Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MicrosoftWORD.exe

Overview

General Information

Sample name:MicrosoftWORD.exe
Analysis ID:1587444
MD5:683c5db3796f6ef32a5598a9c442c6b0
SHA1:39b40a2bb77bc0d46361dec3ecd69d1547b39e6d
SHA256:cc3f501d414d5bb8fcbb3a4bcfb2b085b9e67a1e7739118f1b727a9336e16f74
Tags:exePrivateLoaderuser-zhuzhu0009
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory in foreign processes
Drops large PE files
Injects a PE file into a foreign processes
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MicrosoftWORD.exe (PID: 812 cmdline: "C:\Users\user\Desktop\MicrosoftWORD.exe" MD5: 683C5DB3796F6EF32A5598A9C442C6B0)
    • csc.exe (PID: 1104 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.3151381161.0000000008081000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000004.00000002.3151800226.00000000095E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000004.00000002.3150912179.0000000006EE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: csc.exe PID: 1104JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          4.2.csc.exe.8106448.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            4.2.csc.exe.95e0000.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Favorites\components\assets\Chrominum_A.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\MicrosoftWORD.exe, ProcessId: 812, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Chrominum_A
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: MicrosoftWORD.exeVirustotal: Detection: 65%Perma Link
              Source: MicrosoftWORD.exeReversingLabs: Detection: 52%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
              Source: MicrosoftWORD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: MicrosoftWORD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: Vxfoecavth.pdb source: csc.exe, 00000004.00000003.1731696888.000000000817C000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151729530.0000000009520000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\jenkins_home\workspace\indows-4.5-non-Arxan_release_5.6\CloudAgentInstaller\Release\CloudAgentInstaller.pdb source: MicrosoftWORD.exe, Chrominum_A.exe.0.dr
              Source: global trafficTCP traffic: 192.168.2.7:49804 -> 181.71.216.203:30203
              Source: Joe Sandbox ViewIP Address: 181.71.216.203 181.71.216.203
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: newstaticfreepoint24.ddns-ip.net
              Source: csc.exe, 00000004.00000002.3150912179.0000000007139000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3150912179.0000000006F75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3150912179.0000000006EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: MicrosoftWORD.exe, Chrominum_A.exe.0.drString found in binary or memory: http://www.newhb.com
              Source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000002.3150912179.0000000006EE1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: MicrosoftWORD.exe, Chrominum_A.exe.0.drString found in binary or memory: https://www.qualys.com/docs/qualys-cloud-agent-windows-install-guide.pdf

              System Summary

              barindex
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeFile dump: Chrominum_A.exe.0.dr 959567321Jump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_052244A64_2_052244A6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_052244B04_2_052244B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD1CA84_2_06BD1CA8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD63184_2_06BD6318
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDE07F4_2_06BDE07F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD1FDF4_2_06BD1FDF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD64194_2_06BD6419
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD1C104_2_06BD1C10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD1C004_2_06BD1C00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDA44C4_2_06BDA44C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD65D64_2_06BD65D6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDE3B74_2_06BDE3B7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD63084_2_06BD6308
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD20994_2_06BD2099
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD20C34_2_06BD20C3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD20244_2_06BD2024
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD59374_2_06BD5937
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDF1284_2_06BDF128
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD59484_2_06BD5948
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD21414_2_06BD2141
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BF14684_2_06BF1468
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BFFB404_2_06BFFB40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BFE3F84_2_06BFE3F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BFFB304_2_06BFFB30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C927C84_2_06C927C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C933E04_2_06C933E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C97BAE4_2_06C97BAE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C94CD84_2_06C94CD8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C944A04_2_06C944A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C900404_2_06C90040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C959884_2_06C95988
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C97BF64_2_06C97BF6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C92B104_2_06C92B10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C94CC94_2_06C94CC9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C944904_2_06C94490
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C900064_2_06C90006
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C959C84_2_06C959C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C939B04_2_06C939B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C959834_2_06C95983
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C939A14_2_06C939A1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C939B04_2_06C939B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C9597F4_2_06C9597F
              Source: MicrosoftWORD.exeBinary or memory string: OriginalFilename vs MicrosoftWORD.exe
              Source: MicrosoftWORD.exe, 00000000.00000002.1535438868.0000000002F44000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudAgentInstaller.exeH vs MicrosoftWORD.exe
              Source: MicrosoftWORD.exe, 00000000.00000002.1534462310.0000000000A1C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCloudAgentInstaller.exeH vs MicrosoftWORD.exe
              Source: MicrosoftWORD.exe, 00000000.00000002.1535242540.000000000292C000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLziarzrkco.exe" vs MicrosoftWORD.exe
              Source: MicrosoftWORD.exeBinary or memory string: OriginalFilenameCloudAgentInstaller.exeH vs MicrosoftWORD.exe
              Source: MicrosoftWORD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal76.evad.winEXE@3/1@1/1
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeFile created: C:\Users\user\Favorites\componentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: \Sessions\1\BaseNamedObjects\mono1234
              Source: MicrosoftWORD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: MicrosoftWORD.exe, 00000000.00000000.1297806921.000000000055B000.00000002.00000001.01000000.00000003.sdmp, MicrosoftWORD.exe, 00000000.00000002.1535438868.0000000002930000.00000004.00001000.00020000.00000000.sdmp, MicrosoftWORD.exe, 00000000.00000002.1533055814.000000000055B000.00000002.00000001.01000000.00000003.sdmp, Chrominum_A.exe.0.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
              Source: MicrosoftWORD.exe, 00000000.00000000.1297806921.000000000055B000.00000002.00000001.01000000.00000003.sdmp, MicrosoftWORD.exe, 00000000.00000002.1535438868.0000000002930000.00000004.00001000.00020000.00000000.sdmp, MicrosoftWORD.exe, 00000000.00000002.1533055814.000000000055B000.00000002.00000001.01000000.00000003.sdmp, Chrominum_A.exe.0.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
              Source: MicrosoftWORD.exeVirustotal: Detection: 65%
              Source: MicrosoftWORD.exeReversingLabs: Detection: 52%
              Source: MicrosoftWORD.exeString found in binary or memory: 7XSoftware\Qualys\QualysAgent1.21.11.0Qualys Cloud Security AgentInstallation of Qualys Cloud Agent by double-clicking the executable or installer file is not supported. For installation instructions, refer to 'How to install the Cloud Agent' section in https://www.qualys.com/docs/qualys-cloud-agent-windows-install-guide.pdf
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeFile read: C:\Users\user\Desktop\MicrosoftWORD.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\MicrosoftWORD.exe "C:\Users\user\Desktop\MicrosoftWORD.exe"
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeSection loaded: fugu.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeSection loaded: fugu2.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: MicrosoftWORD.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: MicrosoftWORD.exeStatic file information: File size 7432192 > 1048576
              Source: MicrosoftWORD.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x159800
              Source: MicrosoftWORD.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x578000
              Source: MicrosoftWORD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: MicrosoftWORD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: MicrosoftWORD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: MicrosoftWORD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: MicrosoftWORD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: MicrosoftWORD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: MicrosoftWORD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: MicrosoftWORD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: Vxfoecavth.pdb source: csc.exe, 00000004.00000003.1731696888.000000000817C000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151729530.0000000009520000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\jenkins_home\workspace\indows-4.5-non-Arxan_release_5.6\CloudAgentInstaller\Release\CloudAgentInstaller.pdb source: MicrosoftWORD.exe, Chrominum_A.exe.0.dr

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 4.2.csc.exe.8106448.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.csc.exe.95e0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3151381161.0000000008081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3151800226.00000000095E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3150912179.0000000006EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 1104, type: MEMORYSTR
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: MicrosoftWORD.exeStatic PE information: real checksum: 0x1c8570 should be: 0x726390
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06B84F58 push edx; retf 4_2_06B84F5E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD6CD8 push es; retn BD90h4_2_06BDA650
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD0620 push es; iretd 4_2_06BD06C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BD1FA8 pushfd ; ret 4_2_06BD1FB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDAA8E push es; iretd 4_2_06BDAA9C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDA22C push eax; retf 4_2_06BDA22F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDAA1E push es; iretd 4_2_06BDAA38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDAB8B push es; ret 4_2_06BDAB8C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDABC8 push es; ret 4_2_06BDAB8C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06BDA992 push es; retf 4_2_06BDA9A4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C976C0 push ds; retf 4_2_06C976C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C976C3 push ds; retf 4_2_06C976CA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C982B3 push eax; retf 4_2_06C982B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C975C0 push ds; retf 4_2_06C975C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C975C3 push ds; retf 4_2_06C975CA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C965D1 push ss; retf 4_2_06C965D2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C965D3 push ss; retf 4_2_06C965D6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C965D7 push ss; retf 4_2_06C965DA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C975F0 push ds; retf 4_2_06C97682
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C97581 push ds; retf 4_2_06C97582
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C975A0 push ds; retf 4_2_06C975A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C965B1 push ss; retf 4_2_06C965B2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C97541 push ds; retf 4_2_06C97542
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C97561 push ds; retf 4_2_06C97562
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C95978 push cs; retf 4_2_06C9597E
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeFile created: C:\Users\user\Favorites\components\assets\Chrominum_A.exeJump to dropped file
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Chrominum_AJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Chrominum_AJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 51E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 6EE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 6A40000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 526000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeDropped PE file which has not been started: C:\Users\user\Favorites\components\assets\Chrominum_A.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 3300Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 3300Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 4260Thread sleep count: 200 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 3232Thread sleep time: -526000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 3300Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 60000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 526000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: csc.exe, 00000004.00000002.3152023388.00000000098A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 4_2_06C90040 LdrInitializeThunk,4_2_06C90040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: A00000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: A00000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: A00000Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 647008Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftWORD.exeCode function: 0_2_00512345 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00512345
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: csc.exe, 00000004.00000003.1515707116.00000000098BF000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3149922640.0000000000DB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
              Windows Management Instrumentation
              1
              Registry Run Keys / Startup Folder
              31
              Process Injection
              1
              Masquerading
              OS Credential Dumping1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Registry Run Keys / Startup Folder
              11
              Disable or Modify Tools
              LSASS Memory131
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              141
              Virtualization/Sandbox Evasion
              Security Account Manager141
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook31
              Process Injection
              NTDS124
              System Information Discovery
              Distributed Component Object ModelInput Capture1
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              MicrosoftWORD.exe65%VirustotalBrowse
              MicrosoftWORD.exe53%ReversingLabsWin32.Trojan.Leonem
              SourceDetectionScannerLabelLink
              C:\Users\user\Favorites\components\assets\Chrominum_A.exe5%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.newhb.com0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              newstaticfreepoint24.ddns-ip.net
              181.71.216.203
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://github.com/mgravell/protobuf-netcsc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://www.qualys.com/docs/qualys-cloud-agent-windows-install-guide.pdfMicrosoftWORD.exe, Chrominum_A.exe.0.drfalse
                    high
                    http://www.newhb.comMicrosoftWORD.exe, Chrominum_A.exe.0.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://github.com/mgravell/protobuf-neticsc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://stackoverflow.com/q/14436606/23354csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000002.3150912179.0000000006EE1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://github.com/mgravell/protobuf-netJcsc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecsc.exe, 00000004.00000002.3150912179.0000000007139000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3150912179.0000000006F75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3150912179.0000000006EE1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/11564914/23354;csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/2152978/23354csc.exe, 00000004.00000003.1731696888.0000000008495000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000004.00000002.3151869345.0000000009640000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000004.00000003.1731696888.000000000835E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                181.71.216.203
                                newstaticfreepoint24.ddns-ip.netColombia
                                27831ColombiaMovilCOfalse
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1587444
                                Start date and time:2025-01-10 11:49:02 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 8m 12s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Run name:Run with higher sleep bypass
                                Number of analysed new started processes analysed:9
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:MicrosoftWORD.exe
                                Detection:MAL
                                Classification:mal76.evad.winEXE@3/1@1/1
                                EGA Information:
                                • Successful, ratio: 50%
                                HCA Information:
                                • Successful, ratio: 81%
                                • Number of executed functions: 87
                                • Number of non-executed functions: 18
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212, 4.175.87.197
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target MicrosoftWORD.exe, PID 812 because there are no executed function
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                TimeTypeDescription
                                13:21:27AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Chrominum_A C:\Users\user\Favorites\components\assets\Chrominum_A.exe
                                13:21:35AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Chrominum_A C:\Users\user\Favorites\components\assets\Chrominum_A.exe
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                181.71.216.203MicrosoftOfficeWord.exeGet hashmaliciousUnknownBrowse
                                  AdobePDF.exeGet hashmaliciousUnknownBrowse
                                    AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                      PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                        MicrosoftOfficeWord.exeGet hashmaliciousUnknownBrowse
                                          AdobePDF.exeGet hashmaliciousUnknownBrowse
                                            AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                              PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  newstaticfreepoint24.ddns-ip.netMicrosoftOfficeWord.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  MicrosoftOfficeWord.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ColombiaMovilCOMicrosoftOfficeWord.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  MicrosoftOfficeWord.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\MicrosoftWORD.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):959567321
                                                  Entropy (8bit):0.10403134135261466
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:2F50620BC392CD4467AF0774F20F0045
                                                  SHA1:897E76B977A57DAE0E0A7BC32EF8C436248316E5
                                                  SHA-256:BB8B678F7382CE794161786A8E11C10986A6B8F24F55B2F3C9108B9871E266ED
                                                  SHA-512:7B11B49A72AA9157BC0FFDBEA67E03BCEE8741BB307F723856011F94476EAB83C2C6918E3AD3E6227BB2224B0075AD501D18027708AB9E09AE198FC964E06A40
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 5%
                                                  Reputation:low
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T...v...v...v...t..v...v.v...w..v.../...v..+(...v..+(..6v..+(..kv.......v..(...v.......v...v..;w..(..;v..(z..v...v...v..(...v..Rich.v..........PE..L....KFf......................[...................@...........................q.....p.....@.................................(|..x....`....W.............................p...............................@....................z.......................text............................... ..`.rdata..............................@..@.data............V...~..............@....gfids... ...0......................@..@.tls.........P......................@....rsrc.....W..`....W.................@..@........................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):6.664200167453047
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.55%
                                                  • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:MicrosoftWORD.exe
                                                  File size:7'432'192 bytes
                                                  MD5:683c5db3796f6ef32a5598a9c442c6b0
                                                  SHA1:39b40a2bb77bc0d46361dec3ecd69d1547b39e6d
                                                  SHA256:cc3f501d414d5bb8fcbb3a4bcfb2b085b9e67a1e7739118f1b727a9336e16f74
                                                  SHA512:d3ff24f43b4043f1cae00c79c6cf7418bc78012e37a2f28f42f96185d31ccc0f2f020e69803c0e29672b7db074fe9aaeade584d7cf4494951a59f60fc3dde261
                                                  SSDEEP:98304:zWmwv0GCAR4IQrOWoqNm2T2Nr0WtpHW+WxUbSj8KSS:zWmwHCAcOWoqNm2E0WtlW+W6bCkS
                                                  TLSH:AE767C71E283CC43E8A220BFE129A5FC51256E35E627C587B3C0FE2A70735D295E561B
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T....v...v...v....t..v....v..v....w..v.../...v..+(...v..+(..6v..+(..kv.......v...(...v.......v...v..;w...(..;v...(z..v...v...v.
