DC11DE6EC458A28A98DA55CCE770E5DD72DF6047007DF52703D5ADB7389034801EB182217AF251016C31573F3
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="657373" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 7, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                Category:dropped
                                                                                Size (bytes):229376
                                                                                Entropy (8bit):0.64343788909108
                                                                                Encrypted:false
                                                                                SSDEEP:384:A1zkVmvQhyn+Zoz67dNlIMMz333JGN8j/LKXYj5kuv:AUUMXCyIr
                                                                                MD5:B6787B79D64948AAC1D6359AC18AB268
                                                                                SHA1:0831EB15AB2B330BE95975A24F8945ED284D0BA4
                                                                                SHA-256:9D6FD3B8AB8AA7934C75EDE36CEB9CF4DDAD06C5031E89872B4E814D7DB674E2
                                                                                SHA-512:9296866380EF966F1CB6E69B7B84D1A86CD5AE8D9A7332C57543875FAA4FC7F1387A4CF83B7D662E4BAB0381E4AFC9CB9999075EBB497C6756DF770454F3530E
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:SQLite format 3......@ ..........................................................................j......z..{...{.{j{*z.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):294912
                                                                                Entropy (8bit):0.08436842005578409
                                                                                Encrypted:false
                                                                                SSDEEP:192:5va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23vIn:51zkVmvQhyn+Zoz67n
                                                                                MD5:2CD2840E30F477F23438B7C9D031FC08
                                                                                SHA1:03D5410A814B298B068D62ACDF493B2A49370518
                                                                                SHA-256:49F56AAA16086F2A9DB340CC9A6E8139E076765C1BFED18B1725CC3B395DC28D
                                                                                SHA-512:DCDD722C3A8AD79265616ADDDCA208E068E4ECEBE8820E4ED16B1D1E07FD52EB3A59A22988450071CFDA50BBFF7CB005ADF05A843DA38421F28572F3433C0F19
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:SQLite format 3......@ ..........................................................................j......z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):5242880
                                                                                Entropy (8bit):0.037963276276857943
                                                                                Encrypted:false
                                                                                SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                                                MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                                                SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                                                SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                                                SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):98304
                                                                                Entropy (8bit):0.08235737944063153
                                                                                Encrypted:false
                                                                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                File Type:MS Windows registry file, NT/2000 or above
                                                                                Category:dropped
                                                                                Size (bytes):1835008
                                                                                Entropy (8bit):4.46577493643203
                                                                                Encrypted:false
                                                                                SSDEEP:6144:9IXfpi67eLPU9skLmb0b4SWSPKaJG8nAgejZMMhA2gX4WABl0uNHdwBCswSbB:uXD94SWlLZMM6YFHx+B
                                                                                MD5:897CDE0B02F7B7CCBB2F0A165F7D51FF
                                                                                SHA1:D28A5A7EAAF6190B210BEDDFD3130BAF402924FC
                                                                                SHA-256:B9FA4810BD08A45B0EA809367A82E42BD314306878780D3868348687E258971E
                                                                                SHA-512:A6DB8E84618C9281F2085C55F3840B097DD5A50917F0ED02B3F6264827DF387B759B68EE5CFC02C6BB7FCCFFEB8236D0A2FE26B4CC55259C4BC2845474A46336
                                                                                Malicious:false
                                                                                Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....\...............................................................................................................................................................................................................................................................................................................................................Th.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Entropy (8bit):5.799214757133622
                                                                                TrID:
                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                • Windows Screen Saver (13104/52) 0.07%
                                                                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                File name:7FEGBYFBHFBJH32.exe
                                                                                File size:310'784 bytes
                                                                                MD5:5fd5700f4787f405bc2a0fc6e6233037
                                                                                SHA1:ba4e438f6976803a6965fb5dd7187a9f0674e4c8
                                                                                SHA256:a680029a0a1bd1aa336b5e4086104f21f2a97b054e6fb1b9fb122ed32786ce12
                                                                                SHA512:f221ee33b25b57a3c39e5e0f872ecdf987dacfb6d134b93efa87b91868e685533e564f62975af5b5e36524f1d0dd505835f84bfe7385c98942feab254a4e9c23
                                                                                SSDEEP:6144:yFcT6MDdbICydeBvtCikGW9KJj6TmA1D0efJ:yFK1CikGeK5o1D1J
                                                                                TLSH:5064480827F88A65F5BE9BBEC0B551508371B462B83FDB4E1EC560EA2D32350CD49B67
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v............"...0.................. ........@.. ....................... ............`................................
                                                                                Icon Hash:90cececece8e8eb0
                                                                                Entrypoint:0x44adb2
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0xFF0F76A5 [Sat Aug 8 19:38:13 2105 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                Instruction
                                                                                jmp dword ptr [00402000h]
                                                                                adc byte ptr [ecx], dl
                                                                                adc al, byte ptr [eax]
                                                                                or byte ptr [edi], al
                                                                                or dword ptr [esi], eax
                                                                                or al, byte ptr [030C040Bh]
                                                                                or eax, 0F010E02h
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax+eax], cl
                                                                                or byte ptr [eax], al
                                                                                mov word ptr [eax], es
                                                                                or byte ptr [eax], al
                                                                                dec esp
                                                                                add byte ptr [eax], cl
                                                                                add ah, cl
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [eax+eax], ch
                                                                                or byte ptr [eax], al
                                                                                lodsb
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [eax+eax+08h], ch
                                                                                add ah, ch
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [eax+eax], bl
                                                                                or byte ptr [eax], al
                                                                                pushfd
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [eax+eax+08h], bl
                                                                                add ah, bl
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [eax+eax], bh
                                                                                or byte ptr [eax], al
                                                                                mov esp, 7C000800h
                                                                                add byte ptr [eax], cl
                                                                                add ah, bh
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx], al
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx+42000800h], al
                                                                                add byte ptr [eax], cl
                                                                                add dl, al
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx], ah
