Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tx4pkcHL9o.exe

Overview

General Information

Sample name:tx4pkcHL9o.exe
renamed because original name is a hash value
Original sample name:987d80fbc03ed5f7612a742982367ae5f354237968d23b2fe1cbe9440946497d.exe
Analysis ID:1587667
MD5:e6884ed9330553c602104752d461f363
SHA1:6c10a1bf2148d830df770f77f42779f87d80fc39
SHA256:987d80fbc03ed5f7612a742982367ae5f354237968d23b2fe1cbe9440946497d
Tags:exeuser-adrian__luca
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • tx4pkcHL9o.exe (PID: 7260 cmdline: "C:\Users\user\Desktop\tx4pkcHL9o.exe" MD5: E6884ED9330553C602104752D461F363)
    • powershell.exe (PID: 7460 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7512 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7932 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7540 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tx4pkcHL9o.exe (PID: 7748 cmdline: "C:\Users\user\Desktop\tx4pkcHL9o.exe" MD5: E6884ED9330553C602104752D461F363)
    • tx4pkcHL9o.exe (PID: 7756 cmdline: "C:\Users\user\Desktop\tx4pkcHL9o.exe" MD5: E6884ED9330553C602104752D461F363)
  • VyaPZFtSeDDse.exe (PID: 7880 cmdline: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe MD5: E6884ED9330553C602104752D461F363)
    • schtasks.exe (PID: 8124 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp9B0E.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • VyaPZFtSeDDse.exe (PID: 2192 cmdline: "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe" MD5: E6884ED9330553C602104752D461F363)
    • VyaPZFtSeDDse.exe (PID: 5740 cmdline: "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe" MD5: E6884ED9330553C602104752D461F363)
  • cleanup
{"EXfil Mode": "SMTP", "From": "kingnovasend@zqamcx.com", "Password": "Anambraeast", "Server": "zqamcx.com", "To": "kingnovaresult@zqamcx.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xdfa7:$a1: get_encryptedPassword
        • 0xe2cf:$a2: get_encryptedUsername
        • 0xdd42:$a3: get_timePasswordChanged
        • 0xde63:$a4: get_passwordField
        • 0xdfbd:$a5: set_encryptedPassword
        • 0xf919:$a7: get_logins
        • 0xf5ca:$a8: GetOutlookPasswords
        • 0xf3bc:$a9: StartKeylogger
        • 0xf869:$a10: KeyLoggerEventArgs
        • 0xf419:$a11: KeyLoggerEventArgsEventHandler
        00000011.00000002.2633387402.0000000002A83000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 16 entries
          SourceRuleDescriptionAuthorStrings
          0.2.tx4pkcHL9o.exe.3871f58.7.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.tx4pkcHL9o.exe.3871f58.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.tx4pkcHL9o.exe.3871f58.7.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.tx4pkcHL9o.exe.3871f58.7.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xd3a7:$a1: get_encryptedPassword
                • 0xd6cf:$a2: get_encryptedUsername
                • 0xd142:$a3: get_timePasswordChanged
                • 0xd263:$a4: get_passwordField
                • 0xd3bd:$a5: set_encryptedPassword
                • 0xed19:$a7: get_logins
                • 0xe9ca:$a8: GetOutlookPasswords
                • 0xe7bc:$a9: StartKeylogger
                • 0xec69:$a10: KeyLoggerEventArgs
                • 0xe819:$a11: KeyLoggerEventArgsEventHandler
                0.2.tx4pkcHL9o.exe.3871f58.7.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x1234b:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x11849:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x11b57:$a4: \Orbitum\User Data\Default\Login Data
                • 0x1294f:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\tx4pkcHL9o.exe", ParentImage: C:\Users\user\Desktop\tx4pkcHL9o.exe, ParentProcessId: 7260, ParentProcessName: tx4pkcHL9o.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", ProcessId: 7460, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\tx4pkcHL9o.exe", ParentImage: C:\Users\user\Desktop\tx4pkcHL9o.exe, ParentProcessId: 7260, ParentProcessName: tx4pkcHL9o.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", ProcessId: 7460, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp9B0E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp9B0E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe, ParentImage: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe, ParentProcessId: 7880, ParentProcessName: VyaPZFtSeDDse.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp9B0E.tmp", ProcessId: 8124, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\tx4pkcHL9o.exe", ParentImage: C:\Users\user\Desktop\tx4pkcHL9o.exe, ParentProcessId: 7260, ParentProcessName: tx4pkcHL9o.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp", ProcessId: 7540, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\tx4pkcHL9o.exe", ParentImage: C:\Users\user\Desktop\tx4pkcHL9o.exe, ParentProcessId: 7260, ParentProcessName: tx4pkcHL9o.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe", ProcessId: 7460, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\tx4pkcHL9o.exe", ParentImage: C:\Users\user\Desktop\tx4pkcHL9o.exe, ParentProcessId: 7260, ParentProcessName: tx4pkcHL9o.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp", ProcessId: 7540, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T16:38:55.879539+010028032742Potentially Bad Traffic192.168.2.749740158.101.44.24280TCP
                2025-01-10T16:38:59.380324+010028032742Potentially Bad Traffic192.168.2.749778158.101.44.24280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "kingnovasend@zqamcx.com", "Password": "Anambraeast", "Server": "zqamcx.com", "To": "kingnovaresult@zqamcx.com", "Port": 587}
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeReversingLabs: Detection: 81%
                Source: tx4pkcHL9o.exeReversingLabs: Detection: 81%
                Source: tx4pkcHL9o.exeVirustotal: Detection: 79%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeJoe Sandbox ML: detected
                Source: tx4pkcHL9o.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: tx4pkcHL9o.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49762 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49785 version: TLS 1.0
                Source: tx4pkcHL9o.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: rFePR.pdb source: tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.dr
                Source: Binary string: rFePR.pdbSHA256 source: tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.dr
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 01019731h10_2_01019480
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 01019E5Ah10_2_01019A30
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 01019E5Ah10_2_01019D87
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A47C9h10_2_056A4520
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A8830h10_2_056A8588
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056AF700h10_2_056AF458
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A76D0h10_2_056A7428
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056AE9F8h10_2_056AE750
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A5929h10_2_056A5680
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A83D8h10_2_056A8130
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056AE5A0h10_2_056AE180
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056AF2A8h10_2_056AF000
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A54D1h10_2_056A5228
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A5079h10_2_056A4DD0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A7F80h10_2_056A7CD8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A7278h10_2_056A6FD0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A4C21h10_2_056A4978
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056AFB58h10_2_056AF8B0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A7B28h10_2_056A7880
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056AEE50h10_2_056AEBA8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 4x nop then jmp 056A5E15h10_2_056A5AD8
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 4x nop then jmp 00C69731h17_2_00C69480
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 4x nop then jmp 00C69E5Ah17_2_00C69A30
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 4x nop then jmp 00C69E5Ah17_2_00C69D87
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49740 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49778 -> 158.101.44.242:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49762 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49785 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: time.windows.com
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002B31000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: tx4pkcHL9o.exe, 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                Source: tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BCB000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BCB000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: tx4pkcHL9o.exe, 00000000.00000002.1401358796.000000000285F000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002B31000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 0000000B.00000002.1465165627.0000000002E9F000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: tx4pkcHL9o.exe, 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: VyaPZFtSeDDse.exe, 00000011.00000002.2632283324.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/
                Source: tx4pkcHL9o.exe, 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: tx4pkcHL9o.exe, 00000000.00000002.1419720378.0000000006ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.chiark.greenend
                Source: tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443

                System Summary

                barindex
                Source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: tx4pkcHL9o.exe PID: 7260, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: tx4pkcHL9o.exe PID: 7756, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_025C42180_2_025C4218
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_025C6F900_2_025C6F90
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_025CD4240_2_025CD424
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_06DC26700_2_06DC2670
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_06DC47800_2_06DC4780
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_06DC476F0_2_06DC476F
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_06DC3F100_2_06DC3F10
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_06DC2AA80_2_06DC2AA8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_06DC43480_2_06DC4348
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_06DCB3180_2_06DCB318
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_082B0FE80_2_082B0FE8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_082B0FF80_2_082B0FF8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_0101C53010_2_0101C530
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_010127B910_2_010127B9
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_0101948010_2_01019480
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_0101C52110_2_0101C521
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_01012DD110_2_01012DD1
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_0101946F10_2_0101946F
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A613810_2_056A6138
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056ABC6010_2_056ABC60
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AAF0010_2_056AAF00
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A89E010_2_056A89E0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A857910_2_056A8579
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A452010_2_056A4520
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A450F10_2_056A450F
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A858810_2_056A8588
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AF44810_2_056AF448
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AF45810_2_056AF458
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A742810_2_056A7428
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A741810_2_056A7418
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AE74010_2_056AE740
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AE75010_2_056AE750
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A566F10_2_056A566F
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A568010_2_056A5680
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A812010_2_056A8120
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A813010_2_056A8130
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AE18010_2_056AE180
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AF00010_2_056AF000
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A032010_2_056A0320
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A033010_2_056A0330
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A522810_2_056A5228
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A521A10_2_056A521A
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A4DC010_2_056A4DC0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A4DD010_2_056A4DD0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A7CC810_2_056A7CC8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A0CD810_2_056A0CD8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A7CD810_2_056A7CD8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AEFF010_2_056AEFF0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A6FC310_2_056A6FC3
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A6FC110_2_056A6FC1
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A6FD010_2_056A6FD0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A496910_2_056A4969
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A497810_2_056A4978
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A89D010_2_056A89D0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A787110_2_056A7871
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AF8A110_2_056AF8A1
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AF8B010_2_056AF8B0
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A788010_2_056A7880
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AEBA810_2_056AEBA8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056AEB9810_2_056AEB98
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A5ACA10_2_056A5ACA
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A5AD810_2_056A5AD8
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A0AB810_2_056A0AB8
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_0120421811_2_01204218
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_01206F9211_2_01206F92
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_0120D42411_2_0120D424
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_02E17C8811_2_02E17C88
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_02E1008811_2_02E10088
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_02E1007811_2_02E10078
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_02E17C7811_2_02E17C78
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_05496DB811_2_05496DB8
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_07083F1011_2_07083F10
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_0708478011_2_07084780
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_0708267011_2_07082670
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_0708A5FA11_2_0708A5FA
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_0708434811_2_07084348
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_07082AA811_2_07082AA8
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 17_2_00C6C53017_2_00C6C530
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 17_2_00C62DD117_2_00C62DD1
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 17_2_00C6948017_2_00C69480
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 17_2_00C6C49F17_2_00C6C49F
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 17_2_00C6C52117_2_00C6C521
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 17_2_00C6946F17_2_00C6946F
                Source: tx4pkcHL9o.exeStatic PE information: invalid certificate
                Source: tx4pkcHL9o.exe, 00000000.00000002.1420287493.0000000006E20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000002.1401358796.000000000285F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000002.1396766277.0000000000B2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000002.1403720087.00000000038DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000002.1403720087.00000000038DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000000.1356204353.0000000000448000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerFePR.exe> vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000002.1419720378.0000000006ABB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000002.1419177011.0000000006A10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2631296214.0000000000B87000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exeBinary or memory string: OriginalFilenamerFePR.exe> vs tx4pkcHL9o.exe
                Source: tx4pkcHL9o.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: tx4pkcHL9o.exe PID: 7260, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: tx4pkcHL9o.exe PID: 7756, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@23/15@3/2
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeFile created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7524:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8156:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7468:120:WilError_03
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeFile created: C:\Users\user\AppData\Local\Temp\tmp86BB.tmpJump to behavior
                Source: tx4pkcHL9o.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: tx4pkcHL9o.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002C4D000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2635342685.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.0000000002A7D000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.0000000002A71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: tx4pkcHL9o.exeReversingLabs: Detection: 81%
                Source: tx4pkcHL9o.exeVirustotal: Detection: 79%
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeFile read: C:\Users\user\Desktop\tx4pkcHL9o.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\tx4pkcHL9o.exe "C:\Users\user\Desktop\tx4pkcHL9o.exe"
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Users\user\Desktop\tx4pkcHL9o.exe "C:\Users\user\Desktop\tx4pkcHL9o.exe"
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Users\user\Desktop\tx4pkcHL9o.exe "C:\Users\user\Desktop\tx4pkcHL9o.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp9B0E.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Users\user\Desktop\tx4pkcHL9o.exe "C:\Users\user\Desktop\tx4pkcHL9o.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Users\user\Desktop\tx4pkcHL9o.exe "C:\Users\user\Desktop\tx4pkcHL9o.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp9B0E.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: mskeyprotect.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: ntasn1.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: ncrypt.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: ncryptsslp.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeSection loaded: dpapi.dll
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: tx4pkcHL9o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: tx4pkcHL9o.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: tx4pkcHL9o.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: rFePR.pdb source: tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.dr
                Source: Binary string: rFePR.pdbSHA256 source: tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.dr
                Source: tx4pkcHL9o.exeStatic PE information: 0xE4ED3715 [Sun Sep 16 03:23:01 2091 UTC]
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_06DC3BB0 push 1406E9CBh; retf 0_2_06DC3BB5
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 0_2_082BF8B0 push esp; retf 0_2_082BF8B1
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeCode function: 10_2_056A3C4F push 00000005h; ret 10_2_056A3C80
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeCode function: 11_2_07083BB0 push 140707CBh; retf 11_2_07083BB5
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeFile created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7260, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: VyaPZFtSeDDse.exe PID: 7880, type: MEMORYSTR
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 2800000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 2700000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 82D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 92D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 94C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: A4C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 1010000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: 11D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: 1200000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: 2E40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: 4E40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: 8B90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: 71D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: 9B90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: AB90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: C60000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: 2960000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory allocated: 28A0000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7209Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1028Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6076Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 855Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exe TID: 7320Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7664Thread sleep count: 7209 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7744Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7640Thread sleep count: 1028 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7700Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7740Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7708Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe TID: 7992Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: VyaPZFtSeDDse.exe, 0000000B.00000002.1461275366.0000000001334000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:]
                Source: tx4pkcHL9o.exe, 0000000A.00000002.2631725953.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2632283324.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe"
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeMemory written: C:\Users\user\Desktop\tx4pkcHL9o.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeMemory written: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Users\user\Desktop\tx4pkcHL9o.exe "C:\Users\user\Desktop\tx4pkcHL9o.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeProcess created: C:\Users\user\Desktop\tx4pkcHL9o.exe "C:\Users\user\Desktop\tx4pkcHL9o.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp9B0E.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeProcess created: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Users\user\Desktop\tx4pkcHL9o.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Users\user\Desktop\tx4pkcHL9o.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7260, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7756, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7260, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7756, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Users\user\Desktop\tx4pkcHL9o.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.2633387402.0000000002A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2633318751.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7260, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7756, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: VyaPZFtSeDDse.exe PID: 5740, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7260, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7756, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.3871f58.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.tx4pkcHL9o.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tx4pkcHL9o.exe.385b138.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7260, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tx4pkcHL9o.exe PID: 7756, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                1
                Scheduled Task/Job
                11
                Disable or Modify Tools
                LSASS Memory11
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                31
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Timestomp
                Cached Domain Credentials1
                System Network Configuration Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync1
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem13