                                                  Icon Hash:3368ccd64c69138e
                                                  Entrypoint:0x5116c7
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x66464B85 [Thu May 16 18:08:05 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:1
                                                  File Version Major:5
                                                  File Version Minor:1
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:1
                                                  Import Hash:667cd4ebeeff36c77bc94683d50504ef
                                                  Instruction
                                                  call 00007FC750FFF0DEh
                                                  jmp 00007FC750FFE2ECh
                                                  push ebp
                                                  mov ebp, esp
                                                  push 00000000h
                                                  call dword ptr [0055B170h]
                                                  push dword ptr [ebp+08h]
                                                  call dword ptr [0055B2F0h]
                                                  push C0000409h
                                                  call dword ptr [0055B260h]
                                                  push eax
                                                  call dword ptr [0055B13Ch]
                                                  pop ebp
                                                  ret
                                                  push ebp
                                                  mov ebp, esp
                                                  sub esp, 00000324h
                                                  push 00000017h
                                                  call 00007FC750FEAB88h
                                                  test eax, eax
                                                  je 00007FC750FFE467h
                                                  push 00000002h
                                                  pop ecx
                                                  int 29h
                                                  mov dword ptr [0059FD30h], eax
                                                  mov dword ptr [0059FD2Ch], ecx
                                                  mov dword ptr [0059FD28h], edx
                                                  mov dword ptr [0059FD24h], ebx
                                                  mov dword ptr [0059FD20h], esi
                                                  mov dword ptr [0059FD1Ch], edi
                                                  mov word ptr [0059FD48h], ss
                                                  mov word ptr [0059FD3Ch], cs
                                                  mov word ptr [0059FD18h], ds
                                                  mov word ptr [0059FD14h], es
                                                  mov word ptr [0059FD10h], fs
                                                  mov word ptr [0059FD0Ch], gs
                                                  pushfd
                                                  pop dword ptr [0059FD40h]
                                                  mov eax, dword ptr [ebp+00h]
                                                  mov dword ptr [0059FD34h], eax
                                                  mov eax, dword ptr [ebp+04h]
                                                  mov dword ptr [0059FD38h], eax
                                                  lea eax, dword ptr [ebp+08h]
                                                  mov dword ptr [0059FD44h], eax
                                                  mov eax, dword ptr [ebp-00000324h]
                                                  mov dword ptr [0059FC80h], 00010001h
                                                  Programming Language:
                                                  • [ C ] VS2008 SP1 build 30729
                                                  • [IMP] VS2008 SP1 build 30729
                                                  • [RES] VS2015 UPD3 build 24213
                                                  • [LNK] VS2015 UPD3.1 build 24215
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x197c280x78.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a60000x577fa0.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1bf0000xdda4.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x18a2100x70.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x16acf80x40.rdata
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x15b0000x398.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x197a800x80.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x15a0000x15980029eab12d8effad8d0b1170fcfb5a3918False0.5572596327785818data6.661013407705432IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x15b0000x3f0000x3e200eae27ead0dbaa6b546d3ad9e2f2eddf2False0.3670853244466801data5.085860438856158IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x19a0000x90000x5600c5bd365bb50e696ac8174b61be590ccdFalse0.2043059593023256data4.249683212440647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .gfids0x1a30000x20000x1200db596309d3c1c15c9fe66b4080be2928False0.3784722222222222data4.026024095908803IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .tls0x1a50000x10000x200adb00c88d5919bab3c4b160cbf2abed5False0.03515625data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x1a60000x577fa00x57800065a24c5551dd85360b88203996705aefunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_BITMAP0x1a66600x7028Device independent bitmap graphic, 448 x 16 x 32, image size 00.3149902479799387
                                                  RT_BITMAP0x1ad6880x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.5955807811901009
                                                  RT_BITMAP0x2200ac0x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.5876751714443924
                                                  RT_BITMAP0x292ad00x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.4681283809686076
                                                  RT_BITMAP0x3054f40x67258PC bitmap, Windows 3.x format, 52864 x 2 x 54, image size 422942, cbSize 422488, bits offset 540.9915003503058075
                                                  RT_ICON0x36c74c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4716312056737589
                                                  RT_ICON0x36cbb40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.29174484052532834
                                                  RT_ICON0x36dc5c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22863070539419086
                                                  RT_ICON0x3702040x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.20559754369390648
                                                  RT_ICON0x37442c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.15386549154146456
                                                  RT_STRING0x384c540x6cdata0.6481481481481481
                                                  RT_RCDATA0x384cc00x9d36PNG image data, 98 x 102, 8-bit/color RGBA, non-interlaced0.23204790538190131
                                                  RT_RCDATA0x38e9f80x7a2b6data0.7525569237778924
                                                  RT_RCDATA0x408cb00xc32baDelphi compiled form 'Tdm'0.34880500564160427
                                                  RT_RCDATA0x4cbf6c0x9c27aDelphi compiled form 'TdmMain'0.26150935726458313
                                                  RT_RCDATA0x5681e80x1cc3eDelphi compiled form '\017TFanTasticFrame\016FanTasticFrame'0.4461985028262973
                                                  RT_RCDATA0x584e280xf7eceDelphi compiled form 'TfPNGMessage'0.1253773995521427
                                                  RT_RCDATA0x67ccf80x1ec66Delphi compiled form 'TfrmMain'0.16980024433972743
                                                  RT_RCDATA0x69b9600x5fd99Delphi compiled form '\023TOperationModeFrame\022OperationModeFrame'0.6852657023288274
                                                  RT_GROUP_ICON0x6fb6fc0x4cdataEnglishUnited States0.75
                                                  RT_VERSION0x6fb7480x34cdataEnglishUnited States0.4372037914691943
                                                  RT_ANIICON0x6fba940x221a2PC bitmap, Windows 3.x format, 18288 x 2 x 29, image size 140368, cbSize 139682, bits offset 540.9885668876447932
                                                  RT_MANIFEST0x71dc380x365XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (809), with CRLF line terminatorsEnglishUnited States0.48676639815880324
                                                  DLLImport
                                                  KERNEL32.dllHeapAlloc, LoadLibraryW, GetSystemInfo, HeapReAlloc, DeleteFileW, DeleteFileA, GetVersionExA, WaitForSingleObjectEx, LoadLibraryA, CreateFileA, FlushViewOfFile, GetFileAttributesExW, GetFileAttributesA, GetDiskFreeSpaceA, FormatMessageW, GetTempPathA, Sleep, MultiByteToWideChar, HeapSize, HeapValidate, UnmapViewOfFile, GetVersionExW, GetFileAttributesW, GetTempPathW, UnlockFileEx, SetEndOfFile, GetFullPathNameA, SetFilePointer, LockFile, OutputDebugStringA, GetDiskFreeSpaceW, InterlockedCompareExchange, GetFullPathNameW, HeapFree, HeapCreate, ReadFile, AreFileApisANSI, RaiseException, GetCurrentThreadId, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, SetLastError, GetConsoleCP, GetVersion, VerSetConditionMask, VerifyVersionInfoW, UnlockFile, DebugBreak, FindFirstFileW, CompareFileTime, FindNextFileW, FindClose, TerminateProcess, GetCurrentThread, SetThreadPriority, SetFileAttributesW, GetModuleFileNameW, GetTimeZoneInformation, GetSystemDirectoryW, HeapCompact, GlobalAlloc, GetLocalTime, CreateDirectoryW, GetCurrentDirectoryW, InitializeCriticalSectionAndSpinCount, SetUnhandledExceptionFilter, GetEnvironmentVariableW, SetEnvironmentVariableW, DuplicateHandle, VirtualAlloc, VirtualFree, IsProcessorFeaturePresent, SetThreadAffinityMask, ResumeThread, SetEvent, ResetEvent, ReleaseSemaphore, CreateEventW, CreateSemaphoreW, GetFileTime, GetSystemWow64DirectoryW, GlobalFree, DecodePointer, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, CreateFileMappingA, LocalFree, LockFileEx, GetFileSize, GetCurrentProcessId, GetProcessHeap, SystemTimeToFileTime, FreeLibrary, WideCharToMultiByte, GetSystemTimeAsFileTime, GetSystemTime, FormatMessageA, CreateFileMappingW, MapViewOfFile, QueryPerformanceCounter, GetTickCount, FlushFileBuffers, ReleaseMutex, CopyFileW, CreateMutexW, SetDllDirectoryW, GetExitCodeProcess, WaitForSingleObject, CreateProcessW, ExpandEnvironmentStringsW, IsWow64Process, OutputDebugStringW, GetFileSizeEx, WriteFile, CreateFileW, SizeofResource, LockResource, LoadResource, FindResourceW, CloseHandle, OpenProcess, GetProcAddress, GetModuleHandleW, GetCurrentProcess, GetLastError, SetStdHandle, WriteConsoleW, LoadLibraryExW, HeapDestroy, GetConsoleWindow, IsValidCodePage, FindFirstFileExW, SetFilePointerEx, ReadConsoleW, GetConsoleMode, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, GetFileType, GetACP, GetCommandLineW, GetCommandLineA, GetStdHandle, ExitProcess, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, EncodePointer, GetCPInfo, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, CompareStringW, LCMapStringW, GetLocaleInfoW, UnhandledExceptionFilter, IsDebuggerPresent, GetStartupInfoW, InitializeSListHead, CreateTimerQueue, SignalObjectAndWait, SwitchToThread, CreateThread, GetThreadPriority, GetLogicalProcessorInformation, CreateTimerQueueTimer, ChangeTimerQueueTimer, DeleteTimerQueueTimer, GetNumaHighestNodeNumber, GetProcessAffinityMask, RegisterWaitForSingleObject, UnregisterWait, GetThreadTimes, FreeLibraryAndExitThread, GetModuleHandleA, InterlockedPopEntrySList, InterlockedPushEntrySList, InterlockedFlushSList, QueryDepthSList, UnregisterWaitEx, RtlUnwind, ExitThread, GetModuleHandleExW
                                                  USER32.dllShowWindow, MessageBoxW
                                                  ADVAPI32.dllControlService, StartServiceW, CloseServiceHandle, QueryServiceStatusEx, OpenServiceW, OpenSCManagerW, GetTokenInformation, CryptReleaseContext, RegDeleteValueW, RegSetValueExW, RegDeleteKeyW, GetSecurityDescriptorDacl, GetSecurityDescriptorGroup, GetSecurityDescriptorOwner, RegCreateKeyExW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, ConvertStringSecurityDescriptorToSecurityDescriptorW, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, TreeResetNamedSecurityInfoW
                                                  SHELL32.dllSHCreateDirectoryExW
                                                  SHLWAPI.dllPathFindFileNameW, PathCombineA, PathAppendW, PathRemoveFileSpecW, PathIsDirectoryW, PathFileExistsW, PathCombineW
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 10, 2025 11:50:23.767812967 CET4980430203192.168.2.7181.71.216.203
                                                  Jan 10, 2025 11:50:23.772733927 CET3020349804181.71.216.203192.168.2.7
                                                  Jan 10, 2025 11:50:23.772828102 CET4980430203192.168.2.7181.71.216.203
                                                  Jan 10, 2025 11:50:23.862126112 CET4980430203192.168.2.7181.71.216.203
                                                  Jan 10, 2025 11:50:23.867079973 CET3020349804181.71.216.203192.168.2.7
                                                  Jan 10, 2025 11:50:23.867161036 CET4980430203192.168.2.7181.71.216.203
                                                  Jan 10, 2025 11:50:23.871988058 CET3020349804181.71.216.203192.168.2.7
                                                  Jan 10, 2025 11:50:45.144764900 CET3020349804181.71.216.203192.168.2.7
                                                  Jan 10, 2025 11:50:45.144829988 CET4980430203192.168.2.7181.71.216.203
                                                  Jan 10, 2025 11:50:45.153711081 CET4980430203192.168.2.7181.71.216.203
                                                  Jan 10, 2025 11:50:45.158544064 CET3020349804181.71.216.203192.168.2.7