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx+62000800h], ah
                                                                                add byte ptr [eax], cl
                                                                                add dl, ah
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx], dl
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx+52000800h], dl
                                                                                add byte ptr [eax], cl
                                                                                add dl, dl
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx], dh
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx+72000800h], dh
                                                                                add byte ptr [eax], cl
                                                                                add dl, dh
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx], cl
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx+4A000800h], cl
                                                                                add byte ptr [eax], cl
                                                                                add dl, cl
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx], ch
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx+6A000800h], ch
                                                                                add byte ptr [eax], cl
                                                                                add dl, ch
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx], bl
                                                                                add byte ptr [eax], cl
                                                                                add byte ptr [edx+5A000800h], bl
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x4ad5e0x4f.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x5f8.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x4acc40x38.text
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x20000x4b3a80x4b400666d52c588a5cc7fea9e6a0eb7b5aa64False0.40194468957641194data5.812206008633103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x4e0000x5f80x600921d375c8efa76f5064b2cab322a95ecFalse0.4381510416666667data4.2678145072196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x500000xc0x20047f1539ae7064a52cd6c757f4bd1ae1bFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_VERSION0x4e0900x368data0.4231651376146789
                                                                                RT_MANIFEST0x4e4080x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                DLLImport
                                                                                mscoree.dll_CorExeMain
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jan 1, 2025 22:10:59.838365078 CET49730443192.168.2.4188.114.96.3
                                                                                Jan 1, 2025 22:10:59.838409901 CET44349730188.114.96.3192.168.2.4
                                                                                Jan 1, 2025 22:10:59.838488102 CET49730443192.168.2.4188.114.96.3
                                                                                Jan 1, 2025 22:10:59.858426094 CET49730443192.168.2.4188.114.96.3
                                                                                Jan 1, 2025 22:10:59.858443975 CET44349730188.114.96.3192.168.2.4
                                                                                Jan 1, 2025 22:11:00.342932940 CET44349730188.114.96.3192.168.2.4
                                                                                Jan 1, 2025 22:11:00.343017101 CET49730443192.168.2.4188.114.96.3
                                                                                Jan 1, 2025 22:11:15.239109039 CET44349730188.114.96.3192.168.2.4
                                                                                Jan 1, 2025 22:11:15.239176035 CET49730443192.168.2.4188.114.96.3
                                                                                Jan 1, 2025 22:11:15.506134033 CET49730443192.168.2.4188.114.96.3
                                                                                Jan 1, 2025 22:11:15.506175995 CET44349730188.114.96.3192.168.2.4
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jan 1, 2025 22:10:59.819298983 CET5637253192.168.2.41.1.1.1
                                                                                Jan 1, 2025 22:10:59.827256918 CET53563721.1.1.1192.168.2.4
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Jan 1, 2025 22:10:59.819298983 CET192.168.2.41.1.1.10xa9f8Standard query (0)freegeoip.appA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Jan 1, 2025 22:10:59.827256918 CET1.1.1.1192.168.2.40xa9f8No error (0)freegeoip.app188.114.96.3A (IP address)IN (0x0001)false
                                                                                Jan 1, 2025 22:10:59.827256918 CET1.1.1.1192.168.2.40xa9f8No error (0)freegeoip.app188.114.97.3A (IP address)IN (0x0001)false

                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:16:10:57
                                                                                Start date:01/01/2025
                                                                                Path:C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\Desktop\7FEGBYFBHFBJH32.exe"
                                                                                Imagebase:0x22480030000
                                                                                File size:310'784 bytes
                                                                                MD5 hash:5FD5700F4787F405BC2A0FC6E6233037
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_BlackGuard, Description: Yara detected BlackGuard, Source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_44CaliberStealer, Description: Yara detected 44Caliber Stealer, Source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.1652511622.0000022480032000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                                • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000000.00000002.1817698372.0000022481CBF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1817698372.0000022481D4C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000002.1817698372.0000022481D4C000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:3
                                                                                Start time:16:10:58
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\WerFault.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 7416 -s 1700
                                                                                Imagebase:0x7ff6a2240000
                                                                                File size:570'736 bytes
                                                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Reset < >
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bcc69f9846b2dd43be3a5e055290f5e2e91d069f25c0960eb6f5f1c3bc6af431
                                                                                  • Instruction ID: d715d678ea1177b5dc9d74fcdda19a6622a4bf7717b97aca3f55c532ae80fdde
                                                                                  • Opcode Fuzzy Hash: bcc69f9846b2dd43be3a5e055290f5e2e91d069f25c0960eb6f5f1c3bc6af431
                                                                                  • Instruction Fuzzy Hash: A802C870E09A1D8FDBA4DF68C8A57ECB7B1EF59301F5101A9D04DE36A5DA35AA81CF00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a6a48df1bf21ec5132bbfcb7d420bd072feb8258490f9fcffbbc272c7b7b78d3
                                                                                  • Instruction ID: 066b1ebc4968f6cc0437afa21a3f037b2045b1bb95587a6a8c2fc8c65598aacf
                                                                                  • Opcode Fuzzy Hash: a6a48df1bf21ec5132bbfcb7d420bd072feb8258490f9fcffbbc272c7b7b78d3
                                                                                  • Instruction Fuzzy Hash: 6BB10C70E08A1D8FDB94DF58C895BADB7B1FF69300F5141AAD00DE72A6DA349D81CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 04df387a3aae0990a480409d8e659859f8aa0b96e49fee3979f26f3673c70407
                                                                                  • Instruction ID: 79589de543354af18642eec9c180fc363b970d4419a4d9294e7f726e1a9894c0
                                                                                  • Opcode Fuzzy Hash: 04df387a3aae0990a480409d8e659859f8aa0b96e49fee3979f26f3673c70407
                                                                                  • Instruction Fuzzy Hash: 4A71AC70E0961D8FDB68DF58C450AE9BBF1FF59300F1542A9D01DE72A5CB38AA81CB85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0b43cd9ec6cb9e45fe7754b8f6132331b866b6268ef94cd3552737568a600c0d
                                                                                  • Instruction ID: a036f87b5679bd91d242382938be336a2c841f59eff71417bb91fd2b492d98cc
                                                                                  • Opcode Fuzzy Hash: 0b43cd9ec6cb9e45fe7754b8f6132331b866b6268ef94cd3552737568a600c0d
                                                                                  • Instruction Fuzzy Hash: 2241D371E0960D8FDB55DF58C4A26FD7BF1FF6A304F4212A5D009D71F2CA29AA418B10
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: I9^H$^
                                                                                  • API String ID: 0-499390796
                                                                                  • Opcode ID: 60ede3b9eb45c25e393040df7850ebf792941e6951075e6d7d753380b32f594f
                                                                                  • Instruction ID: b6d64b715b20b2feb119ccafa67bd7993f3081fc428d1c19f856bfa140e21aaf
                                                                                  • Opcode Fuzzy Hash: 60ede3b9eb45c25e393040df7850ebf792941e6951075e6d7d753380b32f594f
                                                                                  • Instruction Fuzzy Hash: 93B2FDB0E1965D8FDBA9DB18C895BA8B7B1FF69304F5101E9D00DE72A1CA356E80CF11
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0N_^
                                                                                  • API String ID: 0-446413343
                                                                                  • Opcode ID: 5640f560fc75f9d246f66e63d794f729c3d9c232d1738837e9419790a4541bca