                System Information Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587667 Sample: tx4pkcHL9o.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 48 reallyfreegeoip.org 2->48 50 time.windows.com 2->50 52 4 other IPs or domains 2->52 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Sigma detected: Scheduled temp file as task from temp location 2->62 66 7 other signatures 2->66 8 tx4pkcHL9o.exe 7 2->8         started        12 VyaPZFtSeDDse.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 48->64 process4 file5 40 C:\Users\user\AppData\...\VyaPZFtSeDDse.exe, PE32 8->40 dropped 42 C:\...\VyaPZFtSeDDse.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmp86BB.tmp, XML 8->44 dropped 46 C:\Users\user\AppData\...\tx4pkcHL9o.exe.log, ASCII 8->46 dropped 68 Uses schtasks.exe or at.exe to add and modify task schedules 8->68 70 Adds a directory exclusion to Windows Defender 8->70 72 Injects a PE file into a foreign processes 8->72 14 powershell.exe 23 8->14         started        17 powershell.exe 23 8->17         started        19 tx4pkcHL9o.exe 15 2 8->19         started        28 2 other processes 8->28 74 Multi AV Scanner detection for dropped file 12->74 76 Machine Learning detection for dropped file 12->76 22 VyaPZFtSeDDse.exe 12->22         started        24 schtasks.exe 12->24         started        26 VyaPZFtSeDDse.exe 12->26         started        signatures6 process7 dnsIp8 78 Loading BitLocker PowerShell Module 14->78 30 conhost.exe 14->30         started        32 WmiPrvSE.exe 14->32         started        34 conhost.exe 17->34         started        54 checkip.dyndns.com 158.101.44.242, 49740, 49778, 80 ORACLE-BMC-31898US United States 19->54 56 reallyfreegeoip.org 104.21.32.1, 443, 49762, 49785 CLOUDFLARENETUS United States 19->56 80 Tries to steal Mail credentials (via file / registry access) 22->80 82 Tries to harvest and steal browser information (history, passwords, etc) 22->82 36 conhost.exe 24->36         started        38 conhost.exe 28->38         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                tx4pkcHL9o.exe82%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                tx4pkcHL9o.exe79%VirustotalBrowse
                tx4pkcHL9o.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe82%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://www.chiark.greenend0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                s-part-0017.t-0009.t-msedge.net
                13.107.246.45
                truefalse
                  high
                  reallyfreegeoip.org
                  104.21.32.1
                  truefalse
                    high
                    checkip.dyndns.com
                    158.101.44.242
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        time.windows.com
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.org/false
                            high
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://reallyfreegeoip.org/xml/8.46.123.189ltx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.comdtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/VyaPZFtSeDDse.exe, 00000011.00000002.2632283324.0000000000D01000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.org/qtx4pkcHL9o.exe, 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmpfalse
                                      high
                                      http://reallyfreegeoip.orgdtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BCB000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.org/xml/8.46.123.189dtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://reallyfreegeoip.orgtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BCB000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.orgdtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.orgtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.chiark.greenendtx4pkcHL9o.exe, 00000000.00000002.1419720378.0000000006ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://checkip.dyndns.orgtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://checkip.dyndns.comtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://checkip.dyndns.org/dtx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nametx4pkcHL9o.exe, 00000000.00000002.1401358796.000000000285F000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002B31000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 0000000B.00000002.1465165627.0000000002E9F000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.0000000002961000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.chiark.greenend.org.uk/~sgtatham/putty/0tx4pkcHL9o.exe, VyaPZFtSeDDse.exe.0.drfalse
                                                          high
                                                          https://api.telegram.org/bot-/sendDocument?chat_id=tx4pkcHL9o.exe, 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            high
                                                            https://reallyfreegeoip.org/xml/tx4pkcHL9o.exe, 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, tx4pkcHL9o.exe, 0000000A.00000002.2633318751.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, VyaPZFtSeDDse.exe, 00000011.00000002.2633387402.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              104.21.32.1
                                                              reallyfreegeoip.orgUnited States
                                                              13335CLOUDFLARENETUSfalse
                                                              158.101.44.242
                                                              checkip.dyndns.comUnited States
                                                              31898ORACLE-BMC-31898USfalse
                                                              Joe Sandbox version:42.0.0 Malachite
                                                              Analysis ID:1587667
                                                              Start date and time:2025-01-10 16:37:42 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 7m 23s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:21
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:tx4pkcHL9o.exe
                                                              renamed because original name is a hash value
                                                              Original Sample Name:987d80fbc03ed5f7612a742982367ae5f354237968d23b2fe1cbe9440946497d.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@23/15@3/2
                                                              EGA Information:
                                                              • Successful, ratio: 50%
                                                              HCA Information:
                                                              • Successful, ratio: 98%
                                                              • Number of executed functions: 184
                                                              • Number of non-executed functions: 34
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                              • Excluded IPs from analysis (whitelisted): 20.101.57.9, 13.107.246.45, 2.23.242.162, 4.175.87.197
                                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, twc.trafficmanager.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                              • Execution Graph export aborted for target VyaPZFtSeDDse.exe, PID 5740 because it is empty
                                                              • Execution Graph export aborted for target tx4pkcHL9o.exe, PID 7756 because it is empty
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                              • Report size getting too big, too many NtCreateKey calls found.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                              TimeTypeDescription
                                                              10:38:47API Interceptor2x Sleep call for process: tx4pkcHL9o.exe modified
                                                              10:38:50API Interceptor46x Sleep call for process: powershell.exe modified
                                                              10:38:54API Interceptor2x Sleep call for process: VyaPZFtSeDDse.exe modified
                                                              16:38:52Task SchedulerRun new task: VyaPZFtSeDDse path: C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              104.21.32.1QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                              • www.mzkd6gp5.top/3u0p/
                                                              SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                              • redroomaudio.com/administrator/index.php
                                                              158.101.44.242PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                              • checkip.dyndns.org/
                                                              BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                              • checkip.dyndns.org/
                                                              fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              PO#5_Tower_049.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                              • checkip.dyndns.org/
                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                              • checkip.dyndns.org/
                                                              ZOYGRL1ePa.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                              • checkip.dyndns.org/
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              reallyfreegeoip.orgNew Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 104.21.64.1
                                                              4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.96.1
                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 104.21.112.1
                                                              B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.48.1
                                                              B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 104.21.32.1
                                                              VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 104.21.80.1
                                                              bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.80.1
                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 104.21.48.1
                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 104.21.96.1
                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 104.21.64.1
                                                              checkip.dyndns.comNew Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 132.226.247.73
                                                              4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.130.0
                                                              B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 132.226.247.73
                                                              VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 193.122.130.0
                                                              bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.130.0
                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 193.122.130.0
                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 158.101.44.242
                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 193.122.6.168
                                                              s-part-0017.t-0009.t-msedge.netWF2DL1l7E8.exeGet hashmaliciousFormBookBrowse
                                                              • 13.107.246.45
                                                              Play_VM-NowTingrammAudiowav011.htmlGet hashmaliciousUnknownBrowse
                                                              • 13.107.246.45
                                                              launcher.exe.bin.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                                              • 13.107.246.45
                                                              FGTFTj8GLM.exeGet hashmaliciousFormBookBrowse
                                                              • 13.107.246.45
                                                              30562134305434372.jsGet hashmaliciousStrela DownloaderBrowse
                                                              • 13.107.246.45
                                                              Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
                                                              • 13.107.246.45
                                                              https://na4.docusign.net/Signing/EmailStart.aspx?a=ffa78034-d960-4bb3-b2a2-bb62a1fc4a65&etti=24&acct=86dab687-685e-40aa-af52-e5c3fc07b508&er=04714c6d-cc25-4a21-be91-01e1c43a5f3fGet hashmaliciousHTMLPhisherBrowse
                                                              • 13.107.246.45
                                                              hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 13.107.246.45
                                                              RSLMZxqebl.exeGet hashmaliciousFormBookBrowse
                                                              • 13.107.246.45
                                                              nRNzqQOQwk.exeGet hashmaliciousGuLoaderBrowse
                                                              • 13.107.246.45
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              ORACLE-BMC-31898US4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.130.0
                                                              VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 193.122.130.0
                                                              bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.130.0
                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 193.122.130.0
                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 158.101.44.242
                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 193.122.6.168
                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 193.122.130.0
                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 193.122.130.0
                                                              CLOUDFLARENETUShttps://zfrmz.com/3GiGYUP4BArW2NBgkPU3Get hashmaliciousUnknownBrowse
                                                              • 104.18.94.41
                                                              Play_VM-NowTingrammAudiowav011.htmlGet hashmaliciousUnknownBrowse
                                                              • 104.17.25.14
                                                              https://theleadking2435063.emlnk.com/lt.php?x=3DZy~GDHJaLL5a37-gxLhhGf13JRv_MkkPo2jHPMKXOh5XR.-Uy.xuO-2I2imNfGet hashmaliciousUnknownBrowse
                                                              • 104.17.203.31
                                                              New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 104.21.64.1
                                                              4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.96.1
                                                              Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
                                                              • 104.21.56.70
                                                              https://na4.docusign.net/Signing/EmailStart.aspx?a=ffa78034-d960-4bb3-b2a2-bb62a1fc4a65&etti=24&acct=86dab687-685e-40aa-af52-e5c3fc07b508&er=04714c6d-cc25-4a21-be91-01e1c43a5f3fGet hashmaliciousHTMLPhisherBrowse
                                                              • 188.114.96.3
                                                              DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 104.26.12.205
                                                              RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                              • 104.26.13.205
                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 104.21.112.1
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              54328bd36c14bd82ddaa0c04b25ed9adNew Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 104.21.32.1
                                                              4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.32.1
                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 104.21.32.1
                                                              B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.32.1
                                                              B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 104.21.32.1
                                                              VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 104.21.32.1
                                                              bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.32.1
                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 104.21.32.1
                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 104.21.32.1
                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 104.21.32.1
                                                              No context
                                                              Process:C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1216
                                                              Entropy (8bit):5.34331486778365
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                              Malicious:false
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                              Process:C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1216
                                                              Entropy (8bit):5.34331486778365
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                              Malicious:true
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):2232
                                                              Entropy (8bit):5.379401388151058
                                                              Encrypted:false
                                                              SSDEEP:48:fWSU4xc4RTmaoUeW+gZ9tK8NPZHUxL7u1iMuge//YPUyus:fLHxcIalLgZ2KRHWLOugQs
                                                              MD5:76231FA02D2B68526FF7373F6EB0E573
                                                              SHA1:D55C61E3E95F938EDA307C322E4A5B559A18796B
                                                              SHA-256:9DF1DBB624804FE23603854F6BDD86F7B1CCA5F66A8AD9C89B3DB7F4C2AE525A
                                                              SHA-512:53DE6D5171058E5B3BFD4E7CB23D6E5B92D386FD5AB16ECB38975EF2CC810C71A3D3DC47B4C52879E57D4C66C2371E6421BFAD6FB6B8AD4673BE9F7FC45AC785
                                                              Malicious:false
                                                              Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.ConfigurationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.4.................%...K... ...........System.Xml..<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              File Type:XML 1.0 document, ASCII text
                                                              Category:dropped
                                                              Size (bytes):1607
                                                              Entropy (8bit):5.1242290102564425
                                                              Encrypted:false
                                                              SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtPxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTJv
                                                              MD5:2CFCE326694EB29324009387D6AFC9BA
                                                              SHA1:F6934852AD4570EE7AAC6123DD37FBFAD68F982F
                                                              SHA-256:DEAA1DAE1A3F073634B02E9DFC556BE835ED429D4B50C981BE39E12AB924BB3A
                                                              SHA-512:2B6F9BAA300D31D67BF94371DF4A588FC2D1C8F3043B763BB40803DA32FF6198C94909CE374B1BC98980ED6CB77C6AF96EF9C6EE0E8ED632F8EFBF2F1548A148
                                                              Malicious:true
                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                              Process:C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              File Type:XML 1.0 document, ASCII text
                                                              Category:dropped
                                                              Size (bytes):1607
                                                              Entropy (8bit):5.1242290102564425
                                                              Encrypted:false
                                                              SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtPxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTJv
                                                              MD5:2CFCE326694EB29324009387D6AFC9BA
                                                              SHA1:F6934852AD4570EE7AAC6123DD37FBFAD68F982F
                                                              SHA-256:DEAA1DAE1A3F073634B02E9DFC556BE835ED429D4B50C981BE39E12AB924BB3A
                                                              SHA-512:2B6F9BAA300D31D67BF94371DF4A588FC2D1C8F3043B763BB40803DA32FF6198C94909CE374B1BC98980ED6CB77C6AF96EF9C6EE0E8ED632F8EFBF2F1548A148
                                                              Malicious:false
                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                              Process:C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):822280
                                                              Entropy (8bit):6.5920070597534535
                                                              Encrypted:false
                                                              SSDEEP:12288:8Y2115Xb/J5Rbur4PBV8ij3rvCUAz3cdrmcSoHYfz5vSkR:xYHXFzbrpV8MOUAzamcwLD
                                                              MD5:E6884ED9330553C602104752D461F363
                                                              SHA1:6C10A1BF2148D830DF770F77F42779F87D80FC39
                                                              SHA-256:987D80FBC03ED5F7612A742982367AE5F354237968D23B2FE1CBE9440946497D
                                                              SHA-512:9164E377EEDA8BA4D0C4A35E8C0F849A97C04982F8F2EAA507F60AF7D28C5A182627C626319394B92A6CAF8AC23F297394CA337C501B87C16A50ECC3F7C26AB9
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 82%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7................0..L...........j... ........@.. ....................................@..................................j..O....................V...6..........DR..p............................................ ............... ..H............text....J... ...L.................. ..`.rsrc................N..............@..@.reloc...............T..............@..B.................j......H............R......J........s...........................................0............}......}.....(.......(......{...........%.r...p(....s.....%.r...p(....s.....%.r%..p(....s.......o.......(...+....-....o....&*..0...........s2.....o.....*..0...........sA.....o.....*..0...........s/.....o.....*..0...........s8.....o.....*..0...........s;.....o.....*..0...........s>.....o.....*..0...........s5.....o.....*..0...........sD.....o.....*..0...........sG.....o.....*..0...........s .
                                                              Process:C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):26
                                                              Entropy (8bit):3.95006375643621
                                                              Encrypted:false
                                                              SSDEEP:3:ggPYV:rPYV
                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                              Malicious:true
                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):6.5920070597534535
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                              • Win32 Executable (generic) a (10002005/4) 49.93%
                                                              • Windows Screen Saver (13104/52) 0.07%
                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                              • DOS Executable Generic (2002/1) 0.01%
                                                              File name:tx4pkcHL9o.exe
                                                              File size:822'280 bytes
                                                              MD5:e6884ed9330553c602104752d461f363
                                                              SHA1:6c10a1bf2148d830df770f77f42779f87d80fc39
                                                              SHA256:987d80fbc03ed5f7612a742982367ae5f354237968d23b2fe1cbe9440946497d
                                                              SHA512:9164e377eeda8ba4d0c4a35e8c0f849a97c04982f8f2eaa507f60af7d28c5a182627c626319394b92a6caf8ac23f297394ca337c501b87c16a50ecc3f7c26ab9
                                                              SSDEEP:12288:8Y2115Xb/J5Rbur4PBV8ij3rvCUAz3cdrmcSoHYfz5vSkR:xYHXFzbrpV8MOUAzamcwLD
                                                              TLSH:EC05723D09BD22EB81A5C79DCBE89827F610A46FB150ADA494C647A57347F4B34C323E
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7................0..L...........j... ........@.. ....................................@................................