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 10, 2025 11:50:23.742748976 CET5437253192.168.2.71.1.1.1
                                                  Jan 10, 2025 11:50:23.764754057 CET53543721.1.1.1192.168.2.7
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jan 10, 2025 11:50:23.742748976 CET192.168.2.71.1.1.10xdc63Standard query (0)newstaticfreepoint24.ddns-ip.netA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jan 10, 2025 11:50:23.764754057 CET1.1.1.1192.168.2.70xdc63No error (0)newstaticfreepoint24.ddns-ip.net181.71.216.203A (IP address)IN (0x0001)false

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:05:50:00
                                                  Start date:10/01/2025
                                                  Path:C:\Users\user\Desktop\MicrosoftWORD.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\MicrosoftWORD.exe"
                                                  Imagebase:0x400000
                                                  File size:7'432'192 bytes
                                                  MD5 hash:683C5DB3796F6EF32A5598A9C442C6B0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:07:21:23
                                                  Start date:10/01/2025
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                                  Imagebase:0xed0000
                                                  File size:2'141'552 bytes
                                                  MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.3151381161.0000000008081000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.3151800226.00000000095E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.3150912179.0000000006EE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:moderate
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:8.3%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:37.5%
                                                    Total number of Nodes:48
                                                    Total number of Limit Nodes:6
                                                    execution_graph 45593 6bd5d48 45594 6bd5d5d 45593->45594 45596 6bd60d1 45594->45596 45598 6bd60e9 45596->45598 45597 6bd61e4 45597->45594 45598->45597 45604 6bffb40 45598->45604 45611 6bffb30 45598->45611 45618 6c94177 45598->45618 45622 6c94132 45598->45622 45626 6c940bf 45598->45626 45607 6bffb4b 45604->45607 45605 6bffd4f 45605->45598 45606 6bffbd2 KiUserExceptionDispatcher 45606->45607 45607->45605 45607->45606 45608 6c90040 LdrInitializeThunk 45607->45608 45609 6c90006 LdrInitializeThunk 45607->45609 45610 6c900f9 LdrInitializeThunk 45607->45610 45608->45607 45609->45607 45610->45607 45613 6bffb4b 45611->45613 45612 6bffd4f 45612->45598 45613->45612 45614 6bffbd2 KiUserExceptionDispatcher 45613->45614 45615 6c900f9 LdrInitializeThunk 45613->45615 45616 6c90040 LdrInitializeThunk 45613->45616 45617 6c90006 LdrInitializeThunk 45613->45617 45614->45613 45615->45613 45616->45613 45617->45613 45619 6c93dfd 45618->45619 45621 6c93d9c 45619->45621 45630 6c90040 45619->45630 45621->45598 45624 6c93dfd 45622->45624 45623 6c90040 LdrInitializeThunk 45623->45624 45624->45623 45625 6c93d9c 45624->45625 45625->45598 45628 6c93dfd 45626->45628 45627 6c90040 LdrInitializeThunk 45627->45628 45628->45626 45628->45627 45629 6c93d9c 45628->45629 45629->45598 45632 6c90062 45630->45632 45631 6c900ba LdrInitializeThunk 45633 6c900d0 45631->45633 45632->45631 45632->45633 45633->45619 45571 522cbc8 45572 522cc08 CloseHandle 45571->45572 45574 522cc39 45572->45574 45575 52243c8 45576 52243dc 45575->45576 45579 5224b30 45575->45579 45582 5224a4e 45575->45582 45585 522c960 45579->45585 45584 522c960 VirtualProtect 45582->45584 45583 5224a70 45584->45583 45587 522c973 45585->45587 45589 522ca18 45587->45589 45590 522ca60 VirtualProtect 45589->45590 45592 5224b4c 45590->45592
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4
                                                    • API String ID: 0-4088798008
                                                    • Opcode ID: 621d74ff0a3ad07ef2eeddb6760c9a7e82f59fe61127d7280e0e05a5f13aedc6
                                                    • Instruction ID: 48315aaa0d65066076ab80f766b0fca4a4957f8e6094d0b99cd778fa26373ba0
                                                    • Opcode Fuzzy Hash: 621d74ff0a3ad07ef2eeddb6760c9a7e82f59fe61127d7280e0e05a5f13aedc6
                                                    • Instruction Fuzzy Hash: 19B20874A002188FEB54DFA9C894BADB7B6FB48700F148599E505AF2A5DB70EC82CF50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4
                                                    • API String ID: 0-4088798008
                                                    • Opcode ID: 918afe2a157b891c3c28205fc5e21680dc04fe896cc358f47884fd225bdcab34
                                                    • Instruction ID: fb089870bc0ae2e7ad9a60faf228434625790093e37c4f63920be48912a01b98
                                                    • Opcode Fuzzy Hash: 918afe2a157b891c3c28205fc5e21680dc04fe896cc358f47884fd225bdcab34
                                                    • Instruction Fuzzy Hash: 8022DA74A012158FDBA4DFA5C994BA9B7B6FB48304F1480D9E509AF295DB30ED82CF50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 634 6c90006-6c9005d 637 6c90062-6c90065 634->637 638 6c9006b 637->638 639 6c90304-6c90312 637->639 638->639 640 6c901c8-6c901df 638->640 641 6c9010c-6c90119 638->641 642 6c9018f-6c901a2 638->642 643 6c902c1 638->643 644 6c90122 638->644 645 6c90242-6c90250 638->645 646 6c901e5 638->646 647 6c902a4-6c902bb 638->647 648 6c902fa-6c90303 638->648 649 6c900ba-6c900cb LdrInitializeThunk 638->649 650 6c9015f-6c9016f 638->650 651 6c90072-6c900a8 638->651 652 6c90252 638->652 653 6c902d6-6c902ed 638->653 681 6c90319-6c9032d 639->681 671 6c901bc-6c901bf 640->671 672 6c901e1-6c901e3 640->672 641->644 674 6c9011b-6c90120 641->674 657 6c901a4-6c901a8 642->657 670 6c902c2 643->670 664 6c9012a-6c9012c 644->664 654 6c90236-6c90239 645->654 646->654 655 6c90298-6c9029b 647->655 679 6c902bd-6c902bf 647->679 660 6c900d0-6c900f4 649->660 650->641 678 6c90171-6c90182 650->678 651->641 682 6c900aa-6c900ad 651->682 652->655 653->637 656 6c902f3-6c902f5 653->656 654->645 661 6c9023b 654->661 655->643 667 6c9029d 655->667 656->637 656->648 657->646 669 6c901aa-6c901b8 657->669 660->657 661->643 661->645 661->647 661->652 675 6c9012e-6c90134 664->675 676 6c90144-6c90152 664->676 667->643 667->647 669->671 680 6c901ba 669->680 670->670 671->640 687 6c901c1 671->687 672->671 674->682 683 6c90138-6c9013a 675->683 684 6c90136 675->684 676->682 685 6c90158-6c9015a 676->685 678->682 686 6c90188-6c9018a 678->686 679->655 680->671 681->637 688 6c90333-6c90335 681->688 682->650 689 6c900b3 682->689 683->676 684->676 685->682 686->682 687->640 687->643 687->645 687->646 687->647 687->652 688->637 689->640 689->641 689->642 689->643 689->644 689->645 689->646 689->647 689->649 689->650 689->652
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 376165730a2d29a4ac95daef4d37f06fc8d4a0f773da92a2992105d39fdaba3e
                                                    • Instruction ID: 515b47ac37f0b68eb197ed23dac5134abc4ee2fe952147fbdeae9b7504ba32ba
                                                    • Opcode Fuzzy Hash: 376165730a2d29a4ac95daef4d37f06fc8d4a0f773da92a2992105d39fdaba3e
                                                    • Instruction Fuzzy Hash: F971A030B05244CFEF84CF26D54DBA937B3FB8A314F1890ADE1059B2A5DB798985CB61

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 692 6c90040-6c9005d 693 6c90062-6c90065 692->693 694 6c9006b 693->694 695 6c90304-6c90312 693->695 694->695 696 6c901c8-6c901df 694->696 697 6c9010c-6c90119 694->697 698 6c9018f-6c901a2 694->698 699 6c902c1 694->699 700 6c90122 694->700 701 6c90242-6c90250 694->701 702 6c901e5 694->702 703 6c902a4-6c902bb 694->703 704 6c902fa-6c90303 694->704 705 6c900ba-6c900cb LdrInitializeThunk 694->705 706 6c9015f-6c9016f 694->706 707 6c90072-6c900a8 694->707 708 6c90252 694->708 709 6c902d6-6c902ed 694->709 737 6c90319-6c9032d 695->737 727 6c901bc-6c901bf 696->727 728 6c901e1-6c901e3 696->728 697->700 730 6c9011b-6c90120 697->730 713 6c901a4-6c901a8 698->713 726 6c902c2 699->726 720 6c9012a-6c9012c 700->720 710 6c90236-6c90239 701->710 702->710 711 6c90298-6c9029b 703->711 735 6c902bd-6c902bf 703->735 716 6c900d0-6c900f4 705->716 706->697 734 6c90171-6c90182 706->734 707->697 738 6c900aa-6c900ad 707->738 708->711 709->693 712 6c902f3-6c902f5 709->712 710->701 717 6c9023b 710->717 711->699 723 6c9029d 711->723 712->693 712->704 713->702 725 6c901aa-6c901b8 713->725 716->713 717->699 717->701 717->703 717->708 731 6c9012e-6c90134 720->731 732 6c90144-6c90152 720->732 723->699 723->703 725->727 736 6c901ba 725->736 726->726 727->696 743 6c901c1 727->743 728->727 730->738 739 6c90138-6c9013a 731->739 740 6c90136 731->740 732->738 741 6c90158-6c9015a 732->741 734->738 742 6c90188-6c9018a 734->742 735->711 736->727 737->693 744 6c90333-6c90335 737->744 738->706 745 6c900b3 738->745 739->732 740->732 741->738 742->738 743->696 743->699 743->701 743->702 743->703 743->708 744->693 745->696 745->697 745->698 745->699 745->700 745->701 745->702 745->703 745->705 745->706 745->708
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: b5bdf1a004d712c94133c7acebadf7b8493c33a7eda9f85651101514296b9d1f
                                                    • Instruction ID: c16faeec8d63ec1eb7afe7a90eab1255306d46d599cc46a6b2a26b2a33ba8762
                                                    • Opcode Fuzzy Hash: b5bdf1a004d712c94133c7acebadf7b8493c33a7eda9f85651101514296b9d1f
                                                    • Instruction Fuzzy Hash: 0C515930B00604CFEF94CF26D54DBA973B3BB8A315F14906DE10A9B6A4DB399985CB64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 748 6bffb30-6bffb46 749 6bffb4b-6bffb4e 748->749 750 6bffd4f-6bffd58 749->750 751 6bffb54 749->751 751->750 752 6bffb5b-6bffb88 751->752 753 6bffd59-6bffd60 751->753 790 6bffb8a call 6c900f9 752->790 791 6bffb8a call 6c90040 752->791 792 6bffb8a call 6c90006 752->792 753->750 754 6bffd62-6bffd73 753->754 754->749 756 6bffd79 754->756 756->749 758 6bffb90-6bffc30 KiUserExceptionDispatcher 784 6bffc32 call 6c900f9 758->784 785 6bffc32 call 6c90040 758->785 786 6bffc32 call 6c90006 758->786 766 6bffc38-6bffc89 787 6bffc8b call 6c900f9 766->787 788 6bffc8b call 6c90040 766->788 789 6bffc8b call 6c90006 766->789 771 6bffc91-6bffce5 793 6bffce7 call 6c900f9 771->793 794 6bffce7 call 6c90040 771->794 795 6bffce7 call 6c90006 771->795 776 6bffced-6bffd0f 796 6bffd11 call 6c938d0 776->796 797 6bffd11 call 6c938e0 776->797 779 6bffd17-6bffd21 781 6bffd29-6bffd42 779->781 781->749 783 6bffd48-6bffd4a 781->783 783->749 784->766 785->766 786->766 787->771 788->771 789->771 790->758 791->758 792->758 793->776 794->776 795->776 796->779 797->779
                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 06BFFBD6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150744731.0000000006BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bf0000_csc.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 3ddb34ffbfd5930dc57c52feb0d875ccc9d6a08192e99e6a6f65de31902ba3c4
                                                    • Instruction ID: fcae1920f79dbc732ce851109ce5439c042f60afab098324ef2e8472f4914f43
                                                    • Opcode Fuzzy Hash: 3ddb34ffbfd5930dc57c52feb0d875ccc9d6a08192e99e6a6f65de31902ba3c4
                                                    • Instruction Fuzzy Hash: C6516E347001808FC384DB79D6A5B7A33E2AB8D314B4544ADF51ECF3A1EE789909C795

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 798 6bffb40-6bffb46 799 6bffb4b-6bffb4e 798->799 800 6bffd4f-6bffd58 799->800 801 6bffb54 799->801 801->800 802 6bffb5b-6bffb88 801->802 803 6bffd59-6bffd60 801->803 834 6bffb8a call 6c900f9 802->834 835 6bffb8a call 6c90040 802->835 836 6bffb8a call 6c90006 802->836 803->800 804 6bffd62-6bffd73 803->804 804->799 806 6bffd79 804->806 806->799 808 6bffb90-6bffc30 KiUserExceptionDispatcher 842 6bffc32 call 6c900f9 808->842 843 6bffc32 call 6c90040 808->843 844 6bffc32 call 6c90006 808->844 816 6bffc38-6bffc89 845 6bffc8b call 6c900f9 816->845 846 6bffc8b call 6c90040 816->846 847 6bffc8b call 6c90006 816->847 821 6bffc91-6bffce5 837 6bffce7 call 6c900f9 821->837 838 6bffce7 call 6c90040 821->838 839 6bffce7 call 6c90006 821->839 826 6bffced-6bffd0f 840 6bffd11 call 6c938d0 826->840 841 6bffd11 call 6c938e0 826->841 829 6bffd17-6bffd21 831 6bffd29-6bffd42 829->831 831->799 833 6bffd48-6bffd4a 831->833 833->799 834->808 835->808 836->808 837->826 838->826 839->826 840->829 841->829 842->816 843->816 844->816 845->821 846->821 847->821
                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 06BFFBD6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150744731.0000000006BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bf0000_csc.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: dfda47c7bb3de7b6cd7c0912d2d03c24e90a9618d164b26cd7465da11717707c
                                                    • Instruction ID: 79a7c3482be225497cc7a663ee3255edca04919cb1f76512e06a16f9c1c98a46
                                                    • Opcode Fuzzy Hash: dfda47c7bb3de7b6cd7c0912d2d03c24e90a9618d164b26cd7465da11717707c
                                                    • Instruction Fuzzy Hash: 72516D347000408FC384EB7AD6A5B7A33E2AB8D314B4544ADF51ECF3A5EE789D498795