                                                                                  • Instruction ID: 485e32fc1808a1cc9886e9b0327cd141041461d709078b420cb07eabf7702051
                                                                                  • Opcode Fuzzy Hash: 5640f560fc75f9d246f66e63d794f729c3d9c232d1738837e9419790a4541bca
                                                                                  • Instruction Fuzzy Hash: 5FF13972E096894FE745EB6C84A6AED7BB0FF65304F4541F6D04CCB2EBCD2869428B11
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: "M_^
                                                                                  • API String ID: 0-3805125458
                                                                                  • Opcode ID: 9e8895c4150556bd27bb09e55715f059a2e56932c904dfc7111d32209b72deae
                                                                                  • Instruction ID: 30fd11494bffa608a72c707500d38f76bc6d2a9157b5db4dc23d5fec4310b5f9
                                                                                  • Opcode Fuzzy Hash: 9e8895c4150556bd27bb09e55715f059a2e56932c904dfc7111d32209b72deae
                                                                                  • Instruction Fuzzy Hash: 73F17070E0865D8FDB94EF98C895BEDB7B1FFA9301F5142E6D00CD72A6CA345A818B40
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: b<]I
                                                                                  • API String ID: 0-2635015757
                                                                                  • Opcode ID: 3b70d9ebc4805ed7f8c4a28109f883e525d9350e8a37ffca93089089ce8bc854
                                                                                  • Instruction ID: fc6733c81c94787c2f663d7be7200915af322a9f90b6001dd86252203f48e1aa
                                                                                  • Opcode Fuzzy Hash: 3b70d9ebc4805ed7f8c4a28109f883e525d9350e8a37ffca93089089ce8bc854
                                                                                  • Instruction Fuzzy Hash: F851D171E0E68D8FEB54DBA8C8A56BCBFB0FF55300F44017AD058A71E6DA386A45CB41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 762d6664e071281829d49f1cd5f200b7b2409f64efdfa950dcfbf97949d1c317
                                                                                  • Instruction ID: b36964c9f1ebf112e75f2aacc2a799cac95a726d86c7b81de14884dbb6e9b20d
                                                                                  • Opcode Fuzzy Hash: 762d6664e071281829d49f1cd5f200b7b2409f64efdfa950dcfbf97949d1c317
                                                                                  • Instruction Fuzzy Hash: D6126F71F0961D8FDB68EF68C4A5AADB7B1FF58304F1042B9D01DD72A6DA34A941CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 93be52d0cc91ddd26f322376b0a82085b4a8711a21b98d36cee3dd8c7a05262a
                                                                                  • Instruction ID: 9d3f69c5808b7b6dfca069eb5bc924301030113fd1507754d26707fab8096aa6
                                                                                  • Opcode Fuzzy Hash: 93be52d0cc91ddd26f322376b0a82085b4a8711a21b98d36cee3dd8c7a05262a
                                                                                  • Instruction Fuzzy Hash: 0E12FA70E0961D8FDBA4EB58C895BEDBBB1FF58301F5141AAD00DE32A1DA346A85CF50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 03585825d9649061c197f7dc9bb22e8caa9a242ec0a07537fdc46e994ea9825b
                                                                                  • Instruction ID: 74f37441e368e6fc782ca8401179f6473057ab2226776b0f2519296545b91861
                                                                                  • Opcode Fuzzy Hash: 03585825d9649061c197f7dc9bb22e8caa9a242ec0a07537fdc46e994ea9825b
                                                                                  • Instruction Fuzzy Hash: 7402E970E0861D8FDB95DF58C895BE9B7B1FF69300F5141AAD00DE72A6CA34AE81CB11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fbadd9edc644dff06bff6cbdc5ced1a60c0650a75414e8445ed0254b16bc0518
                                                                                  • Instruction ID: c06a00c689a619598660e137610b4478c53bd9239ce58e4ca983900c245729be
                                                                                  • Opcode Fuzzy Hash: fbadd9edc644dff06bff6cbdc5ced1a60c0650a75414e8445ed0254b16bc0518
                                                                                  • Instruction Fuzzy Hash: FAD11853B0FBC90AE32562AC28751BD7F92EF8636475943FFD09C470FBAC06690A4285
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 71dcc469e735839f71f3b487e7283127b477e7d8ad0c8bedd95e7c3b467041d2
                                                                                  • Instruction ID: 87bf96255b67d790842ce6a8a2d8bcd24f5fc72a899c0d1342b8a510e3342486
                                                                                  • Opcode Fuzzy Hash: 71dcc469e735839f71f3b487e7283127b477e7d8ad0c8bedd95e7c3b467041d2
                                                                                  • Instruction Fuzzy Hash: BAD13953B0F6C90AE32566AC6C751BD7FA2EF8236571943FFD09C470FBAC06690A4285
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 376b00776f9d95071ccd37492c444715c95970ab1feb3eae9d83d6d1e3d61b56
                                                                                  • Instruction ID: 20c9208e3413dcd6e569e9ed25299102ff3181d06a3bf3484d78e42ab0807c42
                                                                                  • Opcode Fuzzy Hash: 376b00776f9d95071ccd37492c444715c95970ab1feb3eae9d83d6d1e3d61b56
                                                                                  • Instruction Fuzzy Hash: 8AE11971E086894FE745EB6C88A6AEDBBB1FF65304F4541F6D04CCB2EBCD2869418B11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e065f3d66984c0035978cf03c778fd3cbfb9b46acf12b92bc39d4c27483a7527
                                                                                  • Instruction ID: c992a829888e79b98b84e3aed558b192dd50f3b5af1fb4b6990cf7f03fbf0a07
                                                                                  • Opcode Fuzzy Hash: e065f3d66984c0035978cf03c778fd3cbfb9b46acf12b92bc39d4c27483a7527
                                                                                  • Instruction Fuzzy Hash: 9EE1E8B1E086894FD755EB6C88A5AEDBBB1FF65304F4541F6D00CCB2EBCD2869418B11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e8d5473b28ac73857f18ed823eb587994b4c5d5b0010349f459d18746e0dff08
                                                                                  • Instruction ID: 544a44b3c22afeb71324bde2aa6cd5ba3fcb7b3c7178f7c07933b5f6d96f5a0c
                                                                                  • Opcode Fuzzy Hash: e8d5473b28ac73857f18ed823eb587994b4c5d5b0010349f459d18746e0dff08
                                                                                  • Instruction Fuzzy Hash: 07E12071E0965D8FDBA4DF5888657ACBBB1FF59300F0102BAD04DE72B5DA356A84CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 83aa48cde0aae7eebfbb8467a4f9239a3b94fe1bf6cc4b23a0a9f0dea2444a6a
                                                                                  • Instruction ID: c5e93defc88fe93dcfbcee88012aa59699feb9b1b7e2f69e90a76463db032f8c
                                                                                  • Opcode Fuzzy Hash: 83aa48cde0aae7eebfbb8467a4f9239a3b94fe1bf6cc4b23a0a9f0dea2444a6a
                                                                                  • Instruction Fuzzy Hash: AEE10871E0961D8FDBA4DBA8D8597EDB7B1FF59300F5102BAD00DE32B1DA346A858B40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 87033285e6a607adb1c197ec52cdab5ad9b9bf72796d97d858a90be4cbda0986
                                                                                  • Instruction ID: 3f3b2f3ae165549b2bc3660aa4620b6d0ab9fe93eefd964ca5be2e239f8416b6
                                                                                  • Opcode Fuzzy Hash: 87033285e6a607adb1c197ec52cdab5ad9b9bf72796d97d858a90be4cbda0986
                                                                                  • Instruction Fuzzy Hash: 1ED1E9B1E1864D8FD745EB6C88A5AE9BBB1FF69304F4501F6D00CD72E7CD2869418B11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c572f81c803c15e6726ff248b6b710aa6b4679616eb3270a9f870205edf4faae
                                                                                  • Instruction ID: 61da556d8346fe310d0f083a7a4890ff47c1d79bd311b98dc29f6e270e09f83f
                                                                                  • Opcode Fuzzy Hash: c572f81c803c15e6726ff248b6b710aa6b4679616eb3270a9f870205edf4faae
                                                                                  • Instruction Fuzzy Hash: D1C1F530E0964D8FDBA4DF68C494AE9B7F1FF59310F1542BAD008DB2B6DA34A941CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9014de9c5de3d35486c47b06e012e3056be4d2734d0cbf19ade81b933a9d3368
                                                                                  • Instruction ID: d9bbf7ac5d711ce23426959985aa585437739476208e6198465f6e4ad17259bd
                                                                                  • Opcode Fuzzy Hash: 9014de9c5de3d35486c47b06e012e3056be4d2734d0cbf19ade81b933a9d3368
                                                                                  • Instruction Fuzzy Hash: 71C1D7B1E18A4D8FD745EB5888A5AE9BBB1FF69304F4501E6D00CD72EBCD28AD418B11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: da35a73580b304106e20fc3f3756f20de88211317f99977f484ee58b330b5efc
                                                                                  • Instruction ID: 1b2da1360c67c3b19acc33f598cb61d31547a0bd2fcb783aec03abb0008fc595
                                                                                  • Opcode Fuzzy Hash: da35a73580b304106e20fc3f3756f20de88211317f99977f484ee58b330b5efc
                                                                                  • Instruction Fuzzy Hash: E7C1D870E0961D8EDBA9DB58C8A5BEDB7B1FF58301F1141A9D00DE32B5CA345A81CF40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 34612e932587044fd6407ba65dcfd674677b147e3538eb6d7ad6810a7eb94857
                                                                                  • Instruction ID: 84a7a9b031ac4322eb2f7baf756dc5439458610db892a386159fc66744d51375
                                                                                  • Opcode Fuzzy Hash: 34612e932587044fd6407ba65dcfd674677b147e3538eb6d7ad6810a7eb94857