                                                              Icon Hash:00928e8e8686b000
                                                              Entrypoint:0x4c6ae6
                                                              Entrypoint Section:.text
                                                              Digitally signed:true
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0xE4ED3715 [Sun Sep 16 03:23:01 2091 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                              Signature Valid:false
                                                              Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                              Signature Validation Error:The digital signature of the object did not verify
                                                              Error Number:-2146869232
                                                              Not Before, Not After
                                                              • 13/11/2018 01:00:00 09/11/2021 00:59:59
                                                              Subject Chain
                                                              • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                              Version:3
                                                              Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                              Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                              Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                              Serial:7C1118CBBADC95DA3752C46E47A27438
                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc6a920x4f.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5c4.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0xc56000x3608
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0xc52440x70.text
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000xc4aec0xc4c004f455312dd53e5d817938b5c9fc88470False0.6204174773665819OpenPGP Public Key6.568804655324774IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rsrc0xc80000x5c40x60084ff2f389b9c5e52c37d8f1a0a3209e6False0.4296875data4.113089669875473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xca0000xc0x200769673657a91c1b35dadccdc40c9b650False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_VERSION0xc80900x334data0.4378048780487805
                                                              RT_MANIFEST0xc83d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                              DLLImport
                                                              mscoree.dll_CorExeMain
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2025-01-10T16:38:55.879539+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749740158.101.44.24280TCP
                                                              2025-01-10T16:38:59.380324+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749778158.101.44.24280TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Jan 10, 2025 16:38:52.152780056 CET4974080192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:52.157560110 CET8049740158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:52.157752991 CET4974080192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:52.157922983 CET4974080192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:52.162646055 CET8049740158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:53.929609060 CET8049740158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:54.061778069 CET4974080192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:54.066972017 CET8049740158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:55.807977915 CET8049740158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:55.818195105 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:55.818223000 CET44349762104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:55.818283081 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:55.835015059 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:55.835041046 CET44349762104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:55.879539013 CET4974080192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:56.320561886 CET44349762104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:56.320642948 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:56.578999996 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:56.579036951 CET44349762104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:56.579550982 CET44349762104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:56.692054033 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:57.218549967 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:57.259324074 CET44349762104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:57.334336996 CET44349762104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:57.334403038 CET44349762104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:57.334450960 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:57.341288090 CET49762443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:58.564089060 CET4977880192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:58.568943977 CET8049778158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:58.569036007 CET4977880192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:58.569259882 CET4977880192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:58.574033976 CET8049778158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:59.143071890 CET8049778158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:59.147413969 CET4977880192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:59.154064894 CET8049778158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:59.325865984 CET8049778158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:38:59.328547001 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:59.328591108 CET44349785104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:59.329260111 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:59.335309029 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:59.335350037 CET44349785104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:59.380323887 CET4977880192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:38:59.796946049 CET44349785104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:59.797019958 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:59.798871994 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:59.798878908 CET44349785104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:59.799266100 CET44349785104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:38:59.871541023 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:38:59.973129988 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:39:00.015324116 CET44349785104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:39:00.101932049 CET44349785104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:39:00.102099895 CET44349785104.21.32.1192.168.2.7
                                                              Jan 10, 2025 16:39:00.102159977 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:39:00.112073898 CET49785443192.168.2.7104.21.32.1
                                                              Jan 10, 2025 16:40:00.940532923 CET8049740158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:40:00.940658092 CET4974080192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:40:04.325807095 CET8049778158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:40:04.326004982 CET4977880192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:40:35.817625046 CET4974080192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:40:35.822427034 CET8049740158.101.44.242192.168.2.7
                                                              Jan 10, 2025 16:40:39.334790945 CET4977880192.168.2.7158.101.44.242
                                                              Jan 10, 2025 16:40:39.339668989 CET8049778158.101.44.242192.168.2.7
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Jan 10, 2025 16:38:43.931165934 CET5575153192.168.2.71.1.1.1
                                                              Jan 10, 2025 16:38:52.119064093 CET5379753192.168.2.71.1.1.1
                                                              Jan 10, 2025 16:38:52.126993895 CET53537971.1.1.1192.168.2.7
                                                              Jan 10, 2025 16:38:55.809381008 CET5487753192.168.2.71.1.1.1
                                                              Jan 10, 2025 16:38:55.816875935 CET53548771.1.1.1192.168.2.7
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Jan 10, 2025 16:38:43.931165934 CET192.168.2.71.1.1.10xd799Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:52.119064093 CET192.168.2.71.1.1.10xa80bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:55.809381008 CET192.168.2.71.1.1.10xf358Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Jan 10, 2025 16:38:43.937880039 CET1.1.1.1192.168.2.70xd799No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                              Jan 10, 2025 16:38:44.293667078 CET1.1.1.1192.168.2.70xfef2No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                              Jan 10, 2025 16:38:44.293667078 CET1.1.1.1192.168.2.70xfef2No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:52.126993895 CET1.1.1.1192.168.2.70xa80bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                              Jan 10, 2025 16:38:52.126993895 CET1.1.1.1192.168.2.70xa80bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:52.126993895 CET1.1.1.1192.168.2.70xa80bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:52.126993895 CET1.1.1.1192.168.2.70xa80bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:52.126993895 CET1.1.1.1192.168.2.70xa80bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:52.126993895 CET1.1.1.1192.168.2.70xa80bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:55.816875935 CET1.1.1.1192.168.2.70xf358No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:55.816875935 CET1.1.1.1192.168.2.70xf358No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:55.816875935 CET1.1.1.1192.168.2.70xf358No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:55.816875935 CET1.1.1.1192.168.2.70xf358No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:55.816875935 CET1.1.1.1192.168.2.70xf358No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:55.816875935 CET1.1.1.1192.168.2.70xf358No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                              Jan 10, 2025 16:38:55.816875935 CET1.1.1.1192.168.2.70xf358No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                              • reallyfreegeoip.org
                                                              • checkip.dyndns.org
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.749740158.101.44.242807756C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 10, 2025 16:38:52.157922983 CET151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              Jan 10, 2025 16:38:53.929609060 CET321INHTTP/1.1 200 OK
                                                              Date: Fri, 10 Jan 2025 15:38:53 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              X-Request-ID: e10ce630c6050b918a5a2e463cffba33
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                              Jan 10, 2025 16:38:54.061778069 CET127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Jan 10, 2025 16:38:55.807977915 CET321INHTTP/1.1 200 OK
                                                              Date: Fri, 10 Jan 2025 15:38:55 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              X-Request-ID: 2ea68273063cb2781589e03bf695e66b
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.749778158.101.44.242805740C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 10, 2025 16:38:58.569259882 CET151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              Jan 10, 2025 16:38:59.143071890 CET321INHTTP/1.1 200 OK
                                                              Date: Fri, 10 Jan 2025 15:38:59 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              X-Request-ID: 5b03eb0109313e1b65b0df315dd73516
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                              Jan 10, 2025 16:38:59.147413969 CET127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Jan 10, 2025 16:38:59.325865984 CET321INHTTP/1.1 200 OK
                                                              Date: Fri, 10 Jan 2025 15:38:59 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              X-Request-ID: 7063df7f221d6beb8d790cbbd184038f
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.749762104.21.32.14437756C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              TimestampBytes transferredDirectionData
                                                              2025-01-10 15:38:57 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              Connection: Keep-Alive
                                                              2025-01-10 15:38:57 UTC860INHTTP/1.1 200 OK
                                                              Date: Fri, 10 Jan 2025 15:38:57 GMT
                                                              Content-Type: text/xml
                                                              Content-Length: 362
                                                              Connection: close
                                                              Age: 1838326
                                                              Cache-Control: max-age=31536000
                                                              cf-cache-status: HIT
                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fp%2BNBRSZ3mbbF6zEv8f5pBTivHxUwgho1buy3Rzv1l%2B3wrYGW67ohTjv4YB%2FQSXm3QQwqnGm1uU4V38pSESmfW1ioF2hRN%2BmXWM5VNFLo7wGpL%2BfbIzjFI3A2YuLuM6CvHZAtDpP"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8ffdc1cbfd851875-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1624&min_rtt=1621&rtt_var=615&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1769696&cwnd=153&unsent_bytes=0&cid=291a5ccf4c9d29ad&ts=1034&x=0"
                                                              2025-01-10 15:38:57 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.749785104.21.32.14435740C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              TimestampBytes transferredDirectionData
                                                              2025-01-10 15:38:59 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              Connection: Keep-Alive
                                                              2025-01-10 15:39:00 UTC867INHTTP/1.1 200 OK
                                                              Date: Fri, 10 Jan 2025 15:39:00 GMT
                                                              Content-Type: text/xml
                                                              Content-Length: 362
                                                              Connection: close
                                                              Age: 1838329
                                                              Cache-Control: max-age=31536000
                                                              cf-cache-status: HIT
                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dxUYNv%2BIP%2FR%2F3BwVSQ%2BV0TyDBtiRs7tRprfGl8E60sVtY7L35oLqrDUl%2FmaV4wJzUOiGLXlw%2FywdM4KTZ7Zz6CpjFvF%2F6N6xIBuCFDi6%2FuadTOAwEuG%2BkbEv1jRDEPhE1yuv1ZRo"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8ffdc1dd2946c327-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1647&min_rtt=1640&rtt_var=629&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1719670&cwnd=189&unsent_bytes=0&cid=385ee4909ccf8ffc&ts=314&x=0"
                                                              2025-01-10 15:39:00 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:10:38:47
                                                              Start date:10/01/2025
                                                              Path:C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\tx4pkcHL9o.exe"
                                                              Imagebase:0x380000
                                                              File size:822'280 bytes
                                                              MD5 hash:E6884ED9330553C602104752D461F363
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1403720087.0000000003809000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:10:38:49
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tx4pkcHL9o.exe"
                                                              Imagebase:0x810000
                                                              File size:433'152 bytes
                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:10:38:49
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff75da10000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:10:38:49
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"
                                                              Imagebase:0x810000
                                                              File size:433'152 bytes
                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:6
                                                              Start time:10:38:49
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff75da10000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:10:38:49
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp86BB.tmp"
                                                              Imagebase:0x610000
                                                              File size:187'904 bytes
                                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:8
                                                              Start time:10:38:50
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff75da10000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:10:38:50
                                                              Start date:10/01/2025
                                                              Path:C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\Desktop\tx4pkcHL9o.exe"
                                                              Imagebase:0x170000
                                                              File size:822'280 bytes