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 891 6c95983-6c959aa 893 6c959ac-6c959b3 891->893 894 6c959b4-6c959bf call 6c961a8 891->894 894->893 896 6c959c1-6c959c6 894->896 897 6c959ca-6c959cd 896->897 898 6c959d3 897->898 899 6c95b47-6c95b4c 897->899 898->893 898->899 900 6c95cc8-6c95cda 898->900 901 6c95c8b-6c95c92 898->901 902 6c95a0e-6c95a16 898->902 903 6c95a81-6c95a83 898->903 904 6c95b83-6c95b99 898->904 905 6c95bc5-6c95be6 898->905 906 6c95c06-6c95c08 898->906 907 6c95a18-6c95a29 898->907 908 6c95b5b-6c95b63 898->908 909 6c95adb-6c95add 898->909 910 6c95d5b-6c95d6c 898->910 911 6c959da-6c959ed 898->911 912 6c95a5d-6c95a5f 898->912 913 6c95b9e-6c95ba0 898->913 914 6c95b51-6c95b56 898->914 915 6c95c52-6c95c7d 898->915 916 6c95b12-6c95b20 898->916 917 6c95d14-6c95d1b 898->917 918 6c95ae9-6c95b02 898->918 919 6c95b68-6c95b7e 898->919 920 6c95beb-6c95bf6 call 6c965db 898->920 921 6c95cea-6c95cef 898->921 922 6c95d2d-6c95d34 898->922 923 6c95a6f-6c95a71 898->923 924 6c95d20-6c95d28 898->924 925 6c95aa4-6c95aac 898->925 926 6c95c27-6c95c2f 898->926 927 6c95d39-6c95d4d 898->927 928 6c95a39-6c95a3b 898->928 929 6c95ab1-6c95acd 898->929 930 6c95cb2-6c95cc3 898->930 931 6c95cf4-6c95d0f 898->931 932 6c95c34-6c95c45 898->932 933 6c959f4-6c95a07 898->933 899->897 900->908 965 6c95ce0-6c95ce5 900->965 901->900 937 6c95c94-6c95ca2 901->937 902->897 903->931 941 6c95a89-6c95a97 903->941 904->897 905->897 906->933 935 6c95c0e-6c95c1c 906->935 953 6c95a30-6c95a37 907->953 908->897 909->916 943 6c95adf-6c95ae4 909->943 967 6c95d6e 910->967 968 6c95d76-6c95e05 call 6c953a4 910->968 911->933 912->901 939 6c95a65-6c95a6a 912->939 913->903 934 6c95ba6-6c95bb7 913->934 914->897 915->897 964 6c95c83-6c95c86 915->964 962 6c95b28-6c95b39 916->962 917->897 918->897 969 6c95b08-6c95b0d 918->969 919->897 972 6c95bfc-6c95c01 920->972 922->897 923->911 940 6c95a77-6c95a7c 923->940 925->897 926->897 927->897 942 6c95d53-6c95d56 927->942 928->909 938 6c95a41-6c95a4f 928->938 929->897 966 6c95ad3-6c95ad6 929->966 930->897 932->897 936 6c95c4b-6c95c4d 932->936 933->902 934->897 945 6c95bbd-6c95bc0 934->945 935->897 949 6c95c22 935->949 936->897 937->897 952 6c95ca8-6c95cad 937->952 938->897 955 6c95a55-6c95a58 938->955 939->897 940->897 941->897 958 6c95a9d-6c95a9f 941->958 942->897 943->897 945->897 949->897 952->897 953->897 955->897 958->897 962->897 970 6c95b3f-6c95b42 962->970 964->897 965->897 966->897 967->968 983 6c95e0a-6c95e24 968->983 969->897 970->897 972->897 983->897 985 6c95e2a-6c95e2f 983->985 985->897
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: [wl^
                                                    • API String ID: 0-1344784805
                                                    • Opcode ID: 64e03e8e5b9159767a70b4c19a7e607623fef6440ec67aff8d8f3693c2327120
                                                    • Instruction ID: 562aa2615fd067a125af2e633e8930754db2ea81e16aab86b4c2e1d7847bf478
                                                    • Opcode Fuzzy Hash: 64e03e8e5b9159767a70b4c19a7e607623fef6440ec67aff8d8f3693c2327120
                                                    • Instruction Fuzzy Hash: 1AC1A171A00204CFFB56DB66D5987AEB7B3EB84320F91C568E4095B394DB349D47CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 988 6c95988-6c959aa 989 6c959ac-6c959b3 988->989 990 6c959b4-6c959bf call 6c961a8 988->990 990->989 992 6c959c1-6c959c6 990->992 993 6c959ca-6c959cd 992->993 994 6c959d3 993->994 995 6c95b47-6c95b4c 993->995 994->989 994->995 996 6c95cc8-6c95cda 994->996 997 6c95c8b-6c95c92 994->997 998 6c95a0e-6c95a16 994->998 999 6c95a81-6c95a83 994->999 1000 6c95b83-6c95b99 994->1000 1001 6c95bc5-6c95be6 994->1001 1002 6c95c06-6c95c08 994->1002 1003 6c95a18-6c95a29 994->1003 1004 6c95b5b-6c95b63 994->1004 1005 6c95adb-6c95add 994->1005 1006 6c95d5b-6c95d6c 994->1006 1007 6c959da-6c959ed 994->1007 1008 6c95a5d-6c95a5f 994->1008 1009 6c95b9e-6c95ba0 994->1009 1010 6c95b51-6c95b56 994->1010 1011 6c95c52-6c95c7d 994->1011 1012 6c95b12-6c95b20 994->1012 1013 6c95d14-6c95d1b 994->1013 1014 6c95ae9-6c95b02 994->1014 1015 6c95b68-6c95b7e 994->1015 1016 6c95beb-6c95bf6 call 6c965db 994->1016 1017 6c95cea-6c95cef 994->1017 1018 6c95d2d-6c95d34 994->1018 1019 6c95a6f-6c95a71 994->1019 1020 6c95d20-6c95d28 994->1020 1021 6c95aa4-6c95aac 994->1021 1022 6c95c27-6c95c2f 994->1022 1023 6c95d39-6c95d4d 994->1023 1024 6c95a39-6c95a3b 994->1024 1025 6c95ab1-6c95acd 994->1025 1026 6c95cb2-6c95cc3 994->1026 1027 6c95cf4-6c95d0f 994->1027 1028 6c95c34-6c95c45 994->1028 1029 6c959f4-6c95a07 994->1029 995->993 996->1004 1061 6c95ce0-6c95ce5 996->1061 997->996 1033 6c95c94-6c95ca2 997->1033 998->993 999->1027 1037 6c95a89-6c95a97 999->1037 1000->993 1001->993 1002->1029 1031 6c95c0e-6c95c1c 1002->1031 1049 6c95a30-6c95a37 1003->1049 1004->993 1005->1012 1039 6c95adf-6c95ae4 1005->1039 1063 6c95d6e 1006->1063 1064 6c95d76-6c95e05 call 6c953a4 1006->1064 1007->1029 1008->997 1035 6c95a65-6c95a6a 1008->1035 1009->999 1030 6c95ba6-6c95bb7 1009->1030 1010->993 1011->993 1060 6c95c83-6c95c86 1011->1060 1058 6c95b28-6c95b39 1012->1058 1013->993 1014->993 1065 6c95b08-6c95b0d 1014->1065 1015->993 1068 6c95bfc-6c95c01 1016->1068 1018->993 1019->1007 1036 6c95a77-6c95a7c 1019->1036 1021->993 1022->993 1023->993 1038 6c95d53-6c95d56 1023->1038 1024->1005 1034 6c95a41-6c95a4f 1024->1034 1025->993 1062 6c95ad3-6c95ad6 1025->1062 1026->993 1028->993 1032 6c95c4b-6c95c4d 1028->1032 1029->998 1030->993 1041 6c95bbd-6c95bc0 1030->1041 1031->993 1045 6c95c22 1031->1045 1032->993 1033->993 1048 6c95ca8-6c95cad 1033->1048 1034->993 1051 6c95a55-6c95a58 1034->1051 1035->993 1036->993 1037->993 1054 6c95a9d-6c95a9f 1037->1054 1038->993 1039->993 1041->993 1045->993 1048->993 1049->993 1051->993 1054->993 1058->993 1066 6c95b3f-6c95b42 1058->1066 1060->993 1061->993 1062->993 1063->1064 1079 6c95e0a-6c95e24 1064->1079 1065->993 1066->993 1068->993 1079->993 1081 6c95e2a-6c95e2f 1079->1081 1081->993
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: [wl^
                                                    • API String ID: 0-1344784805
                                                    • Opcode ID: 145d8d27be1fe7c9b4f6dc78e5f43aa502176dd5d8aceb302067d0f81fdc31c0
                                                    • Instruction ID: 4704748d7d9a16f8e68829c876fe73a1c25f65d812353bf0a7ea5d4ea197496c
                                                    • Opcode Fuzzy Hash: 145d8d27be1fe7c9b4f6dc78e5f43aa502176dd5d8aceb302067d0f81fdc31c0
                                                    • Instruction Fuzzy Hash: ADC1A171A00204CFFB56DB66D5987AEB7B3EB84320F91C568E4095B394DB349D46CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1084 6c9597f-6c95980 1085 6c95990-6c959aa 1084->1085 1086 6c95982 1084->1086 1087 6c959ac-6c959b3 1085->1087 1088 6c959b4-6c959bf call 6c961a8 1085->1088 1088->1087 1090 6c959c1-6c959c6 1088->1090 1091 6c959ca-6c959cd 1090->1091 1092 6c959d3 1091->1092 1093 6c95b47-6c95b4c 1091->1093 1092->1087 1092->1093 1094 6c95cc8-6c95cda 1092->1094 1095 6c95c8b-6c95c92 1092->1095 1096 6c95a0e-6c95a16 1092->1096 1097 6c95a81-6c95a83 1092->1097 1098 6c95b83-6c95b99 1092->1098 1099 6c95bc5-6c95be6 1092->1099 1100 6c95c06-6c95c08 1092->1100 1101 6c95a18-6c95a29 1092->1101 1102 6c95b5b-6c95b63 1092->1102 1103 6c95adb-6c95add 1092->1103 1104 6c95d5b-6c95d6c 1092->1104 1105 6c959da-6c959ed 1092->1105 1106 6c95a5d-6c95a5f 1092->1106 1107 6c95b9e-6c95ba0 1092->1107 1108 6c95b51-6c95b56 1092->1108 1109 6c95c52-6c95c7d 1092->1109 1110 6c95b12-6c95b20 1092->1110 1111 6c95d14-6c95d1b 1092->1111 1112 6c95ae9-6c95b02 1092->1112 1113 6c95b68-6c95b7e 1092->1113 1114 6c95beb-6c95bf6 call 6c965db 1092->1114 1115 6c95cea-6c95cef 1092->1115 1116 6c95d2d-6c95d34 1092->1116 1117 6c95a6f-6c95a71 1092->1117 1118 6c95d20-6c95d28 1092->1118 1119 6c95aa4-6c95aac 1092->1119 1120 6c95c27-6c95c2f 1092->1120 1121 6c95d39-6c95d4d 1092->1121 1122 6c95a39-6c95a3b 1092->1122 1123 6c95ab1-6c95acd 1092->1123 1124 6c95cb2-6c95cc3 1092->1124 1125 6c95cf4-6c95d0f 1092->1125 1126 6c95c34-6c95c45 1092->1126 1127 6c959f4-6c95a07 1092->1127 1093->1091 1094->1102 1159 6c95ce0-6c95ce5 1094->1159 1095->1094 1131 6c95c94-6c95ca2 1095->1131 1096->1091 1097->1125 1135 6c95a89-6c95a97 1097->1135 1098->1091 1099->1091 1100->1127 1129 6c95c0e-6c95c1c 1100->1129 1147 6c95a30-6c95a37 1101->1147 1102->1091 1103->1110 1137 6c95adf-6c95ae4 1103->1137 1161 6c95d6e 1104->1161 1162 6c95d76-6c95e05 call 6c953a4 1104->1162 1105->1127 1106->1095 1133 6c95a65-6c95a6a 1106->1133 1107->1097 1128 6c95ba6-6c95bb7 1107->1128 1108->1091 1109->1091 1158 6c95c83-6c95c86 1109->1158 1156 6c95b28-6c95b39 1110->1156 1111->1091 1112->1091 1163 6c95b08-6c95b0d 1112->1163 1113->1091 1166 6c95bfc-6c95c01 1114->1166 1116->1091 1117->1105 1134 6c95a77-6c95a7c 1117->1134 1119->1091 1120->1091 1121->1091 1136 6c95d53-6c95d56 1121->1136 1122->1103 1132 6c95a41-6c95a4f 1122->1132 1123->1091 1160 6c95ad3-6c95ad6 1123->1160 1124->1091 1126->1091 1130 6c95c4b-6c95c4d 1126->1130 1127->1096 1128->1091 1139 6c95bbd-6c95bc0 1128->1139 1129->1091 1143 6c95c22 1129->1143 1130->1091 1131->1091 1146 6c95ca8-6c95cad 1131->1146 1132->1091 1149 6c95a55-6c95a58 1132->1149 1133->1091 1134->1091 1135->1091 1152 6c95a9d-6c95a9f 1135->1152 1136->1091 1137->1091 1139->1091 1143->1091 1146->1091 1147->1091 1149->1091 1152->1091 1156->1091 1164 6c95b3f-6c95b42 1156->1164 1158->1091 1159->1091 1160->1091 1161->1162 1177 6c95e0a-6c95e24 1162->1177 1163->1091 1164->1091 1166->1091 1177->1091 1179 6c95e2a-6c95e2f 1177->1179 1179->1091
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: [wl^
                                                    • API String ID: 0-1344784805
                                                    • Opcode ID: bbf2a690ac6366ced36093349521207968e518c2056006ff44a8f183f056948f
                                                    • Instruction ID: 4b73aab12d16e9ffa430f42455da10ff20d9a169d2619f831420f589e0af02af
                                                    • Opcode Fuzzy Hash: bbf2a690ac6366ced36093349521207968e518c2056006ff44a8f183f056948f
                                                    • Instruction Fuzzy Hash: BAC19171A00204CFFB56CB66D5987AEB7B3EB84320F92C568E4095B394DB349D47CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1190 6c959c8 1191 6c959ca-6c959cd 1190->1191 1192 6c959d3 1191->1192 1193 6c95b47-6c95b4c 1191->1193 1192->1193 1194 6c95cc8-6c95cda 1192->1194 1195 6c95c8b-6c95c92 1192->1195 1196 6c95a0e-6c95a16 1192->1196 1197 6c95a81-6c95a83 1192->1197 1198 6c95b83-6c95b99 1192->1198 1199 6c95bc5-6c95be6 1192->1199 1200 6c95c06-6c95c08 1192->1200 1201 6c95a18-6c95a29 1192->1201 1202 6c95b5b-6c95b63 1192->1202 1203 6c95adb-6c95add 1192->1203 1204 6c95d5b-6c95d6c 1192->1204 1205 6c959da-6c959ed 1192->1205 1206 6c95a5d-6c95a5f 1192->1206 1207 6c95b9e-6c95ba0 1192->1207 1208 6c95b51-6c95b56 1192->1208 1209 6c95c52-6c95c7d 1192->1209 1210 6c95b12-6c95b20 1192->1210 1211 6c95d14-6c95d1b 1192->1211 1212 6c95ae9-6c95b02 1192->1212 1213 6c95b68-6c95b7e 1192->1213 1214 6c95beb-6c95bf6 call 6c965db 1192->1214 1215 6c95cea-6c95cef 1192->1215 1216 6c95d2d-6c95d34 1192->1216 1217 6c959ac-6c959b3 1192->1217 1218 6c95a6f-6c95a71 1192->1218 1219 6c95d20-6c95d28 1192->1219 1220 6c95aa4-6c95aac 1192->1220 1221 6c95c27-6c95c2f 1192->1221 1222 6c95d39-6c95d4d 1192->1222 1223 6c95a39-6c95a3b 1192->1223 1224 6c95ab1-6c95acd 1192->1224 1225 6c95cb2-6c95cc3 1192->1225 1226 6c95cf4-6c95d0f 1192->1226 1227 6c95c34-6c95c45 1192->1227 1228 6c959f4-6c95a07 1192->1228 1193->1191 1194->1202 1260 6c95ce0-6c95ce5 1194->1260 1195->1194 1232 6c95c94-6c95ca2 1195->1232 1196->1191 1197->1226 1236 6c95a89-6c95a97 1197->1236 1198->1191 1199->1191 1200->1228 1230 6c95c0e-6c95c1c 1200->1230 1248 6c95a30-6c95a37 1201->1248 1202->1191 1203->1210 1238 6c95adf-6c95ae4 1203->1238 1262 6c95d6e 1204->1262 1263 6c95d76-6c95e05 call 6c953a4 1204->1263 1205->1228 1206->1195 1234 6c95a65-6c95a6a 1206->1234 1207->1197 1229 6c95ba6-6c95bb7 1207->1229 1208->1191 1209->1191 1259 6c95c83-6c95c86 1209->1259 1257 6c95b28-6c95b39 1210->1257 1211->1191 1212->1191 1264 6c95b08-6c95b0d 1212->1264 1213->1191 1267 6c95bfc-6c95c01 1214->1267 1216->1191 1218->1205 1235 6c95a77-6c95a7c 1218->1235 1220->1191 1221->1191 1222->1191 1237 6c95d53-6c95d56 1222->1237 1223->1203 1233 6c95a41-6c95a4f 1223->1233 1224->1191 1261 6c95ad3-6c95ad6 1224->1261 1225->1191 1227->1191 1231 6c95c4b-6c95c4d 1227->1231 1228->1196 1229->1191 1240 6c95bbd-6c95bc0 1229->1240 1230->1191 1244 6c95c22 1230->1244 1231->1191 1232->1191 1247 6c95ca8-6c95cad 1232->1247 1233->1191 1250 6c95a55-6c95a58 1233->1250 1234->1191 1235->1191 1236->1191 1253 6c95a9d-6c95a9f 1236->1253 1237->1191 1238->1191 1240->1191 1244->1191 1247->1191 1248->1191 1250->1191 1253->1191 1257->1191 1265 6c95b3f-6c95b42 1257->1265 1259->1191 1260->1191 1261->1191 1262->1263 1278 6c95e0a-6c95e24 1263->1278 1264->1191 1265->1191 1267->1191 1278->1191 1280 6c95e2a-6c95e2f 1278->1280 1280->1191
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: [wl^
                                                    • API String ID: 0-1344784805
                                                    • Opcode ID: d1ff3d470d5fcfa06a69c9b8d73a6db9cf74e3ca7b2512236de1c239f3a06cb2
                                                    • Instruction ID: 81db6b90b8ba2559de3395f911a60d9f8f8480b8c6d05a1e3785cbd01207f513
                                                    • Opcode Fuzzy Hash: d1ff3d470d5fcfa06a69c9b8d73a6db9cf74e3ca7b2512236de1c239f3a06cb2