                                                                                  • Instruction Fuzzy Hash: A871F817B0F6C90AE321A6AC6C751FD7F61DF8632971A43FBD09C470F75C0A650A8281
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c20cbcc909bea2e9a3eb284cd257207271c14e7b7fcc646ea7adf8311ec7340a
                                                                                  • Instruction ID: 58d9affd4a9262965dff1bb8d87ca3ffcfa71becab874f67c099934d7a96a5f2
                                                                                  • Opcode Fuzzy Hash: c20cbcc909bea2e9a3eb284cd257207271c14e7b7fcc646ea7adf8311ec7340a
                                                                                  • Instruction Fuzzy Hash: CDA1B570E09A4D8FDB95EF58C894BA9B7B1FF69300F5101EAC00DD72A6CB35A981CB11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 92f318d326d1660b4675e52d2063447657e3a108676052276e57f279c20ffeb4
                                                                                  • Instruction ID: 6507eebc0b1c332bac62d57d574c0b7024f2737ee7f43fce6483ca30a6ffd6f8
                                                                                  • Opcode Fuzzy Hash: 92f318d326d1660b4675e52d2063447657e3a108676052276e57f279c20ffeb4
                                                                                  • Instruction Fuzzy Hash: 7671A034E09A4D8FDB94DF68C854AADBBB1FF99300F11027AD008E72B5DA34A9418B41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ec0f49ad1e065a2b21b9f705fd570dc1dbd01ff7e9b5cc4f5d94a74c64dbc8b8
                                                                                  • Instruction ID: c6cc18209bdcd01ea5fcc61fe974850eb50a63f14c8f84987fca0449ea4899f5
                                                                                  • Opcode Fuzzy Hash: ec0f49ad1e065a2b21b9f705fd570dc1dbd01ff7e9b5cc4f5d94a74c64dbc8b8
                                                                                  • Instruction Fuzzy Hash: 20814C70D0961D8FDBA9DBA8D8947ECBBB0FF55300F5141AAD04DE72B1CA385A86CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f6f46ddafb1fe06c9a486be5822c3b3aa6c74a5f21026f7d4f4d779431e716a2
                                                                                  • Instruction ID: 02a063f2126bcce36016457bbd6ab501e7ce28701dba558cbcc6c59e41df195f
                                                                                  • Opcode Fuzzy Hash: f6f46ddafb1fe06c9a486be5822c3b3aa6c74a5f21026f7d4f4d779431e716a2
                                                                                  • Instruction Fuzzy Hash: 12718071E0AB4D8FDB64DAA494A16EDBBB1EF55300F0102BAD00DE72B1DB386A45CB51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3836b41f38d4f9f172abdb1a86b65a9f2338951cfd54a56ef1dbba6d66ae948d
                                                                                  • Instruction ID: fa9b327397325e1c3d4cdd4670316b5108b80067cac67584c3d12641a3f08e1d
                                                                                  • Opcode Fuzzy Hash: 3836b41f38d4f9f172abdb1a86b65a9f2338951cfd54a56ef1dbba6d66ae948d
                                                                                  • Instruction Fuzzy Hash: 17815230E0A61D8FDB65DB98C860BEDB7B1EF59300F1142F9D04DE72A1DA756A85CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fe9c306535c7f2973506e3d2444e500a97f269779b449b53dbf7cd0120a8808f
                                                                                  • Instruction ID: ddcf082df4db364ed68b7efd9b8370046ac7c3b7619a063982f9f5641485437f
                                                                                  • Opcode Fuzzy Hash: fe9c306535c7f2973506e3d2444e500a97f269779b449b53dbf7cd0120a8808f
                                                                                  • Instruction Fuzzy Hash: 1871E971E09A1D8FDB98DF98D895BEDBBB1FF59300F5001AAD00DE72A5CA346981CB41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d4cf55a8714a06bb8489af8698c96b9e49e45976b2639ecc140f5624dd1412e5
                                                                                  • Instruction ID: c633ac0888ca07038daa4ae6ea4e5d83a416161c0a24a44def4d04813aaae184
                                                                                  • Opcode Fuzzy Hash: d4cf55a8714a06bb8489af8698c96b9e49e45976b2639ecc140f5624dd1412e5
                                                                                  • Instruction Fuzzy Hash: E751F857B0F6C90AE325A6AC7C751BD7F51EF8632470A03FBE09C470FB9C16650A8286
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ba046b049201c37fee6f18af8cd7c9302e6180aca7d369aede389ae2cc657ac1
                                                                                  • Instruction ID: 267e7700fbf3fda002093c535b3e605a3fb9937b25229310353486c632ee1a25
                                                                                  • Opcode Fuzzy Hash: ba046b049201c37fee6f18af8cd7c9302e6180aca7d369aede389ae2cc657ac1
                                                                                  • Instruction Fuzzy Hash: B651F857B0F6C90AE32566AC6C651AD7F51DF8632571A03FBE09C470FB9C06650A8282
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 76f00705baa3de0d1d17e3f5ed9d0e4b4d2e16160e145e9c658ceaa428a3a406
                                                                                  • Instruction ID: fec4c8488fa5fcd9edbc9eda0083f015a55e487c50124fe3814b5e7382a8edb2
                                                                                  • Opcode Fuzzy Hash: 76f00705baa3de0d1d17e3f5ed9d0e4b4d2e16160e145e9c658ceaa428a3a406
                                                                                  • Instruction Fuzzy Hash: 3051E352B0F7C60FE72657A858372A87FA0EF62264B5A01F7C0D8874F3D9196A1AC351
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b0ef4e808454be1b4bd34feeaff99c0959913e5936f873a923447b11d08e594b
                                                                                  • Instruction ID: 0e2136625435b327ddd8a4d0c85bf0d8e34090cc50955ad202050f135e6c8983
                                                                                  • Opcode Fuzzy Hash: b0ef4e808454be1b4bd34feeaff99c0959913e5936f873a923447b11d08e594b
                                                                                  • Instruction Fuzzy Hash: DA515D71E09A5D8FEBA4DFA888697AC7AF1FF59304F111169D04DE32B1DE346A40CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 539b0e132eec2f803ff58c3f0f12b5d7780aff185eb6cf5eeb95fe86ebb21d91
                                                                                  • Instruction ID: b1db1e5147065f0d963ef7a126be1a77a0e59b3dcd75d7b23e160845367b05e0
                                                                                  • Opcode Fuzzy Hash: 539b0e132eec2f803ff58c3f0f12b5d7780aff185eb6cf5eeb95fe86ebb21d91
                                                                                  • Instruction Fuzzy Hash: 24516D70E0964DCFDB91EF68C895AEDBBB1FF6A300F1101A6D019D72A6CA359D41CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7bbd7e33c34ca75fe7c64e7142ebaa77536711bc6d05099bc0d3491a687e2983
                                                                                  • Instruction ID: 24f7ce17a62dfbc2e7a3f27efd61c455c803a1c76ccb86231401ff48789939a6
                                                                                  • Opcode Fuzzy Hash: 7bbd7e33c34ca75fe7c64e7142ebaa77536711bc6d05099bc0d3491a687e2983
                                                                                  • Instruction Fuzzy Hash: 35518E70E08A4D8FDB94DF58C894AEDBBB1FF99300F5501AAD009E72A6DB34A941CB51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 642371167c83688d506afef6de6d222c0b10bbba2a80e4a31e71373577cc2cb9
                                                                                  • Instruction ID: 7d24206aa10dedba25b2cd7679dc8d15c227f34681a60c5b9dbe2f772bc302a1
                                                                                  • Opcode Fuzzy Hash: 642371167c83688d506afef6de6d222c0b10bbba2a80e4a31e71373577cc2cb9
                                                                                  • Instruction Fuzzy Hash: 1651D471D0974D8FDB91DF68C895AE9BBB1FF6A300F0501A6D018D72A6CA399942CB11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 32fcb9a1a637b7e8e84771cfbeeb570a713e2d2ded9004139d98d082544673d0
                                                                                  • Instruction ID: 9a19b10b39a96586eba64ae91db9d2c65d9eeefec40eeea664dbdad6aec7ee11
                                                                                  • Opcode Fuzzy Hash: 32fcb9a1a637b7e8e84771cfbeeb570a713e2d2ded9004139d98d082544673d0
                                                                                  • Instruction Fuzzy Hash: F6518170E08A4D8FDF94DF58C494AADBBB1FF99300F15416AD00DE72A6CB34A941CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 69c81be4234167da8d5ad2df46ddc31e7d42bb6e4e0df3b35c025b8edb7e5436
                                                                                  • Instruction ID: 60363cfd7d38fe6eefd066a4eed0ae052de45c5dc13eefebb1ab55d6ec67e1f5
                                                                                  • Opcode Fuzzy Hash: 69c81be4234167da8d5ad2df46ddc31e7d42bb6e4e0df3b35c025b8edb7e5436
                                                                                  • Instruction Fuzzy Hash: 67517F70E08A4D8FDF94EF58C494AADBBB1FF59300F55416AD00DE72A6CB34A941CB51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e03e170b9fbc65dc72071ef2ed8435cefc67ea4c43e3831847c477bb68096b2f
                                                                                  • Instruction ID: 68681c5645057be57e3c482acb2e4b444cb738d582932c6a44b5e813eb0bb6af
                                                                                  • Opcode Fuzzy Hash: e03e170b9fbc65dc72071ef2ed8435cefc67ea4c43e3831847c477bb68096b2f
                                                                                  • Instruction Fuzzy Hash: 79518170E08A4D8FDB94DF58C494AEDBBB1FF59300F5505AAD00DE72A6CB34A981CB51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8e7826be474dcafb6e5f6d75648e36e6fa41d7c7bf4ecc798a1ea0dda9fd661d
                                                                                  • Instruction ID: 474714bd48216c5b04155845ad9778f496946a72c5c893f23c974ce8bcf8e4a3
                                                                                  • Opcode Fuzzy Hash: 8e7826be474dcafb6e5f6d75648e36e6fa41d7c7bf4ecc798a1ea0dda9fd661d