                                                              MD5 hash:E6884ED9330553C602104752D461F363
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:10:38:50
                                                              Start date:10/01/2025
                                                              Path:C:\Users\user\Desktop\tx4pkcHL9o.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\tx4pkcHL9o.exe"
                                                              Imagebase:0x730000
                                                              File size:822'280 bytes
                                                              MD5 hash:E6884ED9330553C602104752D461F363
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000A.00000002.2631125232.0000000000403000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2633318751.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:false

                                                              Target ID:11
                                                              Start time:10:38:52
                                                              Start date:10/01/2025
                                                              Path:C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              Imagebase:0x9d0000
                                                              File size:822'280 bytes
                                                              MD5 hash:E6884ED9330553C602104752D461F363
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 82%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:12
                                                              Start time:10:38:53
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                              Imagebase:0x7ff7fb730000
                                                              File size:496'640 bytes
                                                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                              Has elevated privileges:true
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:14
                                                              Start time:10:38:56
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VyaPZFtSeDDse" /XML "C:\Users\user\AppData\Local\Temp\tmp9B0E.tmp"
                                                              Imagebase:0x610000
                                                              File size:187'904 bytes
                                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:15
                                                              Start time:10:38:56
                                                              Start date:10/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff75da10000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:16
                                                              Start time:10:38:57
                                                              Start date:10/01/2025
                                                              Path:C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"
                                                              Imagebase:0x340000
                                                              File size:822'280 bytes
                                                              MD5 hash:E6884ED9330553C602104752D461F363
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:17
                                                              Start time:10:38:57
                                                              Start date:10/01/2025
                                                              Path:C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\VyaPZFtSeDDse.exe"
                                                              Imagebase:0x520000
                                                              File size:822'280 bytes
                                                              MD5 hash:E6884ED9330553C602104752D461F363
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.2633387402.0000000002A83000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:10.9%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:233
                                                                Total number of Limit Nodes:13
                                                                execution_graph 43002 82bf408 43004 82bf41d 43002->43004 43005 82bf4d7 43004->43005 43007 82b6468 43004->43007 43006 82bf4ac 43008 82b648c 43007->43008 43009 82b6493 43007->43009 43008->43006 43015 82b64e6 43009->43015 43016 82b4eac 43009->43016 43012 82b4eac GetCurrentThreadId 43013 82b64ba 43012->43013 43013->43015 43020 82b6818 43013->43020 43015->43006 43017 82b4eb7 43016->43017 43018 82b67d6 GetCurrentThreadId 43017->43018 43019 82b64b0 43017->43019 43018->43019 43019->43012 43021 82b681d 43020->43021 43022 82b67d6 GetCurrentThreadId 43021->43022 43024 82b6823 43021->43024 43023 82b67f7 43022->43023 43023->43015 43024->43015 43025 25cd4f8 43026 25cd53e GetCurrentProcess 43025->43026 43028 25cd589 43026->43028 43029 25cd590 GetCurrentThread 43026->43029 43028->43029 43030 25cd5cd GetCurrentProcess 43029->43030 43031 25cd5c6 43029->43031 43032 25cd603 43030->43032 43031->43030 43033 25cd62b GetCurrentThreadId 43032->43033 43034 25cd65c 43033->43034 43051 25c4668 43052 25c467a 43051->43052 43053 25c4686 43052->43053 43055 25c4778 43052->43055 43056 25c479d 43055->43056 43060 25c4878 43056->43060 43064 25c4888 43056->43064 43062 25c48af 43060->43062 43061 25c498c 43061->43061 43062->43061 43068 25c44e0 43062->43068 43065 25c48af 43064->43065 43066 25c44e0 CreateActCtxA 43065->43066 43067 25c498c 43065->43067 43066->43067 43069 25c5918 CreateActCtxA 43068->43069 43071 25c59db 43069->43071 43094 82b644e 43096 82b6468 2 API calls 43094->43096 43098 82b645e 43094->43098 43095 82b6456 43096->43095 43099 82b648c 43098->43099 43100 82b6493 43098->43100 43099->43095 43101 82b4eac GetCurrentThreadId 43100->43101 43104 82b64e6 43100->43104 43102 82b64b0 43101->43102 43103 82b4eac GetCurrentThreadId 43102->43103 43105 82b64ba 43103->43105 43104->43095 43105->43104 43106 82b6818 GetCurrentThreadId 43105->43106 43106->43104 43072 6dc2394 43073 6dc23a4 43072->43073 43077 6dc4bb8 43073->43077 43081 6dc4ba9 43073->43081 43074 6dc23cb 43078 6dc4beb 43077->43078 43085 6dc4f40 43078->43085 43079 6dc4c59 43079->43074 43082 6dc4bbb 43081->43082 43084 6dc4f40 ResumeThread 43082->43084 43083 6dc4c59 43083->43074 43084->43083 43086 6dc4f70 43085->43086 43087 6dc4f8a 43086->43087 43088 6dc4ff9 ResumeThread 43086->43088 43087->43079 43088->43087 42811 6dc60d6 42812 6dc6031 42811->42812 42813 6dc5df9 42812->42813 42817 6dc8277 42812->42817 42822 6dc8268 42812->42822 42827 6dc8278 42812->42827 42818 6dc8278 42817->42818 42832 6dc82af 42818->42832 42851 6dc82a9 42818->42851 42819 6dc829f 42819->42812 42823 6dc8275 42822->42823 42825 6dc82af 12 API calls 42823->42825 42826 6dc82a9 12 API calls 42823->42826 42824 6dc829f 42824->42812 42825->42824 42826->42824 42828 6dc828d 42827->42828 42830 6dc82af 12 API calls 42828->42830 42831 6dc82a9 12 API calls 42828->42831 42829 6dc829f 42829->42812 42830->42829 42831->42829 42833 6dc82d2 42832->42833 42834 6dc82da 42833->42834 42870 6dc8ee6 42833->42870 42875 6dc86e6 42833->42875 42880 6dc8aeb 42833->42880 42888 6dc8849 42833->42888 42893 6dc8a28 42833->42893 42897 6dc88d1 42833->42897 42902 6dc8896 42833->42902 42907 6dc8796 42833->42907 42912 6dc8835 42833->42912 42917 6dc8875 42833->42917 42922 6dc89d4 42833->42922 42927 6dc893b 42833->42927 42932 6dc867a 42833->42932 42937 6dc87bd 42833->42937 42942 6dc8ac2 42833->42942 42947 6dc89e7 42833->42947 42834->42819 42852 6dc82b5 42851->42852 42853 6dc82da 42852->42853 42854 6dc87bd 2 API calls 42852->42854 42855 6dc867a 2 API calls 42852->42855 42856 6dc893b 2 API calls 42852->42856 42857 6dc89d4 2 API calls 42852->42857 42858 6dc8875 2 API calls 42852->42858 42859 6dc8835 2 API calls 42852->42859 42860 6dc8796 2 API calls 42852->42860 42861 6dc8896 2 API calls 42852->42861 42862 6dc88d1 2 API calls 42852->42862 42863 6dc8a28 2 API calls 42852->42863 42864 6dc8849 2 API calls 42852->42864 42865 6dc8aeb 4 API calls 42852->42865 42866 6dc86e6 2 API calls 42852->42866 42867 6dc8ee6 2 API calls 42852->42867 42868 6dc89e7 2 API calls 42852->42868 42869 6dc8ac2 2 API calls 42852->42869 42853->42819 42854->42853 42855->42853 42856->42853 42857->42853 42858->42853 42859->42853 42860->42853 42861->42853 42862->42853 42863->42853 42864->42853 42865->42853 42866->42853 42867->42853 42868->42853 42869->42853 42871 6dc8f0c 42870->42871 42951 6dc4ff9 42871->42951 42956 6dc5000 42871->42956 42872 6dc8f21 42876 6dc869c 42875->42876 42960 6dc58cf 42876->42960 42964 6dc58d0 42876->42964 42881 6dc8af8 42880->42881 42882 6dc889a 42880->42882 42968 6dc50a8 42881->42968 42972 6dc50b0 42881->42972 42884 6dc4ff9 ResumeThread 42882->42884 42885 6dc5000 ResumeThread 42882->42885 42883 6dc8f21 42884->42883 42885->42883 42889 6dc8834 42888->42889 42891 6dc4ff9 ResumeThread 42889->42891 42892 6dc5000 ResumeThread 42889->42892 42890 6dc8f21 42891->42890 42892->42890 42976 6dc5181 42893->42976 42980 6dc5188 42893->42980 42894 6dc8a46 42894->42834 42898 6dc88da 42897->42898 42984 6dc5248 42898->42984 42988 6dc5247 42898->42988 42899 6dc8a7f 42899->42834 42903 6dc889a 42902->42903 42905 6dc4ff9 ResumeThread 42903->42905 42906 6dc5000 ResumeThread 42903->42906 42904 6dc8f21 42905->42904 42906->42904 42909 6dc869c 42907->42909 42908 6dc87f1 42908->42834 42910 6dc58cf CreateProcessA 42909->42910 42911 6dc58d0 CreateProcessA 42909->42911 42910->42908 42911->42908 42913 6dc8ea2 42912->42913 42915 6dc4ff9 ResumeThread 42913->42915 42916 6dc5000 ResumeThread 42913->42916 42914 6dc8f21 42915->42914 42916->42914 42918 6dc8bc0 42917->42918 42920 6dc50a8 Wow64SetThreadContext 42918->42920 42921 6dc50b0 Wow64SetThreadContext 42918->42921 42919 6dc881c 42919->42834 42920->42919 42921->42919 42923 6dc89e1 42922->42923 42925 6dc5248 WriteProcessMemory 42923->42925 42926 6dc5247 WriteProcessMemory 42923->42926 42924 6dc8ba4 42924->42834 42925->42924 42926->42924 42928 6dc893c 42927->42928 42930 6dc4ff9 ResumeThread 42928->42930 42931 6dc5000 ResumeThread 42928->42931 42929 6dc8f21 42930->42929 42931->42929 42933 6dc869c 42932->42933 42935 6dc58cf CreateProcessA 42933->42935 42936 6dc58d0 CreateProcessA 42933->42936 42934 6dc87f1 42934->42834 42935->42934 42936->42934 42938 6dc87c3 42937->42938 42939 6dc87f1 42938->42939 42940 6dc58cf CreateProcessA 42938->42940 42941 6dc58d0 CreateProcessA 42938->42941 42939->42834 42940->42939 42941->42939 42943 6dc8ae5 42942->42943 42945 6dc5248 WriteProcessMemory 42943->42945 42946 6dc5247 WriteProcessMemory 42943->42946 42944 6dc881c 42944->42834 42945->42944 42946->42944 42948 6dc894f 42947->42948 42992 6dc5338 42947->42992 42996 6dc5337 42947->42996 42952 6dc4ffe ResumeThread 42951->42952 42953 6dc4fcc 42951->42953 42955 6dc5071 42952->42955 42953->42872 42955->42872 42957 6dc5040 ResumeThread 42956->42957 42959 6dc5071 42957->42959 42959->42872 42961 6dc58d0 CreateProcessA 42960->42961 42963 6dc5b1b 42961->42963 42963->42963 42965 6dc5959 CreateProcessA 42964->42965 42967 6dc5b1b 42965->42967 42967->42967 42969 6dc50b3 Wow64SetThreadContext 42968->42969 42971 6dc513d 42969->42971 42971->42882 42973 6dc50f5 Wow64SetThreadContext 42972->42973 42975 6dc513d 42973->42975 42975->42882 42977 6dc51c8 VirtualAllocEx 42976->42977 42979 6dc5205 42977->42979 42979->42894 42981 6dc51c8 VirtualAllocEx 42980->42981 42983 6dc5205 42981->42983 42983->42894 42985 6dc5290 WriteProcessMemory 42984->42985 42987 6dc52e7 42985->42987 42987->42899 42989 6dc5248 WriteProcessMemory 42988->42989 42991 6dc52e7 42989->42991 42991->42899 42993 6dc5383 ReadProcessMemory 42992->42993 42995 6dc53ba 42993->42995 42995->42948 42997 6dc5338 ReadProcessMemory 42996->42997 42999 6dc53ba 42997->42999 42999->42948 43000 25cd740 DuplicateHandle 43001 25cd7d6 43000->43001 43035 25cad70 43038 25cae59 43035->43038 43036 25cad7f 43039 25cae01 43038->43039 43041 25cae62 43038->43041 43039->43036 43040 25cae9c 43040->43036 43041->43040 43042 25cb0a0 GetModuleHandleW 43041->43042 43043 25cb0cd 43042->43043 43043->43036 43044 6dc9570 43045 6dc96fb 43044->43045 43046 6dc9596 43044->43046 43046->43045 43048 6dc552c 43046->43048 43049 6dc97f0 PostMessageW 43048->43049 43050 6dc985c 43049->43050 43050->43046 43107 6dc1eb2 43108 6dc1ebd 43107->43108 43110 6dc4bb8 ResumeThread 43108->43110 43111 6dc4ba9 ResumeThread 43108->43111 43109 6dc20ca 43110->43109 43111->43109
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c5b82e131611269be6b75b89de43b2408fed92c7cdf93f769b42c4b86634438e
                                                                • Instruction ID: 05aec2358aec069ab8877c46a7509b9f2ef53f1eb30f694d89a9a7f0620d854f
                                                                • Opcode Fuzzy Hash: c5b82e131611269be6b75b89de43b2408fed92c7cdf93f769b42c4b86634438e
                                                                • Instruction Fuzzy Hash: 2151A770E012089FDB08DFA9D8556EEBBF2FF88300F14846AD415AB364EB359942CF54
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 941e6c82510deb1eb4a20ffa6c38c64ffd2a28b5782763fbc8b47b475517745f
                                                                • Instruction ID: 29233836ae6a9d803c531cbf350e90312564fa978b95ce461240a1fd3ecad171
                                                                • Opcode Fuzzy Hash: 941e6c82510deb1eb4a20ffa6c38c64ffd2a28b5782763fbc8b47b475517745f
                                                                • Instruction Fuzzy Hash: F751A770E012099FDB18DFA9D854AEEBBF2FF88310F148469D415AB364EB359942CF54

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 336 25cd4e8-25cd587 GetCurrentProcess 340 25cd589-25cd58f 336->340 341 25cd590-25cd5c4 GetCurrentThread 336->341 340->341 342 25cd5cd-25cd601 GetCurrentProcess 341->342 343 25cd5c6-25cd5cc 341->343 345 25cd60a-25cd625 call 25cd6c8 342->345 346 25cd603-25cd609 342->346 343->342 349 25cd62b-25cd65a GetCurrentThreadId 345->349 346->345 350 25cd65c-25cd662 349->350 351 25cd663-25cd6c5 349->351 350->351
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 025CD576
                                                                • GetCurrentThread.KERNEL32 ref: 025CD5B3
                                                                • GetCurrentProcess.KERNEL32 ref: 025CD5F0
                                                                • GetCurrentThreadId.KERNEL32 ref: 025CD649
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID:
                                                                • API String ID: 2063062207-0
                                                                • Opcode ID: 8087046f5a213d9b155a38d6b8011f4b59aeed4a1f05f71d9f31572d32d1acca
                                                                • Instruction ID: 9499380f40ef85be8384492d0f2552541f14c96dff7775ab7cdbbf5457c059ca
                                                                • Opcode Fuzzy Hash: 8087046f5a213d9b155a38d6b8011f4b59aeed4a1f05f71d9f31572d32d1acca
                                                                • Instruction Fuzzy Hash: EB5148B0901349CFEB14DFA9D548BDEBBF1FB88304F24845DD409A72A1D7359984CB6A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 358 25cd4f8-25cd587 GetCurrentProcess 362 25cd589-25cd58f 358->362 363 25cd590-25cd5c4 GetCurrentThread 358->363 362->363 364 25cd5cd-25cd601 GetCurrentProcess 363->364 365 25cd5c6-25cd5cc 363->365 367 25cd60a-25cd625 call 25cd6c8 364->367 368 25cd603-25cd609 364->368 365->364 371 25cd62b-25cd65a GetCurrentThreadId 367->371 368->367 372 25cd65c-25cd662 371->372 373 25cd663-25cd6c5 371->373 372->373
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 025CD576
                                                                • GetCurrentThread.KERNEL32 ref: 025CD5B3
                                                                • GetCurrentProcess.KERNEL32 ref: 025CD5F0
                                                                • GetCurrentThreadId.KERNEL32 ref: 025CD649
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID:
                                                                • API String ID: 2063062207-0
                                                                • Opcode ID: 20feb63361978d624e2106e221536011f3667e855e0ef0d1d69be724b5023eb6
                                                                • Instruction ID: ea563dcf2232add5b0c844f0a901b5039554cdb25f711e46dee7ca103a231811
                                                                • Opcode Fuzzy Hash: 20feb63361978d624e2106e221536011f3667e855e0ef0d1d69be724b5023eb6
                                                                • Instruction Fuzzy Hash: ED5147B1901309CFEB14DFA9D548B9EBBF1FB88304F20845DE409A7360D775A984CB6A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 380 82b6818-82b6821 382 82b6823-82b6838 380->382 383 82b67d6-82b67f5 GetCurrentThreadId 380->383 384 82b683a-82b683e 382->384 385 82b684e-82b6850 382->385 386 82b67fe-82b6812 383->386 387 82b67f7-82b67fd 383->387 388 82b68aa-82b68ec 384->388 389 82b6840-82b684c 384->389 390 82b687f-82b6881 385->390 391 82b6852-82b6860 385->391 387->386 415 82b68ed 388->415 389->384 389->385 394 82b6883-82b688f 390->394 395 82b68a5-82b68a9 390->395 391->390 400 82b6862-82b6868 391->400 394->395 401 82b6891-82b689d 394->401 400->390 402 82b686a-82b686e 400->402 401->395 404 82b68f3-82b68fd 402->404 405 82b6874-82b687d call 82b4edc 402->405 411 82b68fe-82b6948 404->411 405->390 405->402 420 82b694b-82b694c 411->420 415->404 420->415 421 82b694e-82b696f 420->421 422 82b6981-82b698d 421->422 423 82b6971-82b697c call 82b4eec call 82b4efc 421->423 428 82b6b4e-82b6b60 422->428 429 82b6993-82b69fc call 82b6f68 422->429 423->422 433 82b6b65-82b6b7f 428->433 447 82b69fe-82b6a05 429->447 448 82b6a06-82b6a10 429->448 438 82b6ba2-82b6ba9 433->438 439 82b6b81-82b6b9c 433->439 439->438 450 82b6a12-82b6a1c 448->450 451 82b6a21-82b6a2f 448->451 450->451 453 82b6a5c-82b6a74 451->453 454 82b6a31-82b6a3b 451->454 460 82b6a86-82b6aac 453->460 461 82b6a76-82b6a80 453->461 455 82b6a3d-82b6a41 454->455 456 82b6a4c-82b6a56 454->456 455->456 457 82b6a43-82b6a4a 455->457 480 82b6a59 call 82bfa3f 456->480 481 82b6a59 call 82bfa40 456->481 457->453 457->456 465 82b6abe-82b6ae4 460->465 466 82b6aae-82b6ab8 460->466 461->460 470 82b6af6-82b6b03 465->470 471 82b6ae6-82b6af0 465->471 466->465 473 82b6b15-82b6b31 470->473 474 82b6b05-82b6b0f 470->474 471->470 473->433 476 82b6b33-82b6b3a 473->476 474->473 476->433 477 82b6b3c-82b6b4c 476->477 477->433 480->453 481->453