                                                    • Instruction Fuzzy Hash: BDC18070A00204CFFB56DB66D5987A9B7B3EB84320F91C568E40D5B394DB389D46CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1555 6bf1468-6bf1482 1556 6bf148e-6bf149a 1555->1556 1557 6bf1484-6bf148b 1555->1557 1559 6bf149c-6bf14a9 1556->1559 1560 6bf14f6-6bf14f9 1556->1560 1569 6bf14af-6bf14df 1559->1569 1570 6bf16c7-6bf16ff 1559->1570 1561 6bf150c-6bf150f 1560->1561 1562 6bf14fb-6bf14fd 1560->1562 1564 6bf1535-6bf1538 1561->1564 1565 6bf1511-6bf152f 1561->1565 1568 6bf1505 1562->1568 1566 6bf153e-6bf1544 1564->1566 1567 6bf16bd-6bf16c4 1564->1567 1565->1564 1573 6bf1706-6bf1751 1565->1573 1566->1567 1571 6bf154a-6bf1553 1566->1571 1568->1561 1596 6bf14ec-6bf14ef 1569->1596 1597 6bf14e1-6bf14ea 1569->1597 1570->1573 1578 6bf158b-6bf1591 1571->1578 1579 6bf1555-6bf1564 1571->1579 1602 6bf178a-6bf178c 1573->1602 1603 6bf1753-6bf1760 1573->1603 1582 6bf169c-6bf16a2 1578->1582 1583 6bf1597-6bf15a0 1578->1583 1579->1578 1590 6bf1566-6bf157f 1579->1590 1582->1567 1587 6bf16a4-6bf16b4 1582->1587 1583->1582 1592 6bf15a6-6bf15b2 1583->1592 1587->1567 1600 6bf16b6-6bf16bb 1587->1600 1590->1578 1604 6bf1581-6bf1584 1590->1604 1606 6bf15b8-6bf15e0 1592->1606 1607 6bf1650-6bf1694 1592->1607 1596->1560 1597->1560 1600->1567 1605 6bf1bd7-6bf1bde 1602->1605 1603->1602 1610 6bf1762-6bf1788 1603->1610 1604->1578 1606->1607 1618 6bf15e2-6bf161f 1606->1618 1607->1582 1610->1602 1621 6bf1791-6bf17c5 1610->1621 1618->1607 1632 6bf1621-6bf164e 1618->1632 1630 6bf17cb-6bf17d4 1621->1630 1631 6bf1868-6bf1877 1621->1631 1633 6bf1bdf-6bf1bef 1630->1633 1634 6bf17da-6bf17ed 1630->1634 1639 6bf1879-6bf188f 1631->1639 1640 6bf18b6 1631->1640 1632->1582 1642 6bf17ef-6bf1808 1634->1642 1643 6bf1856-6bf1862 1634->1643 1648 6bf18af-6bf18b4 1639->1648 1649 6bf1891-6bf18ad 1639->1649 1641 6bf18b8-6bf18bd 1640->1641 1646 6bf18bf-6bf18e0 1641->1646 1647 6bf1900-6bf191c 1641->1647 1642->1643 1663 6bf180a-6bf1818 1642->1663 1643->1630 1643->1631 1646->1647 1667 6bf18e2 1646->1667 1655 6bf19e4-6bf19ed 1647->1655 1656 6bf1922-6bf192b 1647->1656 1648->1641 1649->1641 1659 6bf1bd5 1655->1659 1660 6bf19f3 1655->1660 1656->1633 1661 6bf1931-6bf194e 1656->1661 1659->1605 1664 6bf1a5e-6bf1a6c 1660->1664 1665 6bf19fa-6bf19fc 1660->1665 1666 6bf1a01-6bf1a0f 1660->1666 1684 6bf1954-6bf196a 1661->1684 1685 6bf19d2-6bf19de 1661->1685 1663->1643 1671 6bf181a-6bf181e 1663->1671 1679 6bf1a6e-6bf1a76 1664->1679 1680 6bf1a84-6bf1a9b 1664->1680 1665->1605 1676 6bf1a27-6bf1a2e 1666->1676 1677 6bf1a11-6bf1a19 1666->1677 1669 6bf18e5-6bf18fe 1667->1669 1669->1647 1671->1633 1675 6bf1824-6bf183d 1671->1675 1675->1643 1693 6bf183f-6bf1853 1675->1693 1676->1605 1677->1676 1679->1680 1691 6bf1a9d-6bf1aa5 1680->1691 1692 6bf1ab3-6bf1ac6 1680->1692 1684->1685 1697 6bf196c-6bf197a 1684->1697 1685->1655 1685->1656 1691->1692 1699 6bf1ade-6bf1afb 1692->1699 1700 6bf1ac8-6bf1ad0 1692->1700 1693->1643 1697->1685 1703 6bf197c-6bf1980 1697->1703 1710 6bf1afd-6bf1b05 1699->1710 1711 6bf1b13 1699->1711 1700->1699 1703->1633 1706 6bf1986-6bf19af 1703->1706 1706->1685 1715 6bf19b1-6bf19cf 1706->1715 1710->1711 1711->1605 1715->1685
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150744731.0000000006BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bf0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d13520aca352554fc00c51ba29d340c5816818d170c955358af1688590340960
                                                    • Instruction ID: 203294a636bbf04bf2bd3fd131d1ac0552b2fcc90f28a92bb49be45a616f8b18
                                                    • Opcode Fuzzy Hash: d13520aca352554fc00c51ba29d340c5816818d170c955358af1688590340960
                                                    • Instruction Fuzzy Hash: 1C225674B10604CFDB58DF69C584A6AB7F6EF88710B1588A9E606CB371DB31EC45CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a0951f791dcdb937d42fbe4f43931bfbdee85e69ddd592b335005b3f4302d278
                                                    • Instruction ID: be2efcbe027c9cf9d7615b52069bf1499dabcfcd4f3f96cdb0beb482eb5c776e
                                                    • Opcode Fuzzy Hash: a0951f791dcdb937d42fbe4f43931bfbdee85e69ddd592b335005b3f4302d278
                                                    • Instruction Fuzzy Hash: E8D17334A00504CFDF89DF65D548BAA73F3EB89314F508469E4159F764DB38AD86CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2d2ea19925351dd80106b445226c5b3c3b284a034cfb8c1b1baa92d4c88387d4
                                                    • Instruction ID: 0327d07728aaedc102dd01fd8f2181fc46b870ee37d5c50608d187374a848d91
                                                    • Opcode Fuzzy Hash: 2d2ea19925351dd80106b445226c5b3c3b284a034cfb8c1b1baa92d4c88387d4
                                                    • Instruction Fuzzy Hash: 0DC16134A00504CFDB89DF65D648BAAB3F3EB89314F508469E4159F764DB38AD86CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 69afc2b0b169fdb333ff14ca0b6e728673a1b25f9b3a5928392e1d86cad5aeeb
                                                    • Instruction ID: 30b9a794ff44be8744c6e1a9564b67e88b0c009d2350be0ccfb22e782f75139b
                                                    • Opcode Fuzzy Hash: 69afc2b0b169fdb333ff14ca0b6e728673a1b25f9b3a5928392e1d86cad5aeeb
                                                    • Instruction Fuzzy Hash: CCD13B30A22104CFDB94CF29D58CBA977F2FF49714F2580A8E4059B7A1D778AD85CB60
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 90521391979e767c0529cc10d3da5261cfc6ca61840942782a9e1cda0d51f3c2
                                                    • Instruction ID: dc048ad439fc99734ae1f7f284b8e492c7b8b2fe5d70a7413a0c747c34d30d77
                                                    • Opcode Fuzzy Hash: 90521391979e767c0529cc10d3da5261cfc6ca61840942782a9e1cda0d51f3c2
                                                    • Instruction Fuzzy Hash: C6B18A70E002498FDF50CFA9C9897ADBBF2BF88314F148529D819E7294EB749941CFA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d504890eba7ac1dbfe3ce6ae29e30ec212ff557edf76cbf6c6baca84ed07cea6
                                                    • Instruction ID: bfbdd23ff470b1ff5659a14d920d272542724f2a13f4e978969bae5c2e6eca76
                                                    • Opcode Fuzzy Hash: d504890eba7ac1dbfe3ce6ae29e30ec212ff557edf76cbf6c6baca84ed07cea6
                                                    • Instruction Fuzzy Hash: F591A171E102099FDF64CFA9C9887EDBBF2BF88704F14812DD444A7294DB389A45CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6d1a0f5a56a356ba685df1cc8c58dc8b2c873b4e972fa9148dcf4c922fabb6ac
                                                    • Instruction ID: 89c6058610a9a59c066b6bc0edb3c027bc0e04bdd05c6c058f0e8b43a0c17eba
                                                    • Opcode Fuzzy Hash: 6d1a0f5a56a356ba685df1cc8c58dc8b2c873b4e972fa9148dcf4c922fabb6ac
                                                    • Instruction Fuzzy Hash: 5C91C130A01144CFEF98CB66D648BA973F3EB89315F15C079E0069B7A0DB3C9986CB65
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 494f666236186ad9f9b8bfc351bfabb51a50a1dbbe88213468e0e904d5ea43d6
                                                    • Instruction ID: 8579a267980542fbca00ff8eae0f188c0216ab09941ab6ddd96052bd511ebe12
                                                    • Opcode Fuzzy Hash: 494f666236186ad9f9b8bfc351bfabb51a50a1dbbe88213468e0e904d5ea43d6
                                                    • Instruction Fuzzy Hash: 1B91B130A01144CFEF98CB66D649BA973F3EB89314F15C079E1069B7A0DB3C9986CB65
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 17cbf34f2e3669dad574f34b3f582b2f61a1a516a8fd3ea47aa2615a773cf4f2
                                                    • Instruction ID: a5250c8615591ad4d962ac4661d9a11835cab50506f5b14c49c229b8dd1da78e
                                                    • Opcode Fuzzy Hash: 17cbf34f2e3669dad574f34b3f582b2f61a1a516a8fd3ea47aa2615a773cf4f2
                                                    • Instruction Fuzzy Hash: BF91C0B0E01548CFEB54CB1AD544BED77F2FB89328F1480A9E105AF295F7389889CB94
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 01a5d1ebac23b543d64e690526a247606c95cd550afce21d1fbe02ed1c24b67a
                                                    • Instruction ID: b147b8eb142b75aba57c812c3e9d6212f87b638ade10aacca326b848a1301dce
                                                    • Opcode Fuzzy Hash: 01a5d1ebac23b543d64e690526a247606c95cd550afce21d1fbe02ed1c24b67a
                                                    • Instruction Fuzzy Hash: 4E91BFB0E00548CFEB54CB5AD544BAD77F3FB89328F1490A9E105AF295F7389889CB94
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 39cf105618dd419b010ac6d6a7b95b395ae03a154660d6ec5ed8853ee09879bf
                                                    • Instruction ID: 6f8a3760d2c84da581bb4ebc8003fb3289408d134af068e3dac1f6d1d05c7e1b
                                                    • Opcode Fuzzy Hash: 39cf105618dd419b010ac6d6a7b95b395ae03a154660d6ec5ed8853ee09879bf
                                                    • Instruction Fuzzy Hash: 6B81B1B0E00588CFEB54CF5AD544BAD77F2FB89328F1490A5E105AF295F7389889CB54
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5b654a09291fa1c51230320b6c29c72eb320554ed619cac21e99306252822e2a
                                                    • Instruction ID: 99c0d5ce4270602d91a9fa71a9e3f75cd41636453f656beccd5cac9ddd490f44
                                                    • Opcode Fuzzy Hash: 5b654a09291fa1c51230320b6c29c72eb320554ed619cac21e99306252822e2a
                                                    • Instruction Fuzzy Hash: 1681AFB0E00548CFEB94CF5AD544BAD77F2FB89328F1490A9E105AF295F7389889CB54
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0d41ec71cd140d887f98fb5c4e452e74ac46b5a66758d2489ee2e1e2759aeeb0
                                                    • Instruction ID: 89ffb6dc429b16b0c858d9ccaa273dea6c78b074f25ebef38f8d2ad1b3e9cf13
                                                    • Opcode Fuzzy Hash: 0d41ec71cd140d887f98fb5c4e452e74ac46b5a66758d2489ee2e1e2759aeeb0
                                                    • Instruction Fuzzy Hash: 49814A74A056488FDB84CFA9D595BAD77F1BB4A304F50806EE42ADF3A1EB389945CF00

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 848 6c900f9-6c90107 850 6c9010c-6c90119 848->850 852 6c9011b-6c90120 850->852 853 6c90122 850->853 854 6c900aa-6c900ad 852->854 857 6c9012a-6c9012c 853->857 855 6c9015f-6c9016f 854->855 856 6c900b3 854->856 855->850 879 6c90171-6c90182 855->879 856->850 856->853 856->855 858 6c901c8-6c901df 856->858 859 6c900ba-6c900cb LdrInitializeThunk 856->859 860 6c9018f-6c901a2 856->860 861 6c902c1 856->861 862 6c90242-6c90250 856->862 863 6c90252 856->863 864 6c901e5 856->864 865 6c902a4-6c902bb 856->865 866 6c9012e-6c90134 857->866 867 6c90144-6c90152 857->867 884 6c901bc-6c901bf 858->884 885 6c901e1-6c901e3 858->885 876 6c900d0-6c900f4 859->876 873 6c901a4-6c901a8 860->873 883 6c902c2 861->883 871 6c90236-6c90239 862->871 874 6c90298-6c9029b 863->874 864->871 865->874 888 6c902bd-6c902bf 865->888 868 6c90138-6c9013a 866->868 869 6c90136 866->869 867->854 870 6c90158-6c9015a 867->870 868->867 869->867 870->854 871->862 877 6c9023b 871->877 873->864 882 6c901aa-6c901b8 873->882 874->861 880 6c9029d 874->880 876->873 877->861 877->862 877->863 877->865 879->854 887 6c90188-6c9018a 879->887 880->861 880->865 882->884 889 6c901ba 882->889 883->883 884->858 890 6c901c1 884->890 885->884 887->854 888->874 889->884 890->858 890->861 890->862 890->863 890->864 890->865
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 6ba02221bd7b79af6c36d08021802ac25f32b22ba329f0243e6c5c7b922f9e28
                                                    • Instruction ID: fec4d8b6490e5a1a5ef6ff506ad1b0f6a8cfcf66b97286c3d47178c47d93bc1a
                                                    • Opcode Fuzzy Hash: 6ba02221bd7b79af6c36d08021802ac25f32b22ba329f0243e6c5c7b922f9e28
                                                    • Instruction Fuzzy Hash: 44417E30B00605CFEF94CF26D54DB6973B3FB86319F28946DE1069B6A4DB398985CB60

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1182 522ca18-522ca99 VirtualProtect 1185 522caa2-522cac7 1182->1185 1186 522ca9b-522caa1 1182->1186 1186->1185
                                                    APIs
                                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0522CA8C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150205008.0000000005220000.00000040.00000800.00020000.00000000.sdmp, Offset: 05220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_5220000_csc.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 6c5f53fff7e495d2bc3e9c5ad7c1a80d66dd9e534625365ca01c9baf08b07cec
                                                    • Instruction ID: 9e42a9f459af0a53441af9639d992f3e7fa841467e4002f1dd86ec8c8ff35f5b
                                                    • Opcode Fuzzy Hash: 6c5f53fff7e495d2bc3e9c5ad7c1a80d66dd9e534625365ca01c9baf08b07cec
                                                    • Instruction Fuzzy Hash: 79111375D002499FDB24DFAAC444BAEFBF5EF48310F10842ED419A7200C779A904CFA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1282 522cbc8-522cc37 CloseHandle 1285 522cc40-522cc65 1282->1285 1286 522cc39-522cc3f 1282->1286 1286->1285
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150205008.0000000005220000.00000040.00000800.00020000.00000000.sdmp, Offset: 05220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_5220000_csc.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: 61c924b579ccb80788ec29f0273cf42c593405b311b82a230452b854b192f0c3
                                                    • Instruction ID: 31e511976c69a33025388de9618e0791f57343cfa058a0e4c6eb66f11e992de2
                                                    • Opcode Fuzzy Hash: 61c924b579ccb80788ec29f0273cf42c593405b311b82a230452b854b192f0c3
                                                    • Instruction Fuzzy Hash: BE116671D003498FDB24DFAAC4457AEFBF5EF88324F20841ED419A7240CB79A904CBA4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150709470.0000000006BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6be0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 748b0304cf54bbe5b4441a00fc8f77730f381d1db67d36304edb2b9d127bbc3e
                                                    • Instruction ID: 87b4848ef98965359cf424f58fdb97687ff68d3e89e425809a0335e7acbba8d9
                                                    • Opcode Fuzzy Hash: 748b0304cf54bbe5b4441a00fc8f77730f381d1db67d36304edb2b9d127bbc3e
                                                    • Instruction Fuzzy Hash: 3B028EB0F406259FABB43AAD445473A25E6EBC9741B0550A9E607DB384DFF08C6287F3
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150709470.0000000006BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6be0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 25e2e5ca821d8187cff790774366f098e5470e0b26e5bbb76dad3e64a80f3da0
                                                    • Instruction ID: a3c1b4a7c241998378265f8aa8e944d61f0738cbf9d4666b574613bf8f1415fe
                                                    • Opcode Fuzzy Hash: 25e2e5ca821d8187cff790774366f098e5470e0b26e5bbb76dad3e64a80f3da0
                                                    • Instruction Fuzzy Hash: D3C19D78B002019F9B997FAC949813E7AA3FBC62017145469E907C7391EFB49C1787A7
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8c9f740e788bc2398f896e395431dfd895662038bb14545a0a51be5f03f9c06c
                                                    • Instruction ID: 41690c820c11941bbf3ec3fe9be943418703cd72735a22a918a119e2bffcbcfe
                                                    • Opcode Fuzzy Hash: 8c9f740e788bc2398f896e395431dfd895662038bb14545a0a51be5f03f9c06c