                                                                                  • Instruction Fuzzy Hash: 62519E71E09A5D8FEBA4DF1888657E9B7B0EF69301F4100EAC008E72A1CA342E81CF01
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a195088337b274799f5561e6e0da73be753fe179533e93270c9dfa03fe60f15a
                                                                                  • Instruction ID: 4920a7c5c7f4311ebd417acc3b58e099828dfd73c913eeeb7fa77578a225c2d1
                                                                                  • Opcode Fuzzy Hash: a195088337b274799f5561e6e0da73be753fe179533e93270c9dfa03fe60f15a
                                                                                  • Instruction Fuzzy Hash: DE41493170DB8D0FDB55EB2C9C659667BE1EF96310B0502AEE44CC32A7DD25E9438385
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 29e0d22818d7131c810409bf258601526fa05b40c6a9356c8b5bb70bbe55cf35
                                                                                  • Instruction ID: dea96a8ce66db6ce569a9aa0e0820ce4712ed90acda20855fe542322d01bdf85
                                                                                  • Opcode Fuzzy Hash: 29e0d22818d7131c810409bf258601526fa05b40c6a9356c8b5bb70bbe55cf35
                                                                                  • Instruction Fuzzy Hash: 9451E470E0978D8FDB91DF68C895AE9BBB1FF5A300F0501A6D018D72B6DA399D42CB11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2ef294eb53a342962e512343869cb2ec876cee74b8fbea657ff81a7ab056e534
                                                                                  • Instruction ID: 53901f4336a0c6768dad34c3034a414e042fab6e1a278d1fac8efa1c8aef9138
                                                                                  • Opcode Fuzzy Hash: 2ef294eb53a342962e512343869cb2ec876cee74b8fbea657ff81a7ab056e534
                                                                                  • Instruction Fuzzy Hash: 75512C70E0861D8FDBA4DF98D895AEDBBF1FF58300F51416AD01DE72AACA346981CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 57f2d2a8543b2073f247b3e0844abe4d807666f6aa895a5edaef41a5b42c967b
                                                                                  • Instruction ID: 96e9f3d19ba97626ed6ffbb6e54ce25c779b97dede1f012b6b33aaae696098f8
                                                                                  • Opcode Fuzzy Hash: 57f2d2a8543b2073f247b3e0844abe4d807666f6aa895a5edaef41a5b42c967b
                                                                                  • Instruction Fuzzy Hash: 1C518071E0974CCFDB95EF68C895AA9BBB1FF6A300F0501A6D018D72A6CB389D41CB51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 373c87614b885483021916ee549f419c72481bba930a8789ca60e1969a688602
                                                                                  • Instruction ID: c82162f645f7fc9969b7a004210aca0d46a727415ec358ddc596ca9183ba5518
                                                                                  • Opcode Fuzzy Hash: 373c87614b885483021916ee549f419c72481bba930a8789ca60e1969a688602
                                                                                  • Instruction Fuzzy Hash: 2E412332E0966E4FD721EB6898696ED7BB0EF41318F0902B7D00DCB1A3CE285A45C740
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3582c01ee5887c5ab6a78c72c61401f567107a4855ce8741e402a5729630ac4d
                                                                                  • Instruction ID: 3045ddfc56e77133042b9d266ab44d2b18125d2a00e9fa0f05618eae4857c458
                                                                                  • Opcode Fuzzy Hash: 3582c01ee5887c5ab6a78c72c61401f567107a4855ce8741e402a5729630ac4d
                                                                                  • Instruction Fuzzy Hash: 0F418570A19A8D8FDB88DF98D865AEDBBF1FF59300F00017AE419D72A6CA34A951C740
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0ed391d27ce8e3c5de3b377666924c6070195cfcb62b53a4a17678fc57e5b467
                                                                                  • Instruction ID: afa9fdb1421b895a4a90ded866c4a2ba83c4f55c125d06ad0c9e71860ba787d6
                                                                                  • Opcode Fuzzy Hash: 0ed391d27ce8e3c5de3b377666924c6070195cfcb62b53a4a17678fc57e5b467
                                                                                  • Instruction Fuzzy Hash: 9941A071E0860D8FDB90EF98C494AEDBBF1FF99300F4141A9C018E72A6CA38A941CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 13761fde4bc80b02fab355e9b8df71c0b543c64fbac174013cb54e2c10406b8f
                                                                                  • Instruction ID: e82c3a736ed1bfd17bfd0a449d1856db7335fe495c42c42713a9fa0213fff3a2
                                                                                  • Opcode Fuzzy Hash: 13761fde4bc80b02fab355e9b8df71c0b543c64fbac174013cb54e2c10406b8f
                                                                                  • Instruction Fuzzy Hash: 7041C271E0964D8FDB45DFA8C8A5AECBFF1FF5A300F0501AAD009D72B6CA286941CB11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ea8bd385bc163ea98d13676a82b380c063270cbd2aee5be238a6f7e12cce78df
                                                                                  • Instruction ID: 24b44f68c4b96890bcf92ae1c227d84e6e1431a08cf950283d340d668263fe57
                                                                                  • Opcode Fuzzy Hash: ea8bd385bc163ea98d13676a82b380c063270cbd2aee5be238a6f7e12cce78df
                                                                                  • Instruction Fuzzy Hash: 0341247184E68D8FD7269B606C624E6BBB4DF02324F0702E7D00CDB4B2D62D5796CB61
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 29ef5879cf829bf8d9a9152f6f3c4b1cd5884a63e071dfc68d62b33d93c14da6
                                                                                  • Instruction ID: 7bb900a3deae017709508f5a8a415a2695ceb71f54b5318fe55b073670ebc1d6
                                                                                  • Opcode Fuzzy Hash: 29ef5879cf829bf8d9a9152f6f3c4b1cd5884a63e071dfc68d62b33d93c14da6
                                                                                  • Instruction Fuzzy Hash: 7541C021E0B69E4FE712E6A8D8725FDBBB1EF46300F8615B9D059971F3CD652E008710
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4a2ff8911c096641a13f4340ca974f0cf1de11b7bd015a37b2fd757e6f622c34
                                                                                  • Instruction ID: 1b5ecd8096421a9e11d9893d5e424fea68b0b83bc94fa84d4d91244ca910b1aa
                                                                                  • Opcode Fuzzy Hash: 4a2ff8911c096641a13f4340ca974f0cf1de11b7bd015a37b2fd757e6f622c34
                                                                                  • Instruction Fuzzy Hash: 83414A72E0A61D8FDBA4DBA8D4996FDBBB1FF55300F41026AD009E72B1DA346A45CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c2510733c5dec4411f8cd348fcf0a8f47dc90ed1ba293419767bc6357a93ad56
                                                                                  • Instruction ID: 55c9767a839626d1dad17eeef8c6b1710784ac0c0022ae7f6d3b1283dcb28a4a
                                                                                  • Opcode Fuzzy Hash: c2510733c5dec4411f8cd348fcf0a8f47dc90ed1ba293419767bc6357a93ad56
                                                                                  • Instruction Fuzzy Hash: A3412671E0961D8FDB94EFA8C858AFDB7B1EF58301F41017AE009E32A5CA346A85CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 53f0f384165878ccd28939459216eb0fe56a7200069301893b7c559f3a9eb908
                                                                                  • Instruction ID: dbeed5e7aa050e0ea1f832d0628769d3fe25c7ee31780fee6f07d8823d2a0825
                                                                                  • Opcode Fuzzy Hash: 53f0f384165878ccd28939459216eb0fe56a7200069301893b7c559f3a9eb908
                                                                                  • Instruction Fuzzy Hash: 0E41C272A0EB4D4FEB64DA9898583AD7BA1FF59340F4102BAD048D31B6EA346B458B40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3fc9ff83bc9634b3702357126f11e92c6208dee8521dc7d75b4de9f3f90f510a
                                                                                  • Instruction ID: 492d073a5f220f57af2f008974405e2bd5e3f286e6dd33b60f4f01f1d7cd264b
                                                                                  • Opcode Fuzzy Hash: 3fc9ff83bc9634b3702357126f11e92c6208dee8521dc7d75b4de9f3f90f510a
                                                                                  • Instruction Fuzzy Hash: F831CE21E0F69E4FD712E6A8D8725FDB771EF42300F8606B9D059971F3CD252A008310
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5ff7921fb1164bfad1048dbd684360cf16871014a64756107523e946f130a2f6
                                                                                  • Instruction ID: 394388e2cd8a99ff110d10ba1a3b91f0370f0d20186158972e5dbe40c3c1b675
                                                                                  • Opcode Fuzzy Hash: 5ff7921fb1164bfad1048dbd684360cf16871014a64756107523e946f130a2f6
                                                                                  • Instruction Fuzzy Hash: 3C41E870E08A1D8FDF94EF98C494AEDBBB1FF69300F154169D009E72A5DB34A981CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d81077da3a18cc6d47cbccfe581bc67e230a46eae8eb7dad3b0fcd42d2c3a17b
                                                                                  • Instruction ID: 30b10604016e4a755653bb1e970323783820a9d0da0151c09e0001b09a6897a1
                                                                                  • Opcode Fuzzy Hash: d81077da3a18cc6d47cbccfe581bc67e230a46eae8eb7dad3b0fcd42d2c3a17b
                                                                                  • Instruction Fuzzy Hash: 6A31B072E0EB4D4FEBA4DA5898583ADBBA1FF59340F4102BAD00CD31B2DA346B458B40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8d7fe9e5ee2a9fc1e4ff533762bc69c82a809ebe5c45ed75792e0e1110b48daf
                                                                                  • Instruction ID: 1a53a642c9dea0280fff9769f6f445480c958c09bbc14ee3f0f34be7c708cd0e
                                                                                  • Opcode Fuzzy Hash: 8d7fe9e5ee2a9fc1e4ff533762bc69c82a809ebe5c45ed75792e0e1110b48daf
                                                                                  • Instruction Fuzzy Hash: EB310676E0E64D8FEF76DEA488602FDB7A1FF55300F420279D05D92171DE35AA868710