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 082B67E4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420575561.00000000082B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 082B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_82b0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread
                                                                • String ID: Hq$Hq
                                                                • API String ID: 2882836952-925789375
                                                                • Opcode ID: 091f9209d4371730fe40beab7c93583431b442c0b2e2e1668ccc1655c6bcc51b
                                                                • Instruction ID: 2fc639150f4d8b38ae688063d439887600cf1d18998455537c21cdefdea98390
                                                                • Opcode Fuzzy Hash: 091f9209d4371730fe40beab7c93583431b442c0b2e2e1668ccc1655c6bcc51b
                                                                • Instruction Fuzzy Hash: BC61AD35B112118FCB149B78D498AAEBBB2EFC8745B14846DE906DB361EB31DC06CB81
                                                                APIs
                                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06DC5B06
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID:
                                                                • API String ID: 963392458-0
                                                                • Opcode ID: c1d678fa6d69f0860762a978b1cd0e283d31c665a64f11d90317264db3d3bc9e
                                                                • Instruction ID: 56de45deca77392416ebfa2a6f42deb974f748052af936ea9d719e54ca1c3435
                                                                • Opcode Fuzzy Hash: c1d678fa6d69f0860762a978b1cd0e283d31c665a64f11d90317264db3d3bc9e
                                                                • Instruction Fuzzy Hash: 5D914C71D0031ECFEB64DF69D841B9DBBB2AB48320F1485A9E809A7240DB74A995CF91
                                                                APIs
                                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06DC5B06
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID:
                                                                • API String ID: 963392458-0
                                                                • Opcode ID: 198c32781dc2b0895557dccb591050ca10ce25d7a2462ef314c9551643df9057
                                                                • Instruction ID: a46ba154b4ee3ff4159834fcca947d52f156d3cc35e39c9757772614c05e6913
                                                                • Opcode Fuzzy Hash: 198c32781dc2b0895557dccb591050ca10ce25d7a2462ef314c9551643df9057
                                                                • Instruction Fuzzy Hash: C3914C71D0031ECFEB54DF69D841B9DBBB2BF48320F1485A9E809A7240DB74A995CF91
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 025CB0BE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 10f01a235ca63ac59fcc3c0213b998a7c6834a0509fd125e2470453dd412b669
                                                                • Instruction ID: 83dceb31bf7f2afff19fcba95cc1933a7dcfbeba486278b5e004d67089b2ba58
                                                                • Opcode Fuzzy Hash: 10f01a235ca63ac59fcc3c0213b998a7c6834a0509fd125e2470453dd412b669
                                                                • Instruction Fuzzy Hash: DC9168B0A00B498FD725DF79D45079ABBF1FF84204F14892ED08ACBA51E735E80ACB95
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 025C59C9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: 7ea9859be9416e0a5b767565e8df2105a0d8e900b15d01380b76ec09bd007e0a
                                                                • Instruction ID: 2cc975eaccec2483b4c1c9d6ec800ace6b07b48f3c612af6dcc9fdc1ef46b7ec
                                                                • Opcode Fuzzy Hash: 7ea9859be9416e0a5b767565e8df2105a0d8e900b15d01380b76ec09bd007e0a
                                                                • Instruction Fuzzy Hash: CD41D2B0D00719CFEB28DFAAC844B8DFBB5BF49304F60816AD408AB251EB756946CF54
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 025C59C9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: f8a937c18fb20e1b503c9ec0a9224098540a4d9dc1cdfd39e79cbee4757f2d2a
                                                                • Instruction ID: a95132d5f09f96ba83a2c605dc764c28dd2d887bac1d531446d52f07aab60e1d
                                                                • Opcode Fuzzy Hash: f8a937c18fb20e1b503c9ec0a9224098540a4d9dc1cdfd39e79cbee4757f2d2a
                                                                • Instruction Fuzzy Hash: 5E41E371D00719CFEB28DFA9C8847CDBBB2BF48304F60806AD409AB251EB75694ACF54
                                                                APIs
                                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06DC52D8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID:
                                                                • API String ID: 3559483778-0
                                                                • Opcode ID: d2bee8f98e6c378e1edac06a425ff2df779d21befa8ab8bfe4909ae8f2e280a2
                                                                • Instruction ID: 49bb29c1d031a8960715b0d7abc0244ae4eff3ff1ad8dac0f307c8e05ddc512b
                                                                • Opcode Fuzzy Hash: d2bee8f98e6c378e1edac06a425ff2df779d21befa8ab8bfe4909ae8f2e280a2
                                                                • Instruction Fuzzy Hash: 4D212675D003499FDB14CFAAC881BDEBBF5FF48310F10842AE918A7240C779A950CBA5
                                                                APIs
                                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06DC52D8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID:
                                                                • API String ID: 3559483778-0
                                                                • Opcode ID: 899793b2f9984602cb20d5dac1ef4dace9b1b16e5cf63ea3ef8db5dc035f6792
                                                                • Instruction ID: e0ef49ec8b300a77797e0ed5ea74d35189b551ecf6e28dc6a92b2772e602b74c
                                                                • Opcode Fuzzy Hash: 899793b2f9984602cb20d5dac1ef4dace9b1b16e5cf63ea3ef8db5dc035f6792
                                                                • Instruction Fuzzy Hash: 59212671D003499FDB14CFAAC880BDEBBF5FF48310F10842AE918A7240C779A950CBA4
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06DC512E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID:
                                                                • API String ID: 983334009-0
                                                                • Opcode ID: 2658642e30daa53deed6fe60b1bc05e0f5b6bffcd71fd10f6c7d39c685734fe2
                                                                • Instruction ID: 251d4923c96a50dc027d13700e5f1eca083f05724115090ee65dea1377250259
                                                                • Opcode Fuzzy Hash: 2658642e30daa53deed6fe60b1bc05e0f5b6bffcd71fd10f6c7d39c685734fe2
                                                                • Instruction Fuzzy Hash: A6213A75D003098FDB14DFAAC884BEEBBF4EF48220F14852DD519A7280CB789645CFA4
                                                                APIs
                                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06DC53B8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID:
                                                                • API String ID: 1726664587-0
                                                                • Opcode ID: aa3fbd1bddc244e978cbef1fd61f9878ff32f8643d40221bd8785b312a74af09
                                                                • Instruction ID: 80e1d1c61f31e211425b692b8a2a7b2705c5a10d59a960535a917da968930165
                                                                • Opcode Fuzzy Hash: aa3fbd1bddc244e978cbef1fd61f9878ff32f8643d40221bd8785b312a74af09
                                                                • Instruction Fuzzy Hash: DA21E5718003499FDB14DFAAD841BEEBBF5FF48310F10842AE519A7240C779A551DBA5
                                                                APIs
                                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06DC53B8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID:
                                                                • API String ID: 1726664587-0
                                                                • Opcode ID: 7908a98b6a1199f778a70d429267d455ee5b59b1ccca989ecaeadd4799abcedd
                                                                • Instruction ID: 376c54d7b145fe6b20f8649cf8dbd3d185ba1fe5512fc47b8a0e351e1a264c07
                                                                • Opcode Fuzzy Hash: 7908a98b6a1199f778a70d429267d455ee5b59b1ccca989ecaeadd4799abcedd
                                                                • Instruction Fuzzy Hash: 0C21E5718003499FDB14DFAAC840BEEBBF5FF48310F10842AE519A7240C779A551DBA5
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06DC512E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID:
                                                                • API String ID: 983334009-0
                                                                • Opcode ID: 75e5ef22f9506f40fe20df31ba26c6e6e1efa902e721d6f4d78bd0595e1f5b1f
                                                                • Instruction ID: ea39d1c508d3e88e77d4cc42fce3e939aa9ca1e33ee51f940690bb88726311dd
                                                                • Opcode Fuzzy Hash: 75e5ef22f9506f40fe20df31ba26c6e6e1efa902e721d6f4d78bd0595e1f5b1f
                                                                • Instruction Fuzzy Hash: 7F211871D003098FDB14DFAAC885BEEBBF4EF48224F14842ED559A7240CB78A945CFA5
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 025CD7C7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: bf28cabb9d08fbf7b95cb576f33b03f0bc75a4ba70c210cb472c773387bddf74
                                                                • Instruction ID: a46fec5bc80a5920b0229d91cd9f0a3b37ccbc1be8fdba46c11fcf41e0c81695
                                                                • Opcode Fuzzy Hash: bf28cabb9d08fbf7b95cb576f33b03f0bc75a4ba70c210cb472c773387bddf74
                                                                • Instruction Fuzzy Hash: 1B21E3B5900248DFDB10CFAAD584ADEFBF8FB48310F14842AE914A7350D378A950CF65
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID:
                                                                • API String ID: 947044025-0
                                                                • Opcode ID: 85d32c412db6fd08c956f16c12400c31ee0f2b55c6c8d59ef39eb8dcd8d01377
                                                                • Instruction ID: 6f5bf14739a65300fbd1136d818fdb7650a267dcafbf721ff162a0dc512ad92c
                                                                • Opcode Fuzzy Hash: 85d32c412db6fd08c956f16c12400c31ee0f2b55c6c8d59ef39eb8dcd8d01377
                                                                • Instruction Fuzzy Hash: 8F213875D003498FDB24DFAAD844B9EFBF5EF48224F108559D529A7280CB756940CB94
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 025CD7C7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 0ec376c33aa0e4ce2cfdbc4cbb341b208f8e82631c195e487047929c2489275e
                                                                • Instruction ID: cbcce82eae4043df9726168c96b887bca7ad2f1ef28b1530e8d3fcf8519a92a3
                                                                • Opcode Fuzzy Hash: 0ec376c33aa0e4ce2cfdbc4cbb341b208f8e82631c195e487047929c2489275e
                                                                • Instruction Fuzzy Hash: 5B21E0B5D00248DFDB10CFA9D580ADEBBF5FB48310F14842AE958A7350D378AA50CF64
                                                                APIs
                                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06DC51F6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 1209f26e3f690ae2ae15df7011826661190847b4d1b9baa8d9043095e4796f02
                                                                • Instruction ID: 62a4e0ef7b5ec3d99212c7bfcfc000a11d40d02fce8ce1a848d9eacec725f605
                                                                • Opcode Fuzzy Hash: 1209f26e3f690ae2ae15df7011826661190847b4d1b9baa8d9043095e4796f02
                                                                • Instruction Fuzzy Hash: 4B1117768002499FDB24DFAAD844BDEFBF5EB48320F148419E919A7250C7759550CBA1
                                                                APIs
                                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06DC51F6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 9bb2d6ee0c08d9544638cfc963a0843d8300cc817b599fa6941a2de5911f2126
                                                                • Instruction ID: 0daf34c895f637976191e80439149781517a2eef06a5c821d4ff3e03340555d4
                                                                • Opcode Fuzzy Hash: 9bb2d6ee0c08d9544638cfc963a0843d8300cc817b599fa6941a2de5911f2126
                                                                • Instruction Fuzzy Hash: 641126768003499FDB24DFAAC844BDEFBF5EF48320F148419E515A7250CB79A550CBA5
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID:
                                                                • API String ID: 947044025-0
                                                                • Opcode ID: ec7243c3563136da8ea383035e4515a8aec79936fcd1b8c5be9d3aa6155d61ab
                                                                • Instruction ID: cc5b28cfd087930e60b1efc248d770282a7411fdca6cd2833ce6245f54ae1b5e
                                                                • Opcode Fuzzy Hash: ec7243c3563136da8ea383035e4515a8aec79936fcd1b8c5be9d3aa6155d61ab
                                                                • Instruction Fuzzy Hash: DB112871D003498FDB24DFAAC4457EEFBF5EF48224F14841DD519A7240CA79A544CBA5
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 025CB0BE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 4f56956f43f9ce37639a01872c632a77553c41d36ca95180958e6d846122ca2d
                                                                • Instruction ID: 1a5e3351a9136dd118b7dfd12714d7c4e52f4eedcb1756a2a8abbd2a7e7f0486
                                                                • Opcode Fuzzy Hash: 4f56956f43f9ce37639a01872c632a77553c41d36ca95180958e6d846122ca2d
                                                                • Instruction Fuzzy Hash: 18110FB6C002498FDB20CF9AC444BDEFBF8FB88224F20841AD428A7640D379A545CFA5
                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 06DC984D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID:
                                                                • API String ID: 410705778-0
                                                                • Opcode ID: d4bef181e9d4a71c37b28bddf87553d3548b33ce6242fac06e5356a2de19b392
                                                                • Instruction ID: 2e60475474cb497e8e37e57779113e57f3d8e8590ad71f6cdd4eb18a8d8db13c
                                                                • Opcode Fuzzy Hash: d4bef181e9d4a71c37b28bddf87553d3548b33ce6242fac06e5356a2de19b392
                                                                • Instruction Fuzzy Hash: D11106B5800249DFDB10DF9AD844BDEFBF8EB48320F10851AE528A7340C379A544CFA1
                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 06DC984D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID:
                                                                • API String ID: 410705778-0
                                                                • Opcode ID: ce83efd7194315ab1e4794302aa73d7d3fc1eeeacf0d85def7e8d3de47dd2c47
                                                                • Instruction ID: 0496942d753587a89d87eb6a1d67758f0ec96f1d7d5a25dae3690cc6fe7949aa
                                                                • Opcode Fuzzy Hash: ce83efd7194315ab1e4794302aa73d7d3fc1eeeacf0d85def7e8d3de47dd2c47
                                                                • Instruction Fuzzy Hash: 8411E3B5800249DFDB10DF9AC484BDEBBF8EB48320F108419E558A7250C375A954CFA5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1394938436.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_9cd000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9657226e283172d5c13917ad41f9561d1a8295000b550a94e5e9b8983fb6788c
                                                                • Instruction ID: 9024bc7c43c484b6bceef00292d5e222f2af7d62981127ac39f1e3231d537228
                                                                • Opcode Fuzzy Hash: 9657226e283172d5c13917ad41f9561d1a8295000b550a94e5e9b8983fb6788c
                                                                • Instruction Fuzzy Hash: BA21F771900204DFDB18DF14D9C0F26BB65FB94314F20C57DEA090B2A6C33AE856CAA3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399263470.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_d2d000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 480095ceebaaa6fa96322ee935efc15d74a9f9a08da834b5ddd0d580c292fe3c
                                                                • Instruction ID: f11f150689f4d03057a626e95db34550207115acb85bb07bc315465f8a2f1081
                                                                • Opcode Fuzzy Hash: 480095ceebaaa6fa96322ee935efc15d74a9f9a08da834b5ddd0d580c292fe3c
                                                                • Instruction Fuzzy Hash: 0721D071904200EFDB15DF24E9C0B26BBA6FF94318F24C5ADE8494B292C336D846CA76
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399263470.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_d2d000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e62cb12bfddf27b214c83b9223165989318dc93396a7350e96845ced8cb69232