                                                    • Instruction Fuzzy Hash: 09715C71D42369AFD7209A28DC04FEB7B79DB06255F0044E8E94AAF242F7204D49CBF6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fba9253383b1bdcab18b12eeb9b668bcaa05a7105f721362ff74d35674227686
                                                    • Instruction ID: 6eaaf36fae7a0357aff62e0a54f783ed9d239cd33d8b240e24932a3548a5ce3c
                                                    • Opcode Fuzzy Hash: fba9253383b1bdcab18b12eeb9b668bcaa05a7105f721362ff74d35674227686
                                                    • Instruction Fuzzy Hash: 6D919A74A006808FCB54DF69D594A59BBF2FF89300F1585A9E605AF3A1DB31ED01CFA4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 34b3c67891e7499df666e7402e945681022cad2a1ad669c837e87df9ccafcb40
                                                    • Instruction ID: a87ed017444ce64badbc8e15c331360a3656128dd0fe779fcc477bde76ef7353
                                                    • Opcode Fuzzy Hash: 34b3c67891e7499df666e7402e945681022cad2a1ad669c837e87df9ccafcb40
                                                    • Instruction Fuzzy Hash: 6681CD71B012189FCB14DFA5E894AADBBF2EF89311F2440A9E512EB390DB35DD42CB51
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bae939abe216b468abc82919afdf33350be58f13b011d73bd9e665f87d4fc6bb
                                                    • Instruction ID: ebbe14f54bc6dedf66be7fc0df0ee344b45aaad233221d02d5accddc96d0830a
                                                    • Opcode Fuzzy Hash: bae939abe216b468abc82919afdf33350be58f13b011d73bd9e665f87d4fc6bb
                                                    • Instruction Fuzzy Hash: 6471CFB1604201CFE7A49F35D54CB6A7BA2EB46301F1099A8E407CF7B1FB799845CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eae7bdf4da5a9f3ed55486727be93440ae42fde2a6d2ff64a584fa96a10a8b6e
                                                    • Instruction ID: b34b46c4bf70b0bc88955055627a17f9bb280ab2d9712c372b91b6010089cd80
                                                    • Opcode Fuzzy Hash: eae7bdf4da5a9f3ed55486727be93440ae42fde2a6d2ff64a584fa96a10a8b6e
                                                    • Instruction Fuzzy Hash: 9A71B0B5604201CFD7A49F35D54CB6A7BA2EB42301F1095A8E407CF7A1FB799845CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150709470.0000000006BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6be0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3d6db422262389a4351b22568ee1e8861a1473a6fcce621c91351f02b7782d34
                                                    • Instruction ID: 327ad3b241ed5af17255b9d200296dd5c737dcb0aa611dfa7454003144c4fa04
                                                    • Opcode Fuzzy Hash: 3d6db422262389a4351b22568ee1e8861a1473a6fcce621c91351f02b7782d34
                                                    • Instruction Fuzzy Hash: 21517FB07006024BE7082A9984A872AF2EBDFD8610F50447DB306CB355DFF98E1587A6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150493051.0000000006B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6b80000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cd86241dfee7d9a233d7904ef66c8bf785098a2b52b1494dba17d19d81075d29
                                                    • Instruction ID: 1fe4fab7f325818229a086bf03a6336e8c7d5a637ef5da5b3e48888dbfacb008
                                                    • Opcode Fuzzy Hash: cd86241dfee7d9a233d7904ef66c8bf785098a2b52b1494dba17d19d81075d29
                                                    • Instruction Fuzzy Hash: A6518C707006018FD7A9BFB8D85466E77A7EFC5240B2048ADE6068F391DE35EC42CBA5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0db2291e16045ee648bfec620b0e6fce273dede749eb65efd21772e08dbd7e36
                                                    • Instruction ID: 2bad72ad4bb48d163492c847e8bc6a70f803506aa752b5f1c2d1cd70e47af4ae
                                                    • Opcode Fuzzy Hash: 0db2291e16045ee648bfec620b0e6fce273dede749eb65efd21772e08dbd7e36
                                                    • Instruction Fuzzy Hash: 21514D76600100AFDB459FA9C845E597BB7FF8C314B168498F2099F372DA36DC21EBA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6714af7b75f32409f8d4c2ed39b400cd26b5f8b53bbcf20560f05d7d7090378
                                                    • Instruction ID: c55a713786d12386c6ced783b71a2f4806bddd1656a70cbebf69a702014fa2c0
                                                    • Opcode Fuzzy Hash: a6714af7b75f32409f8d4c2ed39b400cd26b5f8b53bbcf20560f05d7d7090378
                                                    • Instruction Fuzzy Hash: 9151F270B00504CFEB94CF5AD545BA977F3EB89310F1490A9E1099F2A4FB789C89CB84
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4f4f4d6b82daaac8a9b02dcef5acc04c4821ae8843a1860c527c1ecfa746f80b
                                                    • Instruction ID: ef9a2aa820428b96ef1528c521b1352c52bc014b8f58688c52693ecdadbd178a
                                                    • Opcode Fuzzy Hash: 4f4f4d6b82daaac8a9b02dcef5acc04c4821ae8843a1860c527c1ecfa746f80b
                                                    • Instruction Fuzzy Hash: 2D514670200B418FD3A59F29D44035A7BE2EF81310F248A6EE1568F3E1EB38E845CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5506e97b5180a3016ef0481e027e14577486ece385595ebc71eedf09e4b598f1
                                                    • Instruction ID: d0c4ed6f19a66369ce44c1da2cc56b669ded8aa033e79db7af308e27ad9b4222
                                                    • Opcode Fuzzy Hash: 5506e97b5180a3016ef0481e027e14577486ece385595ebc71eedf09e4b598f1
                                                    • Instruction Fuzzy Hash: 95415E787456108FC7496F78E95C22D37E2EB8A302F104468E40BCB3A5EF788D45CBA6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b0ac9de2b4acbe26d070e823ff0a284e175ab808f721ae87ee9b2794a307056c
                                                    • Instruction ID: 9b8f008298926914cb834e1a8cbdc2ff10b94b911ca2ce4d3fe71d28b30d067a
                                                    • Opcode Fuzzy Hash: b0ac9de2b4acbe26d070e823ff0a284e175ab808f721ae87ee9b2794a307056c
                                                    • Instruction Fuzzy Hash: CD4140B5B00205DFDB54DF69D894B6AB7B2EF88214F1484ADE5469F350EB31E801CF90
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4c0ccd4e12ac884b98bc8352c7b93ae204655e6962071157b3d9566e1ef10e1f
                                                    • Instruction ID: 90a497018abaa068d2e5dabdc473641a20d061c32171ba35939e23662b49438a
                                                    • Opcode Fuzzy Hash: 4c0ccd4e12ac884b98bc8352c7b93ae204655e6962071157b3d9566e1ef10e1f
                                                    • Instruction Fuzzy Hash: 543104357053516FD7196BA9E844A9FBFABEBCA220B14407AF609CB361DF318C01C3A1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4b1413e2e67265e6bb62b25d7e2e39af5eaeb43fcbbfc502e0f4df0248013ea4
                                                    • Instruction ID: 43c41ab87b88f0d4ae6d642cde52aa82c3505ad6a7e1253c653a7f62e62230ea
                                                    • Opcode Fuzzy Hash: 4b1413e2e67265e6bb62b25d7e2e39af5eaeb43fcbbfc502e0f4df0248013ea4
                                                    • Instruction Fuzzy Hash: 7141BFB0E006198FDB54DFA9C8406BFBBB5FF88304F008469E589EB261E734D945CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3813b46b8e0b3116ad9a3bae79ba38f00d69277054662e0dc20c9b8748bf8c26
                                                    • Instruction ID: ff40a92e45ccaed3232f917670813b0771555da2d04398c58c13a51006246328
                                                    • Opcode Fuzzy Hash: 3813b46b8e0b3116ad9a3bae79ba38f00d69277054662e0dc20c9b8748bf8c26
                                                    • Instruction Fuzzy Hash: 4931B4B1500B018FD374CF26D484357BBF6EF84310F208A6DE5968B6A1EB75E945CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1dc062c12669dd0374fa556084236c775d6743b248f0ab4cba62e56289d6523f
                                                    • Instruction ID: 53eae6e56dc60853d9562be939250bd08fc4624baa6b0ab16752992bb866f254
                                                    • Opcode Fuzzy Hash: 1dc062c12669dd0374fa556084236c775d6743b248f0ab4cba62e56289d6523f
                                                    • Instruction Fuzzy Hash: 1031D3B0A00104CFEB54CF56DA48BEA73F3EB88311F2580E9E205AF6A4EB785C45CB55
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b95e7269e787184af2d4d5299095b81c5815aacfa9a9d199b1b435076d486ab1
                                                    • Instruction ID: dd0390b3c4ce5446b87aaca7fc9efa57d3c3a98a53591cd3c2a2cc5129360d5b
                                                    • Opcode Fuzzy Hash: b95e7269e787184af2d4d5299095b81c5815aacfa9a9d199b1b435076d486ab1
                                                    • Instruction Fuzzy Hash: 3131C3B0A00108CFEB54CF56D648BAD73F3EB88311F1580E9E1059F6A4EB789D45CB55
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 34d322c53a7ed0df1ccc1b33f01ef9f720c31338ac07a09d164f3e15c97494e8
                                                    • Instruction ID: 824a852866ad8e9c0d2ddabbbd632037c343e85372641886879011b026c9b33b
                                                    • Opcode Fuzzy Hash: 34d322c53a7ed0df1ccc1b33f01ef9f720c31338ac07a09d164f3e15c97494e8
                                                    • Instruction Fuzzy Hash: D531FFF0A00104CFEB94CF96DA88BA973F3EB88351F1580E9E1059F2A4E7788C45CB15
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eb844724b96ded8b753b3b4ff058a7d2a12faf7b59723b3689da491ce8b4a677
                                                    • Instruction ID: b20f887bdea56f562bb20a5b8b877a61f78bb9a68d6407073c801cc78a4f43a0
                                                    • Opcode Fuzzy Hash: eb844724b96ded8b753b3b4ff058a7d2a12faf7b59723b3689da491ce8b4a677
                                                    • Instruction Fuzzy Hash: ED316BB0E002059FDB54DF69C558BAEBBF1BF4C310F1040A9E406AB3A1EB759D45CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 02885be4aaa2ace8da85e8deffceed5625021fe53efb5b3ffd53e72a610cac8c
                                                    • Instruction ID: 1e68f5f58c8ea77a990de5ecee40145b3b1adb566c9f67d855c0b6d2b35a30df
                                                    • Opcode Fuzzy Hash: 02885be4aaa2ace8da85e8deffceed5625021fe53efb5b3ffd53e72a610cac8c
                                                    • Instruction Fuzzy Hash: E0213DB1E04209AFDB50DFB8D5047BE7BF9EB44350F1480A6D516DB251E638CA41CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e2cd2ba44fef77643b028ccb1f0cda58841c4459dd4e92ddc2584ec1b0bb45a3
                                                    • Instruction ID: 58f70fb3d96bdde622bf4ad8cd2e52eef47c052591a13fdad422666bbba8fd7f
                                                    • Opcode Fuzzy Hash: e2cd2ba44fef77643b028ccb1f0cda58841c4459dd4e92ddc2584ec1b0bb45a3
                                                    • Instruction Fuzzy Hash: F5215C31A04219AFDB159FA8C454ADEBFB7AB8D320F145129E911A7390DB319C42CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 85d6a2b9d819f70db89babaf92a28992db0159cfc14ebf6f0a09432ec90fba5c
                                                    • Instruction ID: 8acb89d3c39ff81448055ca0fe292424b3ace2e67c3ad943e9a4e5b6cf6e4e5a
                                                    • Opcode Fuzzy Hash: 85d6a2b9d819f70db89babaf92a28992db0159cfc14ebf6f0a09432ec90fba5c
                                                    • Instruction Fuzzy Hash: 9421B0707103099FD754ABAAD84979F7BA6EB88310F108528F10BDB681DFB55D0287A6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 39e0ae4d9543c4b121192cbab843ae61023c3ee5ccfdb8f526e8232f8fa0afce
                                                    • Instruction ID: 2d9d0cb0497d9bbeb07589b905a508ebae33402b37c721ceb661dea1d2d4fbae
                                                    • Opcode Fuzzy Hash: 39e0ae4d9543c4b121192cbab843ae61023c3ee5ccfdb8f526e8232f8fa0afce
                                                    • Instruction Fuzzy Hash: 8F213D31A00219EFDB159FA8C4449DEBFB7FB8C320F149129E915A73A0DB719C42CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4178d63fc5b81ed36e5d371ea1ec88b07739b581d44e39a792e6f6e66f3349e6
                                                    • Instruction ID: 4e3d3dcec261a0dd317fc3be9cd11e31231d6fad10f4caafc78b1e6a84394b73
                                                    • Opcode Fuzzy Hash: 4178d63fc5b81ed36e5d371ea1ec88b07739b581d44e39a792e6f6e66f3349e6
                                                    • Instruction Fuzzy Hash: B911CB307046186FE358EABA8C51BAB6ADAABC9350F11447CB50ADB3D1DEA59C0543E8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ecaa1656c4ed89b2dbdb36078e71e647a7fcc5c822e7b306603c04c385de1be3
                                                    • Instruction ID: 6305a4c1454a0f7da8f8b303183b5a900b8c1ee25bb7f1bdfdd9c7078733677f
                                                    • Opcode Fuzzy Hash: ecaa1656c4ed89b2dbdb36078e71e647a7fcc5c822e7b306603c04c385de1be3
                                                    • Instruction Fuzzy Hash: 7611A375B002099FDB54AFB99845BAE7FF6EB88610F144069E646DB3C0EB71C901CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 04c4e66e209bf0e1388d8e7cb377723f9bea5a38ae13e0c5dd330b006199caab
                                                    • Instruction ID: 0a48cc96cb934e27bb73f805ac51656a6d52f9f299b4d249ada3b5919b84eb3f
                                                    • Opcode Fuzzy Hash: 04c4e66e209bf0e1388d8e7cb377723f9bea5a38ae13e0c5dd330b006199caab
                                                    • Instruction Fuzzy Hash: 9811D63A300345AFD7018F59EC80FDA7BA9EB89B20F0040AAFA04CB291C6B1D810C760
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 59765795b4d5424877dcff54edd346f0cc5031945e5b3957154b1c3b108b3b08
                                                    • Instruction ID: 6b39caf5c068f37969437b25922d2ae869c9d1c0c9124a4624c1495c30f7a18c
                                                    • Opcode Fuzzy Hash: 59765795b4d5424877dcff54edd346f0cc5031945e5b3957154b1c3b108b3b08