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 15d5399466079b0b1c7cd0a06f4a240b902a83564ff6947b91634ba2fb19567f
                                                                                  • Instruction ID: 734a840e0d972dc337cfac3af7550119393f0b53b135ef640aef6c7fb6ce080b
                                                                                  • Opcode Fuzzy Hash: 15d5399466079b0b1c7cd0a06f4a240b902a83564ff6947b91634ba2fb19567f
                                                                                  • Instruction Fuzzy Hash: 3831C131E0AA4DAFDB50EB6CD8696F97BB0FF56310F0602B6D008D71B2CA2469058750
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cf5f7873d5819a0d5e11e1f5efaf03ed5415f826e7b79b9304032f84798973a7
                                                                                  • Instruction ID: 66e9eb9dc252d2e08744df7aab560dbc33fb6bc489af19ffa8256bd69093d0cc
                                                                                  • Opcode Fuzzy Hash: cf5f7873d5819a0d5e11e1f5efaf03ed5415f826e7b79b9304032f84798973a7
                                                                                  • Instruction Fuzzy Hash: EC318D21E0F69E4FDB66E6A8D8625FDB771EF46300F821AB9D019971F3CD652E008710
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 13e9d0f6d80a63255355bc2a34243c71d61a567871281f827a9aa612c69d69c8
                                                                                  • Instruction ID: b2b5539614edd803ec712ebf5ab12ce23964bf8028ded67ba188d0050b1cdf53
                                                                                  • Opcode Fuzzy Hash: 13e9d0f6d80a63255355bc2a34243c71d61a567871281f827a9aa612c69d69c8
                                                                                  • Instruction Fuzzy Hash: F9317035E0E25E8EDB74DE64D8617FD77B0EF55300F1142B9D04E962B5CE386A848B41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f3ae5d0f53e3e2c8bf939130e887df2ffff3fc8d9f68870f70e35a07b166b111
                                                                                  • Instruction ID: 102053b63eaf89e5156bc46acb5ba7ae5999aac0c3d0eade7a9b3348f12423fd
                                                                                  • Opcode Fuzzy Hash: f3ae5d0f53e3e2c8bf939130e887df2ffff3fc8d9f68870f70e35a07b166b111
                                                                                  • Instruction Fuzzy Hash: 8D31F432B0E6AD8EDB25DB58D8317FD7B70EF46311F0102BAC049A60B2DA346A458B80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 60d675f15a2c495bfbf5321a72b81ed33fd6506c10858ca10a014fa4841678a9
                                                                                  • Instruction ID: 198c5d3b457db436191acaa6c4128953ea147aab88b19ca2b8387d6b482cb501
                                                                                  • Opcode Fuzzy Hash: 60d675f15a2c495bfbf5321a72b81ed33fd6506c10858ca10a014fa4841678a9
                                                                                  • Instruction Fuzzy Hash: 7B31C031E0965D8FDB64DF68D8556FD7BB1FF99300F0602A6D40CE31B2CA386A418B41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5e2bd20f5c69dd51c6ceff106f57738e28c7fda65231753b840a37e5e2befcd3
                                                                                  • Instruction ID: 6cf61e81cd620df009dffef2d457962de94e5685979a9b5eed5fb5630ebeb4cc
                                                                                  • Opcode Fuzzy Hash: 5e2bd20f5c69dd51c6ceff106f57738e28c7fda65231753b840a37e5e2befcd3
                                                                                  • Instruction Fuzzy Hash: D6314652A0FBC95FE7619BB948760A97BA0EFA2204F0A01FBD098C74F7E9156A45C341
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4b326c3438d49d44fd5b02b4dce0664bd4715368dd31c4e6bad0d4576253f58a
                                                                                  • Instruction ID: 19435424b4319853d1ba987f4c8e8444aeff9fe24529f2a3f599a242884310ff
                                                                                  • Opcode Fuzzy Hash: 4b326c3438d49d44fd5b02b4dce0664bd4715368dd31c4e6bad0d4576253f58a
                                                                                  • Instruction Fuzzy Hash: 94310471D097898FD342DB6484A6AD5BFF0FF6B304B4604D6D048CB1A3C62D9A46CB21
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: adc0f7a2e398c1ca24d06d3adc6056e9588d31491f2ee31bd13262757eac8ef3
                                                                                  • Instruction ID: 4fc795fa5c9e8173ba1a998cdca19c3b49acebaed0f7f1adaa0b1dac88248232
                                                                                  • Opcode Fuzzy Hash: adc0f7a2e398c1ca24d06d3adc6056e9588d31491f2ee31bd13262757eac8ef3
                                                                                  • Instruction Fuzzy Hash: 22218D31E0965D8FDBA4DF58D8546EDB7B1EF9A310F1502BAD00CE32B6CA346A818B51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b0bebc80f84122ad0f79621cbcfa43ae745b2453819396c6e62fec83de13f2e5
                                                                                  • Instruction ID: 19310fd7ddcb9b990715c795c23f30512c701eab71f4e2f4b63843a7b2b5e5f4
                                                                                  • Opcode Fuzzy Hash: b0bebc80f84122ad0f79621cbcfa43ae745b2453819396c6e62fec83de13f2e5
                                                                                  • Instruction Fuzzy Hash: AB31F732E0E65D8AEB31EA68D4217FD7770EF41305F4146F6D04DA61F2CE386A858A80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 579301ddbbc57ec131bb8d09c67562d57e4a3221722468c2e6f1e40282cb9076
                                                                                  • Instruction ID: 35a7640e7746bacc76bd533c20a66b139f0c770c79f07b04e78a86a80a4c050e
                                                                                  • Opcode Fuzzy Hash: 579301ddbbc57ec131bb8d09c67562d57e4a3221722468c2e6f1e40282cb9076
                                                                                  • Instruction Fuzzy Hash: C3316F35E0A71D8EEB74DAA4D4616FDB770EF44300F4102BAD45EA61B5DE382A89CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0271aa9f4301597293910fbe326f200a0574739469ff426be465d4367ab310a1
                                                                                  • Instruction ID: 956b0dc722539bfd4ef35efe4f85ba85eb6b63c51e79601ffd30c2ee41bdbbf3
                                                                                  • Opcode Fuzzy Hash: 0271aa9f4301597293910fbe326f200a0574739469ff426be465d4367ab310a1
                                                                                  • Instruction Fuzzy Hash: 7A217331A0E79D8EEB719B6488217E977B4EF46300F4206F6D44DE71B2CA786B458B81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 215cb284fd808d780941bb9737f7e33bcf600063772b06e31c3ade9a0e27ed56
                                                                                  • Instruction ID: 92fc6bebcd5a8485599b4a5df48807b0e7ca08e02a1957a7ec53e26fe7de87ce
                                                                                  • Opcode Fuzzy Hash: 215cb284fd808d780941bb9737f7e33bcf600063772b06e31c3ade9a0e27ed56
                                                                                  • Instruction Fuzzy Hash: D9311C70E1661D8FDBA8DB94D8A47A8B7B1FF54301F5141B9D40DE72F1CA346A86CB10
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7b55dcd3f60fca65f74595aaad694eea146117d3a7c0cf4f02e1d70639e0f24c
                                                                                  • Instruction ID: d8ba1ffbaadf87646ac22fdb088bf84a5927e461546b0ff3d3bf7fb433aefeb4
                                                                                  • Opcode Fuzzy Hash: 7b55dcd3f60fca65f74595aaad694eea146117d3a7c0cf4f02e1d70639e0f24c
                                                                                  • Instruction Fuzzy Hash: E3210C71E0A61E8FEBA4DB58C8557E9B7B1FF55300F0102AAD01DE32B1DB355A85CB41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 906523fafe07035e3b4b72f56798d48c98e58e668391cef0589460987edaa381
                                                                                  • Instruction ID: a55d6f527e5af6956d7a3fa74e13d2ee1ca669408fd3fe319d815bda8154d6f2
                                                                                  • Opcode Fuzzy Hash: 906523fafe07035e3b4b72f56798d48c98e58e668391cef0589460987edaa381
                                                                                  • Instruction Fuzzy Hash: BF21E530B1960A4FDB55DBA8C0D59A577A1EF55310B6583B5E41CCB1FBD928ED82C3C0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4b07a9eca6d8baaaec415c4e3b27e26ffa6228d39e416ab9fdf71f775f42b1aa
                                                                                  • Instruction ID: e68853b937109985e4075b0d3aa3cb02d016494744cc90f53c5daab9476aa9e6
                                                                                  • Opcode Fuzzy Hash: 4b07a9eca6d8baaaec415c4e3b27e26ffa6228d39e416ab9fdf71f775f42b1aa
                                                                                  • Instruction Fuzzy Hash: 27215E35E0E71E8EEB75DAA8C4227FDB2A4AF45300F010679D05DA21B1DE746B458B81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5732e882d0bb84881201db6bdf724ba5f73ba03d4e5369a96ca0c648c7a16648
                                                                                  • Instruction ID: f1bc6af69c36e3ccff1376a42d7b9369c7f3f4599651364f1c8ce4a3ee8b4c2f
                                                                                  • Opcode Fuzzy Hash: 5732e882d0bb84881201db6bdf724ba5f73ba03d4e5369a96ca0c648c7a16648
                                                                                  • Instruction Fuzzy Hash: 8D112B6290E7C94FD766567418B65D17FA0DF56210B0B02E7D099CB1F3E90D69458312
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c5ef16cd8d0a38628be5cf51569839b17382eb4b6196daf8db692e81171beb6b
                                                                                  • Instruction ID: 749f0301a6bfdcdc36d6b635c7bdf2394d97acb5973712842bc93c45ba52bc77
                                                                                  • Opcode Fuzzy Hash: c5ef16cd8d0a38628be5cf51569839b17382eb4b6196daf8db692e81171beb6b
                                                                                  • Instruction Fuzzy Hash: 9D21D13190E78D8FD782EF64C865AAA7BF0EF5A300B4501EAD45CC71B2CA399A45C751
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fb310a499f04df0fa1ef1f007a0aa9c594118e62fceebfbebb966f163cfd7741