                                                                • Instruction ID: 58d935462f925695e8303eb7c753f336626c6b9ef87bd5bdb9161c7ff0a13c2f
                                                                • Opcode Fuzzy Hash: e62cb12bfddf27b214c83b9223165989318dc93396a7350e96845ced8cb69232
                                                                • Instruction Fuzzy Hash: D421F571504340DFDB24DF24E6C4B16BB66FB94318F24C56DE94A4B2A6C336D847CA72
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399263470.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_d2d000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 50aa59b3d5edd9f1182cc5bb80a0e3f30410df44922c77230b9e58b5bf981073
                                                                • Instruction ID: 6be865df185ab67311884ffa3e0f115394376941eee2c0d97652dd3fc5f41725
                                                                • Opcode Fuzzy Hash: 50aa59b3d5edd9f1182cc5bb80a0e3f30410df44922c77230b9e58b5bf981073
                                                                • Instruction Fuzzy Hash: A12192755093C09FCB12CF24D990715BF72EB46314F28C5EAD8498F6A7C33A980ACB62
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1394938436.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_9cd000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                                                                • Instruction ID: e64c6d1ae4c54e4cc03d8a3c9b944d9e6f15842ebadb3577e70d828ec5851b0c
                                                                • Opcode Fuzzy Hash: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                                                                • Instruction Fuzzy Hash: 9611D676904240DFDB15CF10D5C4B16BF71FB94314F24C6ADD9094B6A6C33AD456CB92
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399263470.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_d2d000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                                                • Instruction ID: 09ec2f5fbd8fd3dc659dda309b1fde7c77e4c042e96609519c53cb1642fdd4c0
                                                                • Opcode Fuzzy Hash: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                                                • Instruction Fuzzy Hash: E6118B75904280DFDB15CF10E5C4B15FBA2FF94318F28C6A9D8494B696C33AD84ACB62
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1394938436.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_9cd000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e34991ac38cb1d0a99a3c65ef3efc0c625219828af13929efca348ae322f30e7
                                                                • Instruction ID: ccbd1179e39bfe28412c1994140334c91788a8c59ff9e318558abc361bd0161d
                                                                • Opcode Fuzzy Hash: e34991ac38cb1d0a99a3c65ef3efc0c625219828af13929efca348ae322f30e7
                                                                • Instruction Fuzzy Hash: D801F7B1805340ABF7205E25CD84F66BB9CEF41360F14852EED080E282D2799841CAB3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1394938436.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_9cd000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: be4fd2edacc75107dbcf65d378f6f6fe4e4493d723a0aa201acf13e6c46fa19c
                                                                • Instruction ID: 9326465fe602ea771b7f575127a98e578c532d634e7f2a1ca4b7f377685dca2c
                                                                • Opcode Fuzzy Hash: be4fd2edacc75107dbcf65d378f6f6fe4e4493d723a0aa201acf13e6c46fa19c
                                                                • Instruction Fuzzy Hash: DCF06271405344AEEB248E15C988F62FF9CEB51734F18C55EED084F286C2799944CAB2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fd595d25a2703ff95f202560a541f875b2fea575d86d130e799d20e19986b2e8
                                                                • Instruction ID: 8e52273a10203190cc93d7992ae753b007e6956eef8abd9ed46dde96f7abf889
                                                                • Opcode Fuzzy Hash: fd595d25a2703ff95f202560a541f875b2fea575d86d130e799d20e19986b2e8
                                                                • Instruction Fuzzy Hash: 01E1AC71B0170A8FEB65DB76C860B6AB7F6EFC9710F14446EE1468B290DB35D802CB91
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 16c9353e9eb2ee62a3f3fc117ea9bb8331b0f4c3a2ec0ea94fdf777d3904c393
                                                                • Instruction ID: 470856ee49fbc19e265e711c23236cde06616748c1969351a85f401a01191e91
                                                                • Opcode Fuzzy Hash: 16c9353e9eb2ee62a3f3fc117ea9bb8331b0f4c3a2ec0ea94fdf777d3904c393
                                                                • Instruction Fuzzy Hash: 4EE11C74E0025A8FDB54DF99C580AAEFBF2FF89315F248159D814AB356D730A941CFA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 764b440f18b8dac7db2e2ad93802ebd434cb7ffa45141b6d1c14e7983976e8fe
                                                                • Instruction ID: ba4cecb914a39bf24ff619010bfaa2e3cab79c346b579fe0aca5416a3df69931
                                                                • Opcode Fuzzy Hash: 764b440f18b8dac7db2e2ad93802ebd434cb7ffa45141b6d1c14e7983976e8fe
                                                                • Instruction Fuzzy Hash: A6E12C74E0025A8FDB54DF99C590AAEFBF2FF89315F248169D814AB316D730A941CFA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 42fd84dac23068b46042e5568387ba7c310c2b14bbc691d58df0ad395411cd51
                                                                • Instruction ID: a565c5d3c95955794c22d7f6d5385c668636e86be7af9398896da917338d7710
                                                                • Opcode Fuzzy Hash: 42fd84dac23068b46042e5568387ba7c310c2b14bbc691d58df0ad395411cd51
                                                                • Instruction Fuzzy Hash: A4E13C74E0021A8FDB54DFA9C590AAEFBF2FF89315F248159D844AB316C730A941CFA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9b473f2516ea5fe760d0b86168d7c4dd647a5cbc7f8e0897e36c00550be5d27d
                                                                • Instruction ID: b207c194c92dad765ee8c70a9cc88fe8c33f622f9880712a2e61da2c0da87d01
                                                                • Opcode Fuzzy Hash: 9b473f2516ea5fe760d0b86168d7c4dd647a5cbc7f8e0897e36c00550be5d27d
                                                                • Instruction Fuzzy Hash: FDE11E74E0025A8FDB54DFA9C580AAEFBF2FF88315F248159D854AB356D730A941CFA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1f582b0237aec3dbc8bd97526e14693975322546649e3faac7462fb82484f801
                                                                • Instruction ID: 8daa2ce121d2e6330cd9c33295258fdd17720351a9b26b8ef5a62fcd30396425
                                                                • Opcode Fuzzy Hash: 1f582b0237aec3dbc8bd97526e14693975322546649e3faac7462fb82484f801
                                                                • Instruction Fuzzy Hash: 38E12E74E002198FDB54DFA9C590AAEFBF2FF89315F248169D414AB356D730A941CFA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420575561.00000000082B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 082B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_82b0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7e6f241aff80f81976d8cf5968c4f4f77c03f218484af50d1970d0a427e03175
                                                                • Instruction ID: 10058dfa4e4e77a58fdc1c0cf01a06c47fe4452ec0cb5a3cb9bef94372c0040b
                                                                • Opcode Fuzzy Hash: 7e6f241aff80f81976d8cf5968c4f4f77c03f218484af50d1970d0a427e03175
                                                                • Instruction Fuzzy Hash: 7BD10735D10B5A8ACB15EB64D890B99B7B1FF95300F20C79AE1093B215FF70AAC5DB81
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1399945932.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_25c0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 370f5c4476850dba5a215d5f86dc51725ee54bb34232734e9adfa2e764789a31
                                                                • Instruction ID: 59c19879c0835563e37042290acebcd36140f10917a6263a73396664f920a121
                                                                • Opcode Fuzzy Hash: 370f5c4476850dba5a215d5f86dc51725ee54bb34232734e9adfa2e764789a31
                                                                • Instruction Fuzzy Hash: 42A15B36E002068FCF09DFA5C84059EBBB3FF85304B25856EE805AB265EB71E956CF44
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420575561.00000000082B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 082B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_82b0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 37fc423072e0765a1775642ec48344337cd51375ea4968db006209d8fd77fe1a
                                                                • Instruction ID: 5416b70cd0145789b7a3bdd6299b6703a78d163c64d5a55b5b394d4569d58e41
                                                                • Opcode Fuzzy Hash: 37fc423072e0765a1775642ec48344337cd51375ea4968db006209d8fd77fe1a
                                                                • Instruction Fuzzy Hash: C6D1F735D10B5A8ACB15EB64D890B99B7B1FF95300F20C79AE1093B215FF70AAC5DB81
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1420225968.0000000006DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6dc0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9a6e6d30a97eedd5b8329e570c2e5cb36ccf326c707d24b0dcbe539a62a4bf08
                                                                • Instruction ID: 8b688fc24f388b060d20971d402bd98f5afe3f8a8c22e5ace20d1fc514c19dcc
                                                                • Opcode Fuzzy Hash: 9a6e6d30a97eedd5b8329e570c2e5cb36ccf326c707d24b0dcbe539a62a4bf08
                                                                • Instruction Fuzzy Hash: 74514C74E002598FDB54CFA9C5905AEFBF2FF89314F2481A9D418AB356D7309942CFA1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (oq$(oq$(oq$(oq$(oq$(oq$(oq$,q$,q
                                                                • API String ID: 0-746337618
                                                                • Opcode ID: 5620af2616311bb017edb2fe225d37ec478a086166d004e407943e5e02096b94
                                                                • Instruction ID: d03b92ac61a31ac8cec7e80018a13e15e7fa443c2867a3d401e46c3cf434999e
                                                                • Opcode Fuzzy Hash: 5620af2616311bb017edb2fe225d37ec478a086166d004e407943e5e02096b94
                                                                • Instruction Fuzzy Hash: 4C823835A04209DFDB25CF68C984AAEBBF2BF88300F158559F516AB661D731ED81CF90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (oq$(oq$(oq$(oq$,q$,q$Hq
                                                                • API String ID: 0-2858405300
                                                                • Opcode ID: a1730d32a3ab70a8c64d56ad1c257ed5300eae61ed151bc90ff4da6499e00e5a
                                                                • Instruction ID: 4688363cff3b752469cfa3169783db5039397df21ecfe78da6c42ad946d65e13
                                                                • Opcode Fuzzy Hash: a1730d32a3ab70a8c64d56ad1c257ed5300eae61ed151bc90ff4da6499e00e5a
                                                                • Instruction Fuzzy Hash: 6D726F71A002199FDB14DF69C854AAEBBF6FF89300F148169E916AB3A5DB30DD41CF90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: N
                                                                • API String ID: 0-1130791706
                                                                • Opcode ID: 0e5dd6b75f2aecadb2ae6fec39644919b9771b665c8e55b224725bf76f48bca6
                                                                • Instruction ID: 0a96fec3569d3ab2feeff425f39e36070f615606b05e5a5627922c5fd6bcd832
                                                                • Opcode Fuzzy Hash: 0e5dd6b75f2aecadb2ae6fec39644919b9771b665c8e55b224725bf76f48bca6
                                                                • Instruction Fuzzy Hash: C473E431D1075A8EDB11EF68C944A99FBB1FF99300F51C6DAE44867225EB70AAC4CF81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Xq$Xq
                                                                • API String ID: 0-1556399337
                                                                • Opcode ID: 2d9fc824fd8c6bdccf460c1f75afce38aaf4d32b04b9f527d027ea9ae18d97a1
                                                                • Instruction ID: 9f2576ee7627f7b342fd7ec816dc72e55e08ffaa2fc036a6a3a2b4d8e9bebe2d
                                                                • Opcode Fuzzy Hash: 2d9fc824fd8c6bdccf460c1f75afce38aaf4d32b04b9f527d027ea9ae18d97a1
                                                                • Instruction Fuzzy Hash: E842F7729563A59FC7875B78C8552943BF1AF6B32C37808EDD0C1CA166F26B1983CB06
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PHq$PHq
                                                                • API String ID: 0-1274609152
                                                                • Opcode ID: 0c35e3ea14b0b8d1be1c543ecec26ff8fe4b631b1f5aba7176960edcbbd8d050
                                                                • Instruction ID: 53d1abdcf826175b9b206f32b9dc97eef59cd32dc5b3e896142433954eabe280
                                                                • Opcode Fuzzy Hash: 0c35e3ea14b0b8d1be1c543ecec26ff8fe4b631b1f5aba7176960edcbbd8d050
                                                                • Instruction Fuzzy Hash: EC81D075E00218CFDB28DFAAC9547ADBBF2BF89300F24816AD41AAB354DB305946CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 55325494442c971e5be0043c9fb0b74d7561060f1cd44ab74f03e880b3a2e235
                                                                • Instruction ID: a9978cb454e530c6a5368123867bb5f2755984f5fb714fb09a0df0af0e5ce093
                                                                • Opcode Fuzzy Hash: 55325494442c971e5be0043c9fb0b74d7561060f1cd44ab74f03e880b3a2e235
                                                                • Instruction Fuzzy Hash: AF827B74E012288FDBA5DF69C998BDDBBB2BF89300F1481E9A40DA7254DB315E81CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 07b181c816a0f15d26da1f7a9c35d03809b2055567887b4302850cf258ffebf4
                                                                • Instruction ID: 126289049ba67916f7f738f659c13b61df5f8cb7c8c6d6ccf39dd613fb0a6012
                                                                • Opcode Fuzzy Hash: 07b181c816a0f15d26da1f7a9c35d03809b2055567887b4302850cf258ffebf4
                                                                • Instruction Fuzzy Hash: 25C1B174E01218CFDB14DFA9D994B9DBBB2FF88304F2081A9E809AB354DB355A85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b40cef9af53f383a87ad9c5f73a7388fd4d4b6c6ef4b8246e983129160fce6d2
                                                                • Instruction ID: c0ae081d2d122f7f8106edceae453a20bd8d4b178052c9c785032cf5ac444db6
                                                                • Opcode Fuzzy Hash: b40cef9af53f383a87ad9c5f73a7388fd4d4b6c6ef4b8246e983129160fce6d2
                                                                • Instruction Fuzzy Hash: DAA12571D0061A8FEB10DFA9C9847DDFBB1EF89300F14C2AAE44867265EB749A85CF41
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bfb005fe43aca9868300fb946d3dc999e8867d6fe03865eaab55b64b6a6be475
                                                                • Instruction ID: eed678f21b0806a4858521181a63b08e39b92608e95b122f84fe31fa7c985390
                                                                • Opcode Fuzzy Hash: bfb005fe43aca9868300fb946d3dc999e8867d6fe03865eaab55b64b6a6be475
                                                                • Instruction Fuzzy Hash: 11A12570D00208CFEB14DFA9C998BDDBBB1FF88314F248269E448AB295DB745985CF64
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 02cf6ec3d00c4d1bf28cc8dc5c5f98eab14b08da19c57624fd16abd9490f3929
                                                                • Instruction ID: 10ad0fd902f719427e5a371255efdd5f0567781aadac826845c980f7c05fa27e
                                                                • Opcode Fuzzy Hash: 02cf6ec3d00c4d1bf28cc8dc5c5f98eab14b08da19c57624fd16abd9490f3929
                                                                • Instruction Fuzzy Hash: C291F270D00208CFEB10DFA8C598BDCBBB1FF49314F248299E449AB295DB799985CF54
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e2a8bedb1bfaee0a4211d9cd3a648e263008e2d30d263190eea9304e4db41956
                                                                • Instruction ID: 54587e05169c7b84cc8c290dc7d009da1e85108a2f2930c533dce2edae552e24
                                                                • Opcode Fuzzy Hash: e2a8bedb1bfaee0a4211d9cd3a648e263008e2d30d263190eea9304e4db41956
                                                                • Instruction Fuzzy Hash: 8681C174E412288FDB65DF29D990BDDBBB2BB89300F1080EAE949A7354DB315E81CF40
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8f8071fd56846f1e9a3b8fee0259a7aede4d0adbd524c6f24f52edaaac369416
                                                                • Instruction ID: 8a59627cdc84b28cc3cf31ada349355328bd94c6584c1dbe57918017b57a00fe
                                                                • Opcode Fuzzy Hash: 8f8071fd56846f1e9a3b8fee0259a7aede4d0adbd524c6f24f52edaaac369416
                                                                • Instruction Fuzzy Hash: 5441E174D00208CBEB18CFAAD95469DFBF2BF88304F24C02AD815AB359EB385945CF54
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8q$Hq$Hq$Hq$TJq
                                                                • API String ID: 0-768243005
                                                                • Opcode ID: 2efb709d0beeda82e75a5ba4e1ed30dc19612bbc8581499914ddc8cacfe8bcb5
                                                                • Instruction ID: d11475798118206a936b2fa5546e7ce61c0ce3b0057278c6071885603fa3368f