                                                    • Instruction Fuzzy Hash: FF11CA75B002199FDB54AFB988447AE7FF6EB88610F104069E606DB3C0EB71C901CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 69d92ddaa2e79ba983b2b8cc91406c8e4484587529620e9af9941165f9fe154b
                                                    • Instruction ID: 8e9f14cbde8cf43152a53edc749c6ff8d1a6832cdb2d0705c5567f49758b0a57
                                                    • Opcode Fuzzy Hash: 69d92ddaa2e79ba983b2b8cc91406c8e4484587529620e9af9941165f9fe154b
                                                    • Instruction Fuzzy Hash: 95216279B022199FDB44DFA8D594EADBBF2BF49300F104098E402AB361DB34AD41CF54
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150709470.0000000006BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6be0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de6080379b4257b2516a0d6b01095c1217ba5d492459b022750e5b32f2799155
                                                    • Instruction ID: 095278a4c26189c870861d5b8ad5b8cb282ecf2c87910242437769b982d659a5
                                                    • Opcode Fuzzy Hash: de6080379b4257b2516a0d6b01095c1217ba5d492459b022750e5b32f2799155
                                                    • Instruction Fuzzy Hash: 0501F275B093508FD7662B2958240AA3B62EBC3222B1800EBE846DB651C7654C96C7B3
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150493051.0000000006B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6b80000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fa1fa54f7bf3ca9f7c869ed2eb4e50b50a91a02bff6cb655eaa2089cf088f8ba
                                                    • Instruction ID: 74f54d74d51b203994a351a158d7f527db6da7dd7ce701a0fa10883f96d985c8
                                                    • Opcode Fuzzy Hash: fa1fa54f7bf3ca9f7c869ed2eb4e50b50a91a02bff6cb655eaa2089cf088f8ba
                                                    • Instruction Fuzzy Hash: 4A11D6B8A01214CFCB54DF68C48499DBBF5BF48221F1591E9E909A7351C734ED85CF90
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150493051.0000000006B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6b80000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c2a34fbc77f01df8baa96e1e6ae837b10e526931008502e7292ebd38644064c2
                                                    • Instruction ID: 5c65b9c885e511b8305cbfcfb58da829a6e8ec7b4236c77df619d5d513ad8df3
                                                    • Opcode Fuzzy Hash: c2a34fbc77f01df8baa96e1e6ae837b10e526931008502e7292ebd38644064c2
                                                    • Instruction Fuzzy Hash: 09F0F6B3E05155AFDB50AFBA9C056AEFB66DB84611F09C0BAD509D3100E6388C13CAD2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a3f973f5e996e82883e93a8863fb04d61218dcec065a632af7363cd94c8bf251
                                                    • Instruction ID: acb3bf9e52ce2285cedd7c52a8165ce4b6d7274fab5d28d04c75142ec067c25d
                                                    • Opcode Fuzzy Hash: a3f973f5e996e82883e93a8863fb04d61218dcec065a632af7363cd94c8bf251
                                                    • Instruction Fuzzy Hash: 56F059F2F0D2514FF75613645CA43296BA0EBC4300F0944EAC0428F2E5E946DC02C381
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8d7c2cac8337cd6305a1a6c5ec09acf6db7459f900b942e80349cc388537eb99
                                                    • Instruction ID: f25a240075d8013f3aefcbdee9dc4879106276680329feecc7b1715a29fe78f9
                                                    • Opcode Fuzzy Hash: 8d7c2cac8337cd6305a1a6c5ec09acf6db7459f900b942e80349cc388537eb99
                                                    • Instruction Fuzzy Hash: 2EF02B72F096525FE3588614984471EF7A5EBC9320F0944ADE5069F3D0D761AC41C380
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3e192f39e1fbb1e6437fd3be303e03f8ef95539632a675e42cf1cf84df5898ee
                                                    • Instruction ID: 6e8983cbe042406e378170fca23778d3485ed6525fd814bf1ffb98663681ca3d
                                                    • Opcode Fuzzy Hash: 3e192f39e1fbb1e6437fd3be303e03f8ef95539632a675e42cf1cf84df5898ee
                                                    • Instruction Fuzzy Hash: 6AF046B1E412025FD7608F2AE944F217BD8DB8A310F1644D5E8048F2A1F720EC41C2A1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 59c28a08831057953390435804bcf85d4c99b7ae8c0a0bdb312b81d95aa7ea28
                                                    • Instruction ID: 68a5e8239dc9eb856610c2cb82b7f01fa4ddd28587bd944edf4cbe003f727c28
                                                    • Opcode Fuzzy Hash: 59c28a08831057953390435804bcf85d4c99b7ae8c0a0bdb312b81d95aa7ea28
                                                    • Instruction Fuzzy Hash: 3CF0A7363042241FE31866791C55B7B5A5ADFC9650F16817EE40E9B296CCA18C0543B5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fe4c9322f462e91b31303439cd0a7779489a878adc052f04ce22d8925032f8c2
                                                    • Instruction ID: b07349aa9f52e173ab5c90b19159dd939ea9599a616644b21aaeb6be477d508d
                                                    • Opcode Fuzzy Hash: fe4c9322f462e91b31303439cd0a7779489a878adc052f04ce22d8925032f8c2
                                                    • Instruction Fuzzy Hash: EEF0E971E04318AFC709DFA8D8487DDBFB6EF41211F0580D6E046D7281DB300A81C795
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dfdc81524102b7322a30277de0cae2aad79547ebc2835d7ede5703352910a3ce
                                                    • Instruction ID: d31797baadad64b033a97a9475b8a9ccd5dbd9db3978438a57a68ec3770ffd0f
                                                    • Opcode Fuzzy Hash: dfdc81524102b7322a30277de0cae2aad79547ebc2835d7ede5703352910a3ce
                                                    • Instruction Fuzzy Hash: BD01FBB1D01276CEEBF4AB64C944795B3A5EF05340F0650E4CA1A6B250E734AE85CB92
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150493051.0000000006B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6b80000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c7471b44bc1ee3ba47a0b30f817cac48ed3b960a200e42f19bfea3ae8106f74
                                                    • Instruction ID: 52bed25e23347c7487a5f8cba845472d8a35fc068db6c35734f6805920e178e3
                                                    • Opcode Fuzzy Hash: 0c7471b44bc1ee3ba47a0b30f817cac48ed3b960a200e42f19bfea3ae8106f74
                                                    • Instruction Fuzzy Hash: A7F08972E051659FDB50EFBF981466EF7A6DB84611F05C0BAD90DD3100E6758C13CAC1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c4bd14d7facf6d1a94c388f49e2edeff4d9e6c079a4200ab3dd25ffc50d32a61
                                                    • Instruction ID: ef192e3b086f112e46d3d74b0685f7958b00cc40a627c2929eca45c6659cc9a3
                                                    • Opcode Fuzzy Hash: c4bd14d7facf6d1a94c388f49e2edeff4d9e6c079a4200ab3dd25ffc50d32a61
                                                    • Instruction Fuzzy Hash: 0FF05C70A1638CAFCB45DFB2AC426EE77A5CB45204F2041D5F809CF282E9350E1043E3
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 62489d962fbc8688eb5e86a58bc84f3a3d57372bc1351d1b9a6e732f1e3d0cbd
                                                    • Instruction ID: 4cb055bedb01d89a0aff1e2bded70c0d642208fe91d3eb32bfb4e50f864eecf2
                                                    • Opcode Fuzzy Hash: 62489d962fbc8688eb5e86a58bc84f3a3d57372bc1351d1b9a6e732f1e3d0cbd
                                                    • Instruction Fuzzy Hash: 95F04974B115108FC788EB38D85976D77E6EF8A311B0114A8E90BEB3A0EE349D45CBA5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150493051.0000000006B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6b80000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: af32ba75a7f67c5778fe33f8db24ce2a3c15b5353ca97f4319bb0b3840d729f3
                                                    • Instruction ID: dabaaa67be9cb696ebbe4a361dd46615e9fdef43863be81deed26c13d9a3e97b
                                                    • Opcode Fuzzy Hash: af32ba75a7f67c5778fe33f8db24ce2a3c15b5353ca97f4319bb0b3840d729f3
                                                    • Instruction Fuzzy Hash: 01F0F9B1D062738FEB90BB9CC9406ADB7B6AB14751F4604E4C91577201DB60ED07CB81
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 30243103deede54b6a93de80e3317c5dc88f66906a35e123103138cc196339dc
                                                    • Instruction ID: a2e08702e3dd37289a7689a44904f6029a42fb269a3df85ddeab2a169d921716
                                                    • Opcode Fuzzy Hash: 30243103deede54b6a93de80e3317c5dc88f66906a35e123103138cc196339dc
                                                    • Instruction Fuzzy Hash: EAE012253042182BE31C266A5855B3B958EDBC9690F55802EB50ACB395CDA58C0102F5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ce18316b6345b529f207c1ac91d31f09db8a08595d49febe5582c395e53a6209
                                                    • Instruction ID: bba8d1681ec847483813682c1b8e0cffecd1c3c748a1d21a603d6ecfae081f75
                                                    • Opcode Fuzzy Hash: ce18316b6345b529f207c1ac91d31f09db8a08595d49febe5582c395e53a6209
                                                    • Instruction Fuzzy Hash: 2AE04F7254F7D86FC75317706C618AB3F78080326531E01DBE488EA5A3D01A4A16C377
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0e85266be134dda401bf223c66c167604f0563e1d99017595e477066bee477d6
                                                    • Instruction ID: b9a9bb99ed966bec855f9a3f6f043843b3111b93166dc2b0e1074aba45aba444
                                                    • Opcode Fuzzy Hash: 0e85266be134dda401bf223c66c167604f0563e1d99017595e477066bee477d6
                                                    • Instruction Fuzzy Hash: 5AF06571E04218AFCB09DF99D48C6DDFFF7EF84621F048095E00697240DB701A81CB85
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 927c8beb8b1758dfc0e66481f0130618755b53ffb338fa0983a5d84591319b1e
                                                    • Instruction ID: 84bbc2ce0f3a8b2ad22941454731eb2faa0e8fd709590612e2368c39e73465d2
                                                    • Opcode Fuzzy Hash: 927c8beb8b1758dfc0e66481f0130618755b53ffb338fa0983a5d84591319b1e
                                                    • Instruction Fuzzy Hash: 4EE0E2A260E3D29FC307572088219CA7F316A6329030B40C3E5C4DF263E1288E2AE727
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fd6d4a32b0c21060e84e1e8c73d9194b2afead7bbd5ff20dc505f6b74e31f417
                                                    • Instruction ID: d7b3eb31c2e19d50ffffc3b27fa329d5c578862777ae36f577b4a7b4be887945
                                                    • Opcode Fuzzy Hash: fd6d4a32b0c21060e84e1e8c73d9194b2afead7bbd5ff20dc505f6b74e31f417
                                                    • Instruction Fuzzy Hash: F0E08676D05308AFC710DE749C41ADA7BACDB49311F1005F9D905D3261E9319A158791
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bad44ba1ba10c93df8b4e5f2d68e2dbf99c4994061ee2ec424a9f0861a14d4b0
                                                    • Instruction ID: 0c874584a25358152e5d62712a1f2f92fea159d5acfc0b6e793d0c0cf6f5fcd0
                                                    • Opcode Fuzzy Hash: bad44ba1ba10c93df8b4e5f2d68e2dbf99c4994061ee2ec424a9f0861a14d4b0
                                                    • Instruction Fuzzy Hash: 76E0DF31A05208AFC700DFB9E94469E77A6DB48201F204098B90A97381DA721E1087B3
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8a303a4f5523be986b8b468fa5127952018fc6310960d0137e1128097e035032
                                                    • Instruction ID: 81bf7177b801248cca75d053541818dae365c7c37b0fbaca1993f02516f1e1d6
                                                    • Opcode Fuzzy Hash: 8a303a4f5523be986b8b468fa5127952018fc6310960d0137e1128097e035032
                                                    • Instruction Fuzzy Hash: 74D01772A0520CABCB10DEB5AD015AAB7ACDB09221B1009F99D0DC3200FA329A15D791
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150493051.0000000006B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6b80000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 38350bf9f7600a7ab3fb76d4445759d9526a3a89a26b901049ae66a58ad3ff56
                                                    • Instruction ID: 715bf46abca35310cefbdcf3aa1af7fb8290e44a6497ba8ce59ea582b32ea3d0
                                                    • Opcode Fuzzy Hash: 38350bf9f7600a7ab3fb76d4445759d9526a3a89a26b901049ae66a58ad3ff56
                                                    • Instruction Fuzzy Hash: 8FF09278A01218CFD754DF28C584A88BBB1BF4D314F1141E9E90AA7361C730AE81CF40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 50c27e067ae6a40d46be77757a4e5ab8e3ef52c625431bae8d0f7553a7c91928
                                                    • Instruction ID: 727712a338d32d6137f2fcd516f7138786d99607349e0e18c98ed7ba05596bef
                                                    • Opcode Fuzzy Hash: 50c27e067ae6a40d46be77757a4e5ab8e3ef52c625431bae8d0f7553a7c91928
                                                    • Instruction Fuzzy Hash: 56E0C230A0120CEFCB04EFF5E98176E73BAEB44204F208498F506DB280DE312F009792
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5f72b2d8939ba79e198c24a981dfdab70dca7be4a590d4d5debfcfc0cb8fc82a
                                                    • Instruction ID: d876a77e1bc983577d477ca7e333300809778c83e1ef1106ff512e6c57c6c239
                                                    • Opcode Fuzzy Hash: 5f72b2d8939ba79e198c24a981dfdab70dca7be4a590d4d5debfcfc0cb8fc82a
                                                    • Instruction Fuzzy Hash: BBE0C230A0010CEFCB40EFE9E50469E73F6EB44210F204098B40AD7380DA321F1087A2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a1ddf783a994ce644aa5788845060f1038947da62cfec7aa50965a9e80802b3f
                                                    • Instruction ID: 776c201bafac83f31fd054472a1f970dfc9077d4ffcc443544f91b822798c9ba
                                                    • Opcode Fuzzy Hash: a1ddf783a994ce644aa5788845060f1038947da62cfec7aa50965a9e80802b3f
                                                    • Instruction Fuzzy Hash: 6CE0B6B5D01635CFEBA4DB24C880B99B7B5FF09351F0141E4CA4AAB221E730AD45CB41