                                                                                  • Instruction ID: a9c91d272630fa35d9ee7691869efd1568e76d64f2e0ec3a6c864fc78b42129e
                                                                                  • Opcode Fuzzy Hash: fb310a499f04df0fa1ef1f007a0aa9c594118e62fceebfbebb966f163cfd7741
                                                                                  • Instruction Fuzzy Hash: 4B212C7188E3C55FD72717702C664E27F749E03225B0B42E7E4989A8B3C55D6296C372
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: befdce31dd30a471c1f28dd7c9d42733930119fbc7d3f19da9e50561290e405e
                                                                                  • Instruction ID: 6ad0cf47e4dc91e220921dd568f95b77f3fae6741db6191b1ab48cbc15391672
                                                                                  • Opcode Fuzzy Hash: befdce31dd30a471c1f28dd7c9d42733930119fbc7d3f19da9e50561290e405e
                                                                                  • Instruction Fuzzy Hash: 27217171E0864C8FEB95DF54D8A5BECBBB0FF69311F45016AD009E32E1CA385945CB11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2687599dc3e61a46d182d595a4c3617deff2d8c37e0c38605d2225474467df4d
                                                                                  • Instruction ID: fbfede049d76303cda03fd87001e9ad79ca3ae78e2d127e68a2ccb840c2c9768
                                                                                  • Opcode Fuzzy Hash: 2687599dc3e61a46d182d595a4c3617deff2d8c37e0c38605d2225474467df4d
                                                                                  • Instruction Fuzzy Hash: D7215E31E0AA5D8AEB75EA54C8207FEB3B4FF45300F4106B6D40EA61B5DE746B848B81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e6e3b49a2bc1ec60e7a9c86fd9ee80d031ccca25b38a285be543a9c50158a069
                                                                                  • Instruction ID: e70ba48f0d58a3bb425069e8fcb1d9485a0a6bd73fc25cd357e1007b764b1d65
                                                                                  • Opcode Fuzzy Hash: e6e3b49a2bc1ec60e7a9c86fd9ee80d031ccca25b38a285be543a9c50158a069
                                                                                  • Instruction Fuzzy Hash: 07213D31E0A65D8EEB75DE54C4213FDB3A1FF49300F4106B6D40EA61B1CA786B958A80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f0a9c71ae501d2f13ab7b793850918a5788493648f5a04a367925a9e01e3a3e4
                                                                                  • Instruction ID: 33cd572aad0c90dd7836ec9c7257faf7a5b0ae19ff95386e07edd96397615935
                                                                                  • Opcode Fuzzy Hash: f0a9c71ae501d2f13ab7b793850918a5788493648f5a04a367925a9e01e3a3e4
                                                                                  • Instruction Fuzzy Hash: C201C062E0E79D5EE751EBB898665E97BA0EF42208F0601F6D458C70F6DD242A49C350
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d39b4bbb5db49065920700b8bc336da4b3925065c795bf0bfbf02f9ba519d221
                                                                                  • Instruction ID: 33d2b1cd159c5e47c672f5ade61466f40362c2f177f94625d4249dba436e25f3
                                                                                  • Opcode Fuzzy Hash: d39b4bbb5db49065920700b8bc336da4b3925065c795bf0bfbf02f9ba519d221
                                                                                  • Instruction Fuzzy Hash: 7CF02812B0FB8A4ED7659669A8A05F8FB60EF92250B0507F7C099C61B6E90569864390
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6c025c46b787a889e304ec4025fb6fcc5d298cd1770a0726a5b620799b7f73db
                                                                                  • Instruction ID: 3e632b3186e1bad6d3d5af4503b0f908fb10cbe8a9c6b55b243846819cb5a6e4
                                                                                  • Opcode Fuzzy Hash: 6c025c46b787a889e304ec4025fb6fcc5d298cd1770a0726a5b620799b7f73db
                                                                                  • Instruction Fuzzy Hash: 0301269294E7C60FD367577428B24E1BFA09F53220B0A02EBD089CB5B3D40D1986C312
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 74aff854ebb6a4da1f902c7e37b905402df3207aea5177e90a5831cbf56a4cf1
                                                                                  • Instruction ID: 0622c5f550d434ec3809e78a526cee89202d9788fccec181e0142fe96fbd2954
                                                                                  • Opcode Fuzzy Hash: 74aff854ebb6a4da1f902c7e37b905402df3207aea5177e90a5831cbf56a4cf1
                                                                                  • Instruction Fuzzy Hash: F9F0AF20A0D68A0FD3499BAC98607D17ED1DFCA314F4901FAE588C72EBD89D58428352
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 006dd098581cdf594845e35af5b08595440da855fd5267a91aa302ac24371a21
                                                                                  • Instruction ID: e6b2e42e89255b699f27f6ed135c1ff4d5ccf1d35f646b9aef7aa3c08e85bcbe
                                                                                  • Opcode Fuzzy Hash: 006dd098581cdf594845e35af5b08595440da855fd5267a91aa302ac24371a21
                                                                                  • Instruction Fuzzy Hash: 9F01AD2099F3CA5ED72367B018365FA3F649F03314F0A06FAE49C8A4B3C91C2259C362
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: adbcf7559b6abda6089562c181b7150c4ae5253d1c24a44e9d0b85de2d1a5345
                                                                                  • Instruction ID: 3e8a1b40a24563b25282e451e643d07db80f7135627dda8ccc762f68c9da8d84
                                                                                  • Opcode Fuzzy Hash: adbcf7559b6abda6089562c181b7150c4ae5253d1c24a44e9d0b85de2d1a5345
                                                                                  • Instruction Fuzzy Hash: 5301DB35E0D3598FDB22CBA4C8626EC37B0AF06300F4601B5D05D971F3D9381A49CB41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 298e44d729c73418d9b93051db43ae0d5e42e3cfe497bbdf392aadb6690e6d18
                                                                                  • Instruction ID: 9514f6298edd803b7d7ffa7a5d10f13952b7c1179c6ed43fd22a8670ee1b3518
                                                                                  • Opcode Fuzzy Hash: 298e44d729c73418d9b93051db43ae0d5e42e3cfe497bbdf392aadb6690e6d18
                                                                                  • Instruction Fuzzy Hash: ECF0AFA159E3D10FD317477448269E5BFE09F43324F4E02EEE4C98B4A3C55D424AC392
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8b588842eb1cf3dbc125a8662c8adb06af633cbdd971f823c5b684ec269db9d7
                                                                                  • Instruction ID: 277dd8c4a64c777abc37b2879e54ea536986ff9e13ab1014b545a1a494ba69f1
                                                                                  • Opcode Fuzzy Hash: 8b588842eb1cf3dbc125a8662c8adb06af633cbdd971f823c5b684ec269db9d7
                                                                                  • Instruction Fuzzy Hash: A301F231E0D78D5ED701EBB488669ED7BB0EF45204F4101F6D408C70F6D9242A48C350
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 75c8b43b3a3638d31c3a01e1be8fdaf279049e8dd48bf8c5643906c8a6c6d256
                                                                                  • Instruction ID: d4bdd4e649be068d9430b5961d188e5ca5bf15765ab8fabb23a16d1291be2d1f
                                                                                  • Opcode Fuzzy Hash: 75c8b43b3a3638d31c3a01e1be8fdaf279049e8dd48bf8c5643906c8a6c6d256
                                                                                  • Instruction Fuzzy Hash: 4701A231D1978D8FD741EF2488686A97BB0FF56304F4501EBD40CCB1E6DA389955C711
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 10f300b8d5d2e2e3d7cbd5a8da4cdb3fb6a25c34d62d264d37aba43c4432ad35
                                                                                  • Instruction ID: 4d14d09700d99b9a298ad003859ad7cb37a81b8978408354cf861d4abdd8f7b7
                                                                                  • Opcode Fuzzy Hash: 10f300b8d5d2e2e3d7cbd5a8da4cdb3fb6a25c34d62d264d37aba43c4432ad35
                                                                                  • Instruction Fuzzy Hash: 86F0902089F3CF5AE7126BB418791E53B60AF47310F450AB6F48C860B3CD281615C221
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ca94888bf03beb2044e3eb321c8f8d18539f7f1f0a5aee26ec23c4df6f1a1d98
                                                                                  • Instruction ID: c91b42ff2792e8b153901819046806cea388009bf22430bd04d6904add0433e5
                                                                                  • Opcode Fuzzy Hash: ca94888bf03beb2044e3eb321c8f8d18539f7f1f0a5aee26ec23c4df6f1a1d98
                                                                                  • Instruction Fuzzy Hash: E9012831E0A62DCEEB74DA44D4657FDB7B0EF05301F4112FAD50EA21B1DB342A458B40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 89e675ee21ab20fcf7b4d8ada1c27a34ae6875681e226b7995d7ad3eeaf0cd0f
                                                                                  • Instruction ID: e36bcd3237665f7a71b8b48f05e9d4654abd9d27649e2ee76dfb0864e8e01c2c
                                                                                  • Opcode Fuzzy Hash: 89e675ee21ab20fcf7b4d8ada1c27a34ae6875681e226b7995d7ad3eeaf0cd0f
                                                                                  • Instruction Fuzzy Hash: 79019D31E0521D8FCB68DFA8E490AEDB7B1FF45311F50456AE019E32A0CA38A986CF40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3533abcabf3192d5bb32737b4f54e4205fdcca51bfc26c426c67c7ade15ead77
                                                                                  • Instruction ID: 209a172e4b0a83b90c645dc83ce5098651c35e98b4e0728dc4e90f790057f21c
                                                                                  • Opcode Fuzzy Hash: 3533abcabf3192d5bb32737b4f54e4205fdcca51bfc26c426c67c7ade15ead77
                                                                                  • Instruction Fuzzy Hash: 9001EC30E0952D8ADB64EB54C8A57EDB3B0EF14300F5005E5D00EA22B1DE742A85CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 20c5111a643633c4544e0e6b7ef6fdbee6f28195d5237d2eedcba88ec688e328