                                                                • Opcode Fuzzy Hash: 2efb709d0beeda82e75a5ba4e1ed30dc19612bbc8581499914ddc8cacfe8bcb5
                                                                • Instruction Fuzzy Hash: 92D1D031B002048FDB159B6CD491AAD7BF6EF89320F184465E546EB3A5DB39DC42CBA1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0oKp$LjKp$LjKp$PHq$PHq
                                                                • API String ID: 0-2065946399
                                                                • Opcode ID: db73fc402fd9585c7faeb0e2b3db0e0806f625ffd124d4b5df9bcecc9f7ba00a
                                                                • Instruction ID: cdf48df7a9852ef1efd313bfc63a59ccf70a9213f88a9aac039e9bc1c2854c72
                                                                • Opcode Fuzzy Hash: db73fc402fd9585c7faeb0e2b3db0e0806f625ffd124d4b5df9bcecc9f7ba00a
                                                                • Instruction Fuzzy Hash: 5151A474E00608DFDB44DFAAD984A9DBBF2FF89310F148469E815AB368DB34A941CF50
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $Hq$Hq$Hq
                                                                • API String ID: 0-1373062214
                                                                • Opcode ID: ce8e7460cbc99de88b5e15f7bbde4c9c2865e95ee724546fae3b799bfd2917f5
                                                                • Instruction ID: 7fd37e1132cd6e8508460f3bae08dbfec4b27a26be85ac605419c4b34d6e445f
                                                                • Opcode Fuzzy Hash: ce8e7460cbc99de88b5e15f7bbde4c9c2865e95ee724546fae3b799bfd2917f5
                                                                • Instruction Fuzzy Hash: E181F4317006009BEB666F78E85926D7AF2EFC5320F64421AF966973D5CF398D02C7A1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Xq$Xq$Xq$Xq
                                                                • API String ID: 0-3965792415
                                                                • Opcode ID: ebab1ffe6a210c4e17240770a9d6d788971ce88464a5882d69162748e2549c70
                                                                • Instruction ID: a9fe4dd40038de2c2c5c98f9dbd7e960dda00eaa723409cbfe4d9b3b72233ba7
                                                                • Opcode Fuzzy Hash: ebab1ffe6a210c4e17240770a9d6d788971ce88464a5882d69162748e2549c70
                                                                • Instruction Fuzzy Hash: B8C19072D013299FCB9A9B7888843D977F2FF69324F6048A9D0859B154F7364E87CB42
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: HP$Hq$Hq
                                                                • API String ID: 0-3563213078
                                                                • Opcode ID: 07771bfb56f9b0dcd5543079aced9bc83fb92c6deb7771483f3078daff2f5e3d
                                                                • Instruction ID: 81ff4664c49ed2de2eeab379d866867c8c5791faff49e0740054fd684cd59663
                                                                • Opcode Fuzzy Hash: 07771bfb56f9b0dcd5543079aced9bc83fb92c6deb7771483f3078daff2f5e3d
                                                                • Instruction Fuzzy Hash: 7BC1CF367042118FDB269FA4D858B6E7BB7FF88300F14842AE5468B395DB35DC42CBA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ,q$,q$HP
                                                                • API String ID: 0-3201807503
                                                                • Opcode ID: c9063788f1c5c1418b4d400e36b3b454bb1a99a6f646165b916289a64ceef826
                                                                • Instruction ID: 45213b8c1a7a0672ede61d3157913aafefd1a125949839ac05a2bebd99c27d9d
                                                                • Opcode Fuzzy Hash: c9063788f1c5c1418b4d400e36b3b454bb1a99a6f646165b916289a64ceef826
                                                                • Instruction Fuzzy Hash: 7991A236B04115CFDB14DFA9C884A7AB7B2FF89215B18816AD406EB765DB31EC41CFA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $q$$q
                                                                • API String ID: 0-3126353813
                                                                • Opcode ID: 235a97f53a6a3734255db760a660f4582eb8e227dc2db77c830177b9b32d5244
                                                                • Instruction ID: cf96d2435c2ab784d6319fc71bb06b897d390a5faf3c986a7df40ad861187f84
                                                                • Opcode Fuzzy Hash: 235a97f53a6a3734255db760a660f4582eb8e227dc2db77c830177b9b32d5244
                                                                • Instruction Fuzzy Hash: AC622134A00218CFEB699BA4C864B9EBB72EF85300F1080ADD10B6B795DF359D45DFA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (&q$(q
                                                                • API String ID: 0-2464455664
                                                                • Opcode ID: af8dab6c782b4e8fc146922f6519dfc1551db40b082642bb0b7bc4f5345fe3a0
                                                                • Instruction ID: 40c9dcf91c4c5038f040f0ebcd07bc8268f788a355aa762be833e4ed7c02b106
                                                                • Opcode Fuzzy Hash: af8dab6c782b4e8fc146922f6519dfc1551db40b082642bb0b7bc4f5345fe3a0
                                                                • Instruction Fuzzy Hash: 48718232F042199BDB15DFA8D8507AEBBF6AFC9700F188529E406A7384DF309D45CBA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8q$TJq
                                                                • API String ID: 0-1436491226
                                                                • Opcode ID: 6f17850424b3e042a95bacc313fc840e3b5b6085d4e40bea61f23031ef8680e2
                                                                • Instruction ID: f80c02dc30dfaaa7d3291ef943fab411b57d508c605e2933c91fa16fdf00e6b9
                                                                • Opcode Fuzzy Hash: 6f17850424b3e042a95bacc313fc840e3b5b6085d4e40bea61f23031ef8680e2
                                                                • Instruction Fuzzy Hash: 2E310535B002088FDB55EFA8D491EDDBBB2EF88220F195094E501AF365DA75EC428BA1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8q$TJq
                                                                • API String ID: 0-1436491226
                                                                • Opcode ID: c0f15fc1599024cf23cc3ffa8be0be2263bc6015b033d67294d98592903182c6
                                                                • Instruction ID: 17dc602a2db358012dd5f70de91773d9dc0b5ff595822cfa94c663256f7689ba
                                                                • Opcode Fuzzy Hash: c0f15fc1599024cf23cc3ffa8be0be2263bc6015b033d67294d98592903182c6
                                                                • Instruction Fuzzy Hash: 8A311735B002088FDB55EFA8D491EDDBBF2EF88220F194094E501AF365DA75EC428BA1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LRq
                                                                • API String ID: 0-3187445251
                                                                • Opcode ID: 646bc001d612ba4539ad797a1d78a2d23737e9cef5b1521a9941041ef8c5a9ca
                                                                • Instruction ID: c221f4c8605c2a894a5db7c6376865260e2dbf878b7cb046422176cdd39cea84
                                                                • Opcode Fuzzy Hash: 646bc001d612ba4539ad797a1d78a2d23737e9cef5b1521a9941041ef8c5a9ca
                                                                • Instruction Fuzzy Hash: 5CA1C978E0031ACFCB15EFA8EA849DDBBB1FF48305B104529E405AB769DB306946CF91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LRq
                                                                • API String ID: 0-3187445251
                                                                • Opcode ID: 648bd9df65eeaf7598b385613ca411cc3d7f8e4a9c303f52cfa8bbe7b8f67b90
                                                                • Instruction ID: 5f5e241dc601ae19dadafca72b19da64db60c0efb90901763939ac223cfbcc47
                                                                • Opcode Fuzzy Hash: 648bd9df65eeaf7598b385613ca411cc3d7f8e4a9c303f52cfa8bbe7b8f67b90
                                                                • Instruction Fuzzy Hash: 4AA1B978E0031ACFCF15EFA8EA8499DBBB1FF48305B104525E415AB769DB306946CF91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Hq
                                                                • API String ID: 0-1594803414
                                                                • Opcode ID: 33238ba8d6b124145bc9c6584bd993f090bb3e8efd4b369a9f364ba47b6ab594
                                                                • Instruction ID: a88cedefca61dcf39ec44253ba5e4b469e45aeffdeb714dd67f7ed73d056787f
                                                                • Opcode Fuzzy Hash: 33238ba8d6b124145bc9c6584bd993f090bb3e8efd4b369a9f364ba47b6ab594
                                                                • Instruction Fuzzy Hash: 3C31A131B002089FDB04EFB9D856AAEBBFAEF89211F544479E549D7345DE349D02CBA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 4'q
                                                                • API String ID: 0-1807707664
                                                                • Opcode ID: 3a7acbcd0e69eb9dc2ff010c56a27fa195421a9818390680a8516462fc47ec81
                                                                • Instruction ID: 4ed454748c939681b8f8a80d5ffb618ef501c975701dc9956792aff44a16c186
                                                                • Opcode Fuzzy Hash: 3a7acbcd0e69eb9dc2ff010c56a27fa195421a9818390680a8516462fc47ec81
                                                                • Instruction Fuzzy Hash: 124114766041159FDB54DF69C988AAA7BB6FF48310F100069FA069B3A1CB71DD41CFA1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: HP
                                                                • API String ID: 0-295633388
                                                                • Opcode ID: 052d4f9fda11bfd6fe061aab0a06386bce2eac9535a3fd2923a200b0f29e29fa
                                                                • Instruction ID: ae2b9e41f9d76938e50ed04c35c98f9a2a92701486858adeb22cf73997928d3f
                                                                • Opcode Fuzzy Hash: 052d4f9fda11bfd6fe061aab0a06386bce2eac9535a3fd2923a200b0f29e29fa
                                                                • Instruction Fuzzy Hash: B8318F3160415EAFCF15AF64D954AAE3BA6FF89300F208029FA1687395CB35DD61DBA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: HP
                                                                • API String ID: 0-295633388
                                                                • Opcode ID: de4abd859f42e89640fa339b19d97c00f804937217ede82a7fd4e576028f9a08
                                                                • Instruction ID: 528df3ad53ad4b825cba50856ae4310b408f6c71f05a49624766d36ecc4635b3
                                                                • Opcode Fuzzy Hash: de4abd859f42e89640fa339b19d97c00f804937217ede82a7fd4e576028f9a08
                                                                • Instruction Fuzzy Hash: F52104327002004BFB25A73A9859A3E7A9BFFC5714B248079F407CB795EE25CC42DB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Hq
                                                                • API String ID: 0-1594803414
                                                                • Opcode ID: 0b2ab89094f61add2c21b1bfb94da0742bc78d34285b993b6135220b9e1d221b
                                                                • Instruction ID: d4f7c07f6228e8a7daca67c84517e0a6c40f17971de8104427da4909d1fad508
                                                                • Opcode Fuzzy Hash: 0b2ab89094f61add2c21b1bfb94da0742bc78d34285b993b6135220b9e1d221b
                                                                • Instruction Fuzzy Hash: 1921A0317002049FDB18AF68D995B6EBBB6EF84310F648069E54697355DB359D02C7A0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: HP
                                                                • API String ID: 0-295633388
                                                                • Opcode ID: 6c3540079953773db66c95c91fed4404ccaee28c85c05433c45528c9fa91cc75
                                                                • Instruction ID: f2a908b09cb64819a5f66e7133f9959c8605d2a14c31a96f41b854592ad341c2
                                                                • Opcode Fuzzy Hash: 6c3540079953773db66c95c91fed4404ccaee28c85c05433c45528c9fa91cc75
                                                                • Instruction Fuzzy Hash: 9C218E327042004BFB25A62A9855B3E7A9BBFC5714F248079F507CBB98EE65CC42DB90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: HP
                                                                • API String ID: 0-295633388
                                                                • Opcode ID: 13cdaaa188e5f62b9c801bd18c8b0b5c11342acbfdcd01d465240e303a7acb5c
                                                                • Instruction ID: ed056d976e57c04484580339c9c3406f15174775d2a229736446c33236fba3c7
                                                                • Opcode Fuzzy Hash: 13cdaaa188e5f62b9c801bd18c8b0b5c11342acbfdcd01d465240e303a7acb5c
                                                                • Instruction Fuzzy Hash: 1021E6316092995FCB12AF34D854AAB3FA6EF46314F2440AAF5458B352CA348D65CBF1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 4'q
                                                                • API String ID: 0-1807707664
                                                                • Opcode ID: 64beb41bfbea10a20e7b8d792b2be1327b3389dc84e2f66b4c53648c4a61fae5
                                                                • Instruction ID: 4d0c83ddd10060977854be821605707d097e763a25825124ed2ba7d95ee87671
                                                                • Opcode Fuzzy Hash: 64beb41bfbea10a20e7b8d792b2be1327b3389dc84e2f66b4c53648c4a61fae5
                                                                • Instruction Fuzzy Hash: 6C2151327081598FEB14DE6A998076B7BEAFB89210B048476F912CB744DB72DC41CFA0
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 61222422b31322b1108cab8d2e0d65bb95fcc13b6f27016628b4e372a9262f6e
                                                                • Instruction ID: 201b18200cc609a60425635fba5ea39ef89acd0e83bc56e186712648169a64b0
                                                                • Opcode Fuzzy Hash: 61222422b31322b1108cab8d2e0d65bb95fcc13b6f27016628b4e372a9262f6e
                                                                • Instruction Fuzzy Hash: 28F12E72A00215DFCB14DF69C9889ADBBF6FF88310B198099E516AB762D731EC41CF54
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a877711199e905763775d9e86bd7830afab5b172a7f7c9313b6d100b5f8256e7
                                                                • Instruction ID: 6cbeebda7dd441b7880bae8a40ab2d855396572e6e3c4395868a97b4530714e4
                                                                • Opcode Fuzzy Hash: a877711199e905763775d9e86bd7830afab5b172a7f7c9313b6d100b5f8256e7
                                                                • Instruction Fuzzy Hash: 6F511472B403059FD7158A6CD844AABBBF9EBCA320F14852EF599C7340D635D80187A0
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6e299cf061f64095a23a6785b8af73bc1bf105dcfc6fa0b62c71fee7010eee60
                                                                • Instruction ID: d9373ac1142c2fe33b211df1e15a720325df21a812d687f731cb85c3a536caee
                                                                • Opcode Fuzzy Hash: 6e299cf061f64095a23a6785b8af73bc1bf105dcfc6fa0b62c71fee7010eee60
                                                                • Instruction Fuzzy Hash: 485169327182558FEB14DF39C884A7ABBEABF4961030544BAF51ADB765EB31DC01CB90
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 60e98504d19816950ba435b4e98ef8f355e893ec181dfd5148ef3fc12ad8b5d7
                                                                • Instruction ID: cd0c488a5ca5f30a63f43a0363cbabdc92cacab076ddb7a8ada0b2f2bd1518d1
                                                                • Opcode Fuzzy Hash: 60e98504d19816950ba435b4e98ef8f355e893ec181dfd5148ef3fc12ad8b5d7
                                                                • Instruction Fuzzy Hash: 74412032E103199BDB14DFA5C891BDEBBB5BF88710F288129E412B7354EB70AD45CB90
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e8166b54be1d39cf4d0dce15b50866194a2d22452c06924fea5612fa4548e6a5
                                                                • Instruction ID: d49574ec29137c90d3e4652be8995910c3ac044da53054c07369f44d06037404
                                                                • Opcode Fuzzy Hash: e8166b54be1d39cf4d0dce15b50866194a2d22452c06924fea5612fa4548e6a5
                                                                • Instruction Fuzzy Hash: A741B274E012089FDB08DFAAD9849DDBBF2BF89310F249429E405BB368DB345841CF14
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 983aaa1706776e41b0fc6503495cdd04b5d5e9974583773984f3cfcb0193ad97
                                                                • Instruction ID: e1224a77a0998847357c3ec8d73f55aff5871528917c98e4487d297f4489e2be
                                                                • Opcode Fuzzy Hash: 983aaa1706776e41b0fc6503495cdd04b5d5e9974583773984f3cfcb0193ad97
                                                                • Instruction Fuzzy Hash: F631B93503328B9FD6003B25A9AE67EBFA0EB0F7337466D08F80A805149F784086CE34
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e5c8cb2ef9351a05960bc10407ab4ed6134f5aadd1ffc41cc0307a3c55edeace
                                                                • Instruction ID: 225ea5b386ff2ebfaf08cf3cb3076d36d8e9ab3a9bf7f1e15bcd3b37d7bb30a1
                                                                • Opcode Fuzzy Hash: e5c8cb2ef9351a05960bc10407ab4ed6134f5aadd1ffc41cc0307a3c55edeace