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 97b717e270a8d393b3ffde7867507027ab904765b9d50ae3a1659e0697581b05
                                                    • Instruction ID: 856baa656263de67ae9352b89ac3e3f7b98e91ca1ec64993675efd130e4778d3
                                                    • Opcode Fuzzy Hash: 97b717e270a8d393b3ffde7867507027ab904765b9d50ae3a1659e0697581b05
                                                    • Instruction Fuzzy Hash: 1ED017B4F012568FFBD89A2A98456652317ABC5200B2595BAA0025E294EF3B4900EA96
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b311cfe134be0ee8f90e4136c2738b05b2bf6c0bee93f6f1e2dc2ac2104bf665
                                                    • Instruction ID: cad58a4b58e6cb737daf1708b0be3d0e8d29973ee03f4b8e14fba172426048e6
                                                    • Opcode Fuzzy Hash: b311cfe134be0ee8f90e4136c2738b05b2bf6c0bee93f6f1e2dc2ac2104bf665
                                                    • Instruction Fuzzy Hash: 12D0CA34800628CBDB668B20C800B9AB672AF04302F1080E9890967340DA365E868F91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 76b778587a2be7add9f4485379a5ed2acc7ea27731e818371d2b3a1d72850873
                                                    • Instruction ID: ae23f420ef46ab5fb53a12284333c6a52c1ff2ab81e4d2735d0360b1e0fb0f1e
                                                    • Opcode Fuzzy Hash: 76b778587a2be7add9f4485379a5ed2acc7ea27731e818371d2b3a1d72850873
                                                    • Instruction Fuzzy Hash: A5B01277B0001986CB00D6C8F4C04DCFB30DBD4332F004033C324620008730157AC7A0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 10ce1e86b3c5ca348c1496f46a12b672b430c5204718dec6403bc1e973a6e660
                                                    • Instruction ID: 5ba1691037766c2b17e9c141901a0679730646fbe07093444b92700234c9b5fb
                                                    • Opcode Fuzzy Hash: 10ce1e86b3c5ca348c1496f46a12b672b430c5204718dec6403bc1e973a6e660
                                                    • Instruction Fuzzy Hash: 74C09B709021568FE784DB14EC497543322A741300F1195E4640D6A2A49D391F45CFC1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4877bf1a401686477d32cd513661760759064a3487441e32f821e9dedad4ab58
                                                    • Instruction ID: 179c77a54af812d73f998989a676ac6043929da4181dbceebf0d5976cbc87214
                                                    • Opcode Fuzzy Hash: 4877bf1a401686477d32cd513661760759064a3487441e32f821e9dedad4ab58
                                                    • Instruction Fuzzy Hash: 15A002747826057EEF2077E66E0BFCA7A1AAB40F11F102080B30A5C0C24AE2548189B7
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150493051.0000000006B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6b80000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2f725f804abf44d1cbcf84273ee09974fdb1ccba9c197a3c344760bf18a8ae25
                                                    • Instruction ID: 6ee85b4155d051ab7ab1ad3f1b4a772bf4c18acbccbc14ae59e72226a72b0b5d
                                                    • Opcode Fuzzy Hash: 2f725f804abf44d1cbcf84273ee09974fdb1ccba9c197a3c344760bf18a8ae25
                                                    • Instruction Fuzzy Hash: EAB012389050018FE700A790D00839C76229B48322F0880618C0633784857D8C86CAD2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b98f38ca89d776274bf3ef54d8f895f84ccb1e92ba24232317d860732b4e72a8
                                                    • Instruction ID: 7308059fdb63845f292333ba6868f628586d62cb967f5e76061d76a9621f69cd
                                                    • Opcode Fuzzy Hash: b98f38ca89d776274bf3ef54d8f895f84ccb1e92ba24232317d860732b4e72a8
                                                    • Instruction Fuzzy Hash: EC902230002F0C8B0A802BE03C080003B0CB0020003800020A00C802000B22300200A0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150744731.0000000006BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bf0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 48de5c6cba0ab38f8f2674ffc819e852b2a2c0023491c118013b846596983001
                                                    • Instruction ID: 4373ef75d19cd055e2664bd19aa1294cfeb3652f90ebef4426c6060fc03e06fd
                                                    • Opcode Fuzzy Hash: 48de5c6cba0ab38f8f2674ffc819e852b2a2c0023491c118013b846596983001
                                                    • Instruction Fuzzy Hash: 9A226AB4B002159FCB98DF69D49467EFBF2FB88300F248929D65697361CB34E906CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ddabb1b656a3459e8dd9f4c9b328f11fcf297ed15a3dcbf119aec402c2e40628
                                                    • Instruction ID: 94203e1f9edc6ffdc45f74a349b3d4d17aef0f1ec01773ef509e645dc02b2eea
                                                    • Opcode Fuzzy Hash: ddabb1b656a3459e8dd9f4c9b328f11fcf297ed15a3dcbf119aec402c2e40628
                                                    • Instruction Fuzzy Hash: FAD11874A046058FDB94DF69C684AA9B7F6FF88314F25C4A9E5069F361DB30EC41CB60
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 58173f05cd84ca3d746411ff3c2738bd6d78d20518137ae649c19433847ea9ad
                                                    • Instruction ID: c912a03285c8ec98705beee76d2e632d9458a315ae5a7b684f636c65b7d21d05
                                                    • Opcode Fuzzy Hash: 58173f05cd84ca3d746411ff3c2738bd6d78d20518137ae649c19433847ea9ad
                                                    • Instruction Fuzzy Hash: D2C191B2E005298FDB64CBA9C9806AEFBF1FF44301F5885A9D455EB242E734ED41CB94
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 444e2c0774de8fed759f1d60e87916105080cbcb7c31e8508302cd557e2a326d
                                                    • Instruction ID: dd4d55c06938f51efd3644bec0c6e839592326b8bd6cf96688ca5c325982c0c9
                                                    • Opcode Fuzzy Hash: 444e2c0774de8fed759f1d60e87916105080cbcb7c31e8508302cd557e2a326d
                                                    • Instruction Fuzzy Hash: C0B18F70E102099FEF54CFA9C88979DBBF2BF88304F14852DD445A7294EB78DA41CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 182eb967c05c7695f98ebff8ceae1196b756fd2761b797cdef45f31136406435
                                                    • Instruction ID: 2027f6eed9814b97910429a5dea63cb61d50498b9e0c292266350cf61438bd2d
                                                    • Opcode Fuzzy Hash: 182eb967c05c7695f98ebff8ceae1196b756fd2761b797cdef45f31136406435
                                                    • Instruction Fuzzy Hash: 86B15C30A22100CFDB94CF29D58CBA977F3FB89315F2584A8E4059B7A5D778AD85CB60
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 122a3be2ac6c7560c3ef8b25f9f0c4714dfe43151d108ca132600b819f90a9b0
                                                    • Instruction ID: 0c3250ae5da783fbbd9a75fc34251f1bcbf2fccf1d4ed817adc24ce6eb1094f4
                                                    • Opcode Fuzzy Hash: 122a3be2ac6c7560c3ef8b25f9f0c4714dfe43151d108ca132600b819f90a9b0
                                                    • Instruction Fuzzy Hash: A27161B2E005298FDB54CFA9C8806AEFBF1FB48311F188569D415EB245E734D946CF90
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f8f9db3a074b03dc3d442351519d9114e1cf6ce9491db58999dbc0688952145a
                                                    • Instruction ID: 542ac08bcb656b12d103d7ed1f5071e82db99ec70deb36d3e567a18f16ab9fc0
                                                    • Opcode Fuzzy Hash: f8f9db3a074b03dc3d442351519d9114e1cf6ce9491db58999dbc0688952145a
                                                    • Instruction Fuzzy Hash: C161B430B01180CFDF94CF6AC588B6A77F3FB85311F248069E0099B6A4DB789D45CBA4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3a3276dddb18dc9703b9434e07392f864728b66a7a2d09f9bde8e3f606b0b3c4
                                                    • Instruction ID: 773aef9462a5a04d9fd1ae2faa83a9541813480448ce9e59777421b5d6cd86ca
                                                    • Opcode Fuzzy Hash: 3a3276dddb18dc9703b9434e07392f864728b66a7a2d09f9bde8e3f606b0b3c4
                                                    • Instruction Fuzzy Hash: 53812A74A006488FDB84CFA9D595BAD77F2BB49304F50846EE42ADF3A1EB389945CF00
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150809099.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c90000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5e78b0b0853d13a0b868c0fac6c9f10d9d8bb00f8a05e946887770cc37026d61
                                                    • Instruction ID: 9eb0b1e78e19421af3fcf41c23607fb26acdbce9721ca8d2a48278ac3994571c
                                                    • Opcode Fuzzy Hash: 5e78b0b0853d13a0b868c0fac6c9f10d9d8bb00f8a05e946887770cc37026d61
                                                    • Instruction Fuzzy Hash: CA619330A01184CFEF94CF6AD588B6A77F3FB84311F148469E0099B6A4DB789D85CBA4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d416000fe016028a7d103a67a2ba5bf7cdabc1a7735f55cb537dbb8e2dce15ff
                                                    • Instruction ID: e7e89d522a7d1f69e8bf02439dadbb6dfc9d30b5a89120d8e929222f0967f7f3
                                                    • Opcode Fuzzy Hash: d416000fe016028a7d103a67a2ba5bf7cdabc1a7735f55cb537dbb8e2dce15ff
                                                    • Instruction Fuzzy Hash: 79811874A016488FDB84CFA9D595B9D77F1BB4A304F5084AEE42ADF3A1EB389945CF00
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 60533016970455bace3383fef3b347c9ef7d74bb6ecc3a5ab90fac975b351752
                                                    • Instruction ID: c3f12e94e8efa4a0051cbab5814f8bfa0fd9d56b2b014531f79b71b66f13037a
                                                    • Opcode Fuzzy Hash: 60533016970455bace3383fef3b347c9ef7d74bb6ecc3a5ab90fac975b351752
                                                    • Instruction Fuzzy Hash: E1615C74A04648CFDB44CFA9D595B9D7BF1BB4A304F50806DE41A9F3A1EB389945CF00
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150205008.0000000005220000.00000040.00000800.00020000.00000000.sdmp, Offset: 05220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_5220000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 75e1cb6f9e095ed886770ed8ae6c05bc035ba6f0cdc0935be987ef02e6e65284
                                                    • Instruction ID: a6aae3014cdd3b8d4f1074964a5ed1b2442826090aeb9e6bfa5cc68c70f9c3dc
                                                    • Opcode Fuzzy Hash: 75e1cb6f9e095ed886770ed8ae6c05bc035ba6f0cdc0935be987ef02e6e65284
                                                    • Instruction Fuzzy Hash: BC51AC34A057848FE708DF6BE84568ABBE3BBCA300F14C529F4149F3B4EB7919059B64
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cf364da0e719b861a3103b653d5cb2424bbbe6ef3f9bebfeb63ca2ddc658a703
                                                    • Instruction ID: 2cfd89a4f672776b0e4a5ff3214447ebe51d7044ce06176ea1f13e676530bbf6
                                                    • Opcode Fuzzy Hash: cf364da0e719b861a3103b653d5cb2424bbbe6ef3f9bebfeb63ca2ddc658a703
                                                    • Instruction Fuzzy Hash: 62713974A00648CFDB84CFAAD595B9D7BF2BB46304F54846DE02A9F3A1EB389945CF00
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 00383f41a1c064a3c80cdbd70d132850c71bef1962eef502712af58828aa0efa
                                                    • Instruction ID: c61943bee3a586b157239c1a1cf15e69b85cb615dcece5ad202e492b50c5ac5a
                                                    • Opcode Fuzzy Hash: 00383f41a1c064a3c80cdbd70d132850c71bef1962eef502712af58828aa0efa
                                                    • Instruction Fuzzy Hash: 1E712974A00648CFDB84CFA9D595B9D77F2BB46304F5084ADE02A9F3A1EB389945CF00
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 31a1e21fbb347996f338997cce96d6979255a35ee739112402a34ef472aaab43
                                                    • Instruction ID: 6909609c621746e8d8ae37da3c791f753d7c1c1ae35969348dfe45d12c6bade7
                                                    • Opcode Fuzzy Hash: 31a1e21fbb347996f338997cce96d6979255a35ee739112402a34ef472aaab43
                                                    • Instruction Fuzzy Hash: CB615974A00648CFDB84CFA9D595B9D77F2BB4A304F50806DE42A9F3A1EB389945CF40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150205008.0000000005220000.00000040.00000800.00020000.00000000.sdmp, Offset: 05220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_5220000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 41a81af9e77af1a5beb881c040285500e6e639997a55651e9acb39662d0bf8a2
                                                    • Instruction ID: 1281ed6059f31715c4bec70c5179dace668a3bc8e3d190c223e9f9d8dff0efac
                                                    • Opcode Fuzzy Hash: 41a81af9e77af1a5beb881c040285500e6e639997a55651e9acb39662d0bf8a2
                                                    • Instruction Fuzzy Hash: 6E51B934A057848FE708DF6BE84568ABBE3BBCA300F14C529F4149F3B4EB7919059B64
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c1eecc3b37876f337d9138cc8154e54d77e8d5f78a37c59f8e986d5e32015b3f
                                                    • Instruction ID: 9248b581d547e1bd854c78184eb88ff9cf9c13e01deaa9a366bee0f3e63f9c40
                                                    • Opcode Fuzzy Hash: c1eecc3b37876f337d9138cc8154e54d77e8d5f78a37c59f8e986d5e32015b3f
                                                    • Instruction Fuzzy Hash: 20614974A04648CFDB84CFA9D595B9D77F1BB46304F5080ADE02A9F3A1EB389945CF00
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3150679385.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6bd0000_csc.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6adaee35817ba6a5114cbe4ec0a8a7f44ea17b964c82f463571d70b3bfe22565
                                                    • Instruction ID: f6a074f355870b0fa69d59bd5fa5246ada7943276e903dfedad677102f45233b
                                                    • Opcode Fuzzy Hash: 6adaee35817ba6a5114cbe4ec0a8a7f44ea17b964c82f463571d70b3bfe22565
                                                    • Instruction Fuzzy Hash: 4011E332B14624CBEB1CCE3CDC503ADA6E29788310F1546BCD44AE3741E574CD168B85