                                                                                  • Instruction ID: 798527fb836c12472a58f217411b90a798bafc49935d555f5741c20f73599b32
                                                                                  • Opcode Fuzzy Hash: 20c5111a643633c4544e0e6b7ef6fdbee6f28195d5237d2eedcba88ec688e328
                                                                                  • Instruction Fuzzy Hash: E601B631E0A52D8EDBA4EB98D865BFDB7B0AF14300F1146B9D00EA21B5CE746AC48B40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: eb0bdd142eb34321be57665d3759bdc80fdd71b0ac7510b72d3e7f3443a347d2
                                                                                  • Instruction ID: 13b9ccf284a7e040976fc86e78ea0b60736784eb52dab277d9ffefa60eaa74b1
                                                                                  • Opcode Fuzzy Hash: eb0bdd142eb34321be57665d3759bdc80fdd71b0ac7510b72d3e7f3443a347d2
                                                                                  • Instruction Fuzzy Hash: 60F0C23A91E70D8EE3318AF8882A2E9B7A0EF85310F4542BCDC054B4B1DA2567268781
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cda05273d5acf607f592ead7614cfa297d450e81951f5dbe4f181a01483a0868
                                                                                  • Instruction ID: db466e71bdc3e82668c5cccc7e5eff758acc42299cb8dcf220b35bd344a910a9
                                                                                  • Opcode Fuzzy Hash: cda05273d5acf607f592ead7614cfa297d450e81951f5dbe4f181a01483a0868
                                                                                  • Instruction Fuzzy Hash: E6F0E770E0991D9FDB94DF88E8909EDB7B2FF89300F114226E009E3179DB346A42CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e38a0cf366280d666ca5cda24670ae3cdf9b370569723abd107f86aa788e475a
                                                                                  • Instruction ID: 489f0b09a3b99a39d32b359fa55c2429444fd034e0a4f5751e7d85192a5d4795
                                                                                  • Opcode Fuzzy Hash: e38a0cf366280d666ca5cda24670ae3cdf9b370569723abd107f86aa788e475a
                                                                                  • Instruction Fuzzy Hash: 9EF01D30E0A22DCAEB70DA98D9A17FDB360EF45300F4106F5D50EA61F6DA746B858A40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fbd54ee102823747580f72abc5cfa90a680dd9bd9b4286391653c3490cbf579e
                                                                                  • Instruction ID: c5f257482c9306ddd26de963c03718f58252f1f3482362c31dcf822cb13ecae4
                                                                                  • Opcode Fuzzy Hash: fbd54ee102823747580f72abc5cfa90a680dd9bd9b4286391653c3490cbf579e
                                                                                  • Instruction Fuzzy Hash: CBF03C30E0A22D8EDB24DA54C8617EDB370EF44300F4106FAD50E661F6CA342A858A40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7f72c29d1d79292c67b10d340842e760e17f21fb4f9aa78833359fa16857a2db
                                                                                  • Instruction ID: f8fe7df8a849af80d47256e2af766d5d05794ffc9201305f491690e7978f0290
                                                                                  • Opcode Fuzzy Hash: 7f72c29d1d79292c67b10d340842e760e17f21fb4f9aa78833359fa16857a2db
                                                                                  • Instruction Fuzzy Hash: 28F03030E0A62DCEEB74DA58C8657FD73B0EF55300F4106F5D51EA21F6CA746A858B40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cbc00b6e33a0949a872473d67c390a9c09b33c9e8b8ca5223d830558707631cd
                                                                                  • Instruction ID: c883f9c3e110144d00ea7714c27b35e751c1175cf989da642898fb452b5097ae
                                                                                  • Opcode Fuzzy Hash: cbc00b6e33a0949a872473d67c390a9c09b33c9e8b8ca5223d830558707631cd
                                                                                  • Instruction Fuzzy Hash: 0FE0D83B50851C47D730BD98F8004E9F764EB81360F010337D41CC71A4E62997658381
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 24508cf56646bb781dd883e12fd84b089ba2ea76a392ae07c10532a22be73423
                                                                                  • Instruction ID: 6ccfe73428a69b330e9a3ebd4263f6bb8f6cdda8e70c96c5fe585b0b600708c8
                                                                                  • Opcode Fuzzy Hash: 24508cf56646bb781dd883e12fd84b089ba2ea76a392ae07c10532a22be73423
                                                                                  • Instruction Fuzzy Hash: C4F03030E1D22ECEEB64EBA8D451BFD73B0AF01300F4106B5D01D661B2CE342A848F80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0c8ca0f3c0aa8fec96bb81a525ad7342fd849f70845cc1d986d9dbe8a71244fb
                                                                                  • Instruction ID: 7b29cab2f8579240f752900f45ac610727944cb7347ab89b1519664bcd5d24e5
                                                                                  • Opcode Fuzzy Hash: 0c8ca0f3c0aa8fec96bb81a525ad7342fd849f70845cc1d986d9dbe8a71244fb
                                                                                  • Instruction Fuzzy Hash: BBE09B31D0F38D4FD7255E5044521D43B60FF45300F4602B6D558414B2DA28D5548741
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c4ae41082ead3b11099eb87e226155234d4817f6427899cd1917d8920e87119b
                                                                                  • Instruction ID: 6329328363848872333a62c389300bc214a972739795a3a29a3a7e2e69487926
                                                                                  • Opcode Fuzzy Hash: c4ae41082ead3b11099eb87e226155234d4817f6427899cd1917d8920e87119b
                                                                                  • Instruction Fuzzy Hash: C4E0D832C4D78D4FC7129F6449252E97B20AF41304F4502FAE41C8A4E2DA29A728C751
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8922546caa98479db2cf5027497129883765864f9e34e0c56bd368c7d24536dd
                                                                                  • Instruction ID: bfb688012fc69cb6eee7010ee71bf7af1119da3e676713205ad8a217b32fe09f
                                                                                  • Opcode Fuzzy Hash: 8922546caa98479db2cf5027497129883765864f9e34e0c56bd368c7d24536dd
                                                                                  • Instruction Fuzzy Hash: 00E07852D19E464ED79CA51464515E1F751DF55310F4601F7D01DC71FBD8151DC14381
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e6b4706fc6ad5d5cada314ffb83ccdb2b116a958c30319585997ca4c0248e6b3
                                                                                  • Instruction ID: 8225e1444ba8e31525dd347e8123d5c4d6f69cee910391b255e5c40e6be80ef2
                                                                                  • Opcode Fuzzy Hash: e6b4706fc6ad5d5cada314ffb83ccdb2b116a958c30319585997ca4c0248e6b3
                                                                                  • Instruction Fuzzy Hash: 33E0D83EA0E70D86E37059A8A4200EDB390FF44310F010331C44D475B2EE296B018746
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ec988c992015d4a1af8b8749291ce1e73d66a631a75331d6a39a93b765c4a821
                                                                                  • Instruction ID: 28f68612ceeaced8c83e0c8104aac28c6fd869ff13ea8c8b7d71a95af3fd20df
                                                                                  • Opcode Fuzzy Hash: ec988c992015d4a1af8b8749291ce1e73d66a631a75331d6a39a93b765c4a821
                                                                                  • Instruction Fuzzy Hash: 18E07852D18E4A4ED36CE51464539E1F751DF95310F0501F7D01DC71EFD8151DC18381
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5d812bfa8270b5c3ea7a3053d768964393aa6263d7a17542fd575b2e86dcfa66
                                                                                  • Instruction ID: 98c6907219faca99a3214363e4bbb36ff3f193f4c755d32fa824d8aa844c46db
                                                                                  • Opcode Fuzzy Hash: 5d812bfa8270b5c3ea7a3053d768964393aa6263d7a17542fd575b2e86dcfa66
                                                                                  • Instruction Fuzzy Hash: ACD05E71F05A1C4FDBA8DB0888A4BACF3B2EFA5240F4001EA904DD32B1CE3529858B01
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8f9340111c8c559c57e4f6e85a06c2a85ad815bc5ac91230e71a4a7e1f7c280a
                                                                                  • Instruction ID: 2d24121d43170f5946bc2d83e2cad7f41ac8d0eb4bf523865151fade77644c04
                                                                                  • Opcode Fuzzy Hash: 8f9340111c8c559c57e4f6e85a06c2a85ad815bc5ac91230e71a4a7e1f7c280a
                                                                                  • Instruction Fuzzy Hash:
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 61fefe33442d08a6e0b6c9e71d492d8293f10915432a259adee5b1b326ff4cea
                                                                                  • Instruction ID: 95ccfad36a0bbabe882e828479ad90f17570533a90587948b07fdb1fce6aa93e
                                                                                  • Opcode Fuzzy Hash: 61fefe33442d08a6e0b6c9e71d492d8293f10915432a259adee5b1b326ff4cea
                                                                                  • Instruction Fuzzy Hash: 21F1FB70E09A5D8FDB94EF58C895BADB7B1FF69300F5141A9D00DE72A6CA34A981CF10
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1819868876.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd9b7e0000_7FEGBYFBHFBJH32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: !39$";9$#C9$$K9
                                                                                  • API String ID: 0-1489306562
                                                                                  • Opcode ID: a0596ce76f15b059762d44d2d7dc78fadf65b2e046682320eb6ae3d30570db7d
                                                                                  • Instruction ID: c461f53752d9e255db9eea9d4f8f67848624b6312832d36ae71b7c83f8371226
                                                                                  • Opcode Fuzzy Hash: a0596ce76f15b059762d44d2d7dc78fadf65b2e046682320eb6ae3d30570db7d
                                                                                  • Instruction Fuzzy Hash: 85E0460BF2587103D50872EDB8106C84398DADA17B39682B7E769CB2D79840784B83E4