                                                                • Instruction Fuzzy Hash: D8316171A046058FCB14CF6CC888AAEBBF6FF85310B198159E516A77A5CB30ED41CFA4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 97f36edd291a3666f863d766b7d9b005446e9cd345ab95acce2053326e9934c9
                                                                • Instruction ID: 5d08ad2c5be8eaf9b5072535ed21b888def66f6b06c22dc44630f547069716e7
                                                                • Opcode Fuzzy Hash: 97f36edd291a3666f863d766b7d9b005446e9cd345ab95acce2053326e9934c9
                                                                • Instruction Fuzzy Hash: 0C21C731A002159FCF55DF3CC840AAE3BB6EB89350B50C159DA699B388DB35EE05CBC1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2631696642.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_dcd000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: dccbf706ec05b3b9eaa1597d42d2305145921d4c7b1beecc9b038bc92c34996c
                                                                • Instruction ID: 56a4d9ad143ac6ea3eece9ce94f39fe1f7f0bf4bfca511db829c46e19ce8440b
                                                                • Opcode Fuzzy Hash: dccbf706ec05b3b9eaa1597d42d2305145921d4c7b1beecc9b038bc92c34996c
                                                                • Instruction Fuzzy Hash: 5421CF71504204EFDB14DF18D980F26BBA6EB84314F24C56DE84A4B292C336D847DA72
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d2321353ac733109d29a89b7fbc5e7e499376b00ca912a6299253a3a4486453f
                                                                • Instruction ID: b64bfa3c7b2b5c4145d5e4adcc37ab3e21c1421745c12668cd9d3f00562fd3b4
                                                                • Opcode Fuzzy Hash: d2321353ac733109d29a89b7fbc5e7e499376b00ca912a6299253a3a4486453f
                                                                • Instruction Fuzzy Hash: 9E218E30E00319DFE705EFB9C4117AEB7B2EF85304F0084A9A4549B748DB789A41CF61
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2631696642.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_dcd000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c67e43b3caae8d1721b95cdd19a0df62698cdf43a98a90013881a05647eb41e9
                                                                • Instruction ID: 8f34dd59a42d648e77c18fc83740043ac7eadf2e9e2560a38de1b7b437245160
                                                                • Opcode Fuzzy Hash: c67e43b3caae8d1721b95cdd19a0df62698cdf43a98a90013881a05647eb41e9
                                                                • Instruction Fuzzy Hash: 50215E7550D3C09FD713CB24C990B11BF71AB46214F29C5EBD8898F6A3C33A980ACB62
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9264fd1f9cc6f658c227b08c9e81f307ad4cbb5529f5eb28ca7aa47897561740
                                                                • Instruction ID: 247f2c1bd0cf45a32b69861bd16f979766d4bbdfab375ab707011f1a8ed7a538
                                                                • Opcode Fuzzy Hash: 9264fd1f9cc6f658c227b08c9e81f307ad4cbb5529f5eb28ca7aa47897561740
                                                                • Instruction Fuzzy Hash: 8A1103327083945FDB466F7898142AE7FB7EFCA200B14446AE506CB392CE348C0687E2
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e09423358ca2adb5aee2df5e680508d846bcfef08356d476bc8fc5d2de7573a8
                                                                • Instruction ID: eb2b34ee23489be5ed2196f1d666caf02361a9f4c97ce624dd82c83786ae8380
                                                                • Opcode Fuzzy Hash: e09423358ca2adb5aee2df5e680508d846bcfef08356d476bc8fc5d2de7573a8
                                                                • Instruction Fuzzy Hash: 92219D729002089FCB24CF54C948FAABBF6FB44310F00816EE55A9B661E771DD54CF90
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ffd1dcb15deeba0f0859fbb4b3912933f75880e7448b347dbd2e0ce7249ee1c5
                                                                • Instruction ID: 1c8ed08745d149ce5c7efc64ee3a68d93be29297588364370475c02a984ee1bb
                                                                • Opcode Fuzzy Hash: ffd1dcb15deeba0f0859fbb4b3912933f75880e7448b347dbd2e0ce7249ee1c5
                                                                • Instruction Fuzzy Hash: F721FF70C0520A8FCB05EFB8C9445EEBFF0EF4A314F0041AAD845BB265EB355A85CBA5
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 662371b659ee9f8532df8f027eecba5b63a16a46336322209f614d1b81ad9372
                                                                • Instruction ID: 97aac71f2092892dce7cd86cdc857049354b94106cdbdd528b6a4621c630bc56
                                                                • Opcode Fuzzy Hash: 662371b659ee9f8532df8f027eecba5b63a16a46336322209f614d1b81ad9372
                                                                • Instruction Fuzzy Hash: 03114F76700204CFD764DB6DD994A5AB7F6FF88721B1180A9E14A8B769CBB1EC01CB60
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: de6b0d8425f4a401517caf8ae8546498edb9db867d285b8d71ce643bc9695ea5
                                                                • Instruction ID: 510d223ee9a90ed68bd2c65e7f9495c55625439d7d9993e27e6572c8003ba966
                                                                • Opcode Fuzzy Hash: de6b0d8425f4a401517caf8ae8546498edb9db867d285b8d71ce643bc9695ea5
                                                                • Instruction Fuzzy Hash: FA11A335E802158BEB54EFB8D5546EEBFF5AF89214B040539D448A3204DB39DC01CBE1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 134fad6eb34f7901c6133d0d3177dcfc895d7c300f6d76c5613ec2c438ce1f0b
                                                                • Instruction ID: 2ce2f62921aacad9379ee7d8cc790ca45809ecb14bbdaf446bbda1ce174aeada
                                                                • Opcode Fuzzy Hash: 134fad6eb34f7901c6133d0d3177dcfc895d7c300f6d76c5613ec2c438ce1f0b
                                                                • Instruction Fuzzy Hash: 6B116476800249DFDB20CF9AC844BEEBBF4FF48320F148419EA18A7251C339A950CFA5
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c2ed4ec0350e84b080b2fcb37f1bde22803f2c1ad2d03c541b5c54601d553121
                                                                • Instruction ID: f90320248183775367bc1819b6d90d1739a7f7055fc9fe1dd5391750bde8d2f8
                                                                • Opcode Fuzzy Hash: c2ed4ec0350e84b080b2fcb37f1bde22803f2c1ad2d03c541b5c54601d553121
                                                                • Instruction Fuzzy Hash: 93115676800249DFDB10DF99D945BDEBBF4FF48320F148419E618A7251C339AA50DFA5
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2247cd002c9710e5bc45e1074d7bd241b2b990d7a7111b0c4c025d6af2e71b50
                                                                • Instruction ID: 0af4a358e0c1089f2db7cc0c2603be7bbca28789ba94215c53adcd6a056b2401
                                                                • Opcode Fuzzy Hash: 2247cd002c9710e5bc45e1074d7bd241b2b990d7a7111b0c4c025d6af2e71b50
                                                                • Instruction Fuzzy Hash: 99019E72F043040FDB24ABB9985466F7BEAAB84750715447ADD45C72A9FE69CC008791
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1aa944c038d890c6a5d465e0920b6b308b6774a30e5cf002659561de87d4f453
                                                                • Instruction ID: 3f56771f65ee4ab57b0165ed0fd3c44af091cadd2d6a9bd7acb9c97a7143376a
                                                                • Opcode Fuzzy Hash: 1aa944c038d890c6a5d465e0920b6b308b6774a30e5cf002659561de87d4f453
                                                                • Instruction Fuzzy Hash: 5F112A75E002498FDB04DFB8D954BAEBBB6EF58311F059065E809AB349EA309D42CF60
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1ace4ef65f8ed7e2b51530b28821dcfb5ebc89ef343836d574e3943d2f3f58a5
                                                                • Instruction ID: 68a78d0ecb386f99fda2e1c492530de3ddd852c7e0a1d9449000f8775772a57e
                                                                • Opcode Fuzzy Hash: 1ace4ef65f8ed7e2b51530b28821dcfb5ebc89ef343836d574e3943d2f3f58a5
                                                                • Instruction Fuzzy Hash: D8014B32F003144B9B24ABBE885466F7AEBAF887603144479DD49DB369FE75CC0187A1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a731b3ea2f22d3f1adca330e93276ab950f1fed2ab3031e2897f5dd7a341b684
                                                                • Instruction ID: 40585935e1d5c5be9d6aa01d1f59fc189c30e1a06230d37bc19e4ebd09d0b3ba
                                                                • Opcode Fuzzy Hash: a731b3ea2f22d3f1adca330e93276ab950f1fed2ab3031e2897f5dd7a341b684
                                                                • Instruction Fuzzy Hash: AE01DB337042049BC7156A78E85A66D7FEBEBC9321F18046EFA46C7345DE29D902C7A0
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 726477672303c6653b28b04e82228f8db7e9d887fce3292761a6417b13fc1be7
                                                                • Instruction ID: 0a0c92319153bfec69860f2b17ac4a47d493800fa46b327225756f736b880cb6
                                                                • Opcode Fuzzy Hash: 726477672303c6653b28b04e82228f8db7e9d887fce3292761a6417b13fc1be7
                                                                • Instruction Fuzzy Hash: 1401A2366081597BCB119E95DC00ADF3FAAEB89790F148066FA06C7241DA358D16DBE1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f7155e79410b6e60ce3a11200c9af700e31a0af4fc6a39aa6768911b55524c1e
                                                                • Instruction ID: 47b7c6dc3ee1f27af3c9c68bccb2f8ecb3c426c055406b315ccb3f3c0c90e502
                                                                • Opcode Fuzzy Hash: f7155e79410b6e60ce3a11200c9af700e31a0af4fc6a39aa6768911b55524c1e
                                                                • Instruction Fuzzy Hash: FD018C75A012099BCB10DF69E8496AE7FB5FF88220B40402AFD5A93240DF388D11CBA1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2612dc61d574a04e381990ff9c1e3c2a3746683af25b0518eda784eafa6dc937
                                                                • Instruction ID: 8fd0fa64bc3b5de98299ca712e01d0babbcc8563b386ef3adb265c890bc87c8d
                                                                • Opcode Fuzzy Hash: 2612dc61d574a04e381990ff9c1e3c2a3746683af25b0518eda784eafa6dc937
                                                                • Instruction Fuzzy Hash: EA01AD36B041296B8B159E99D800AAF3BABEBC9750F14802AF606D7380DE71DD11DBE4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2709f5654fc1b45dce504977549087e9565b39b6ec3740449c9b2531db4983d2
                                                                • Instruction ID: c6901bfb089bc2f98ce212d05a406bb0d39b2cd64dddeb70cf50036b649b6f8a
                                                                • Opcode Fuzzy Hash: 2709f5654fc1b45dce504977549087e9565b39b6ec3740449c9b2531db4983d2
                                                                • Instruction Fuzzy Hash: 22017C71A0524AAFCB15DF68D8549AE7FB5FF88320B50412AFD59D3240DB348911CBA1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f9b9690619a6dab4641d998e14bf4239962746a392d884b48f11a59c86c4568c
                                                                • Instruction ID: 91ec19ad215546ff2fb1154cc7cc6e67484595b614c0b38fcee74998556d310c
                                                                • Opcode Fuzzy Hash: f9b9690619a6dab4641d998e14bf4239962746a392d884b48f11a59c86c4568c
                                                                • Instruction Fuzzy Hash: DDF0E232B801128BDB15567DEA14AAEBBA6EFC9231B1400BAF109E7754CF79C9028750
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d7b3e9158205f6fb9ebe8e40219ab0bb19d9efa526b5e210352e305d0a3d8a95
                                                                • Instruction ID: 34fef6090bfcda982e6ed07f45de0ab821a16ac413643f9bf83b059eca0ce4bb
                                                                • Opcode Fuzzy Hash: d7b3e9158205f6fb9ebe8e40219ab0bb19d9efa526b5e210352e305d0a3d8a95
                                                                • Instruction Fuzzy Hash: 6EF09676900209AFCB60DF6DD8419DFBBF9FB58250B54412AE545D3301D774951187E1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b610ada04a377bcf30bc4a0c168e4372d21e391b7c6a7da4788db85d01c7a016
                                                                • Instruction ID: e49638be104fdbbc03a008f6c0a8cabad2599f666433886188a9767493dc9cc4
                                                                • Opcode Fuzzy Hash: b610ada04a377bcf30bc4a0c168e4372d21e391b7c6a7da4788db85d01c7a016
                                                                • Instruction Fuzzy Hash: BCF03A35301205DFC700CF59D484D6ABBEAFF887257504069EA098B331CB719C11CB90
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ce1002f2c8204b0ef3bd490eb3b14f6509b8751999246442eb785ed84fd9b2dd
                                                                • Instruction ID: 1ae962124a48fb1bc006f10acdeadea94bd7b009553fbeb4639166b4f4b05c10
                                                                • Opcode Fuzzy Hash: ce1002f2c8204b0ef3bd490eb3b14f6509b8751999246442eb785ed84fd9b2dd
                                                                • Instruction Fuzzy Hash: C7E0A531065B43CFE7106F64BDACB2A7BB4EB0B313B842C40E04AC1279CB7470848B25
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 95a93e8e5b777bfecd046bff03677201b59da80d58fdbd79b02ecf59e6c995a2
                                                                • Instruction ID: 0fcc4b80535f99d60b94e520fc68ca6358506d9846658010d8dda03298420bc4
                                                                • Opcode Fuzzy Hash: 95a93e8e5b777bfecd046bff03677201b59da80d58fdbd79b02ecf59e6c995a2
                                                                • Instruction Fuzzy Hash: A8E00235061B47CFEB102F64B9ACA3ABAB5EB0B317B806D00E15ED12398F7574848A65
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ac34d52140e08c681ce788f403c04350255009c92006890b35d278d17cd14064
                                                                • Instruction ID: eff1dd0f0e4a1d0e1961d50101175d73d82373dd7d944809ad67eb454b332a91
                                                                • Opcode Fuzzy Hash: ac34d52140e08c681ce788f403c04350255009c92006890b35d278d17cd14064
                                                                • Instruction Fuzzy Hash: 2FE0DF35D103278BC701EBB0DC010EDBBB4AE81320B558262D0243A190EB349A9A8AA2
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 522903c0f3e86126b7b280ec7a1e77c5b1795ce5d1580f43bcdce758cde14496
                                                                • Instruction ID: 7fcbd00b95a0a7eb086e0d4bd2d321fd297e8bbdab3d2e7f1e4b82a60a066c46
                                                                • Opcode Fuzzy Hash: 522903c0f3e86126b7b280ec7a1e77c5b1795ce5d1580f43bcdce758cde14496
                                                                • Instruction Fuzzy Hash: B8E072340093A81FC723A339AC84AC73F6DCE8214070246A6F0C60E15BE970188BC7F1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0f3c1e322e8b55bb184ef993e1393b618198d120126c9a9bbed5a67e58cc1824
                                                                • Instruction ID: 01bee33d49dbe891f419d92e91c8902dac4829102c03bb42200e91b9da9e6017
                                                                • Opcode Fuzzy Hash: 0f3c1e322e8b55bb184ef993e1393b618198d120126c9a9bbed5a67e58cc1824
                                                                • Instruction Fuzzy Hash: 46D05B31D2033A57CB10E7A5DC044DFFB38EED5321B514666D51437144FB706659C6E1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 42bdd7cd06331bbfb023016ceee77e82d84d4ba81e72b1e305640296e507e8cf
                                                                • Instruction ID: b8c2c5f047f6e0098e4ecbf56234826adf2be60e247d070219c58ed3730462d1
                                                                • Opcode Fuzzy Hash: 42bdd7cd06331bbfb023016ceee77e82d84d4ba81e72b1e305640296e507e8cf
                                                                • Instruction Fuzzy Hash: 7AD0C737311124774B151A49A8058AE7F5EE7CD7717048026FD1583340CE758D1297E5
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1f6477a9267f1f8f9d47bda01a46c646fdb36bf855e7a88ea6e6d021398494de
                                                                • Instruction ID: e5cc9c4742893a3a06e035e3b3ffc3543a6507d47c0b587d85260e9481308ab2
                                                                • Opcode Fuzzy Hash: 1f6477a9267f1f8f9d47bda01a46c646fdb36bf855e7a88ea6e6d021398494de
                                                                • Instruction Fuzzy Hash: 98D0677BB40008AFCB149F98EC509DDF7BAFB98221B548116EA15A3264C6319925DB90
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 86ee5a10946c1c365015c8a6312faf7c24afb04cd638f15af35cbb170ee51655
                                                                • Instruction ID: d077b0c3048fa009601eaa909546f540d904af4cff56891299da3f7d3b459b22
                                                                • Opcode Fuzzy Hash: 86ee5a10946c1c365015c8a6312faf7c24afb04cd638f15af35cbb170ee51655
                                                                • Instruction Fuzzy Hash: 5CC0123440032D4BD555F779E985699336EDAC0209B408531B1050E65EBEB45D4A56B1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 52d48424a5a2c9fecbdb7cad5e07da21116622ba6b05654fa719eaf5ea2b5095
                                                                • Instruction ID: ceb0f518b4399f64997a0986f5054e657cb3cd5e443456452f046e3e85318d96
                                                                • Opcode Fuzzy Hash: 52d48424a5a2c9fecbdb7cad5e07da21116622ba6b05654fa719eaf5ea2b5095
                                                                • Instruction Fuzzy Hash: 8AB092B6D003844AEF360220D51B7753B10AB52204F0A04998D82C118AE95980008610
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ab43259d2030f07cea133bf7180f342d42cf418e9f246df5fb41f0a8fa8e08bc
                                                                • Instruction ID: a68f4f4b905f2b06329c3de041e79bda56c8e8357da9aedf9db29debb5118261
                                                                • Opcode Fuzzy Hash: ab43259d2030f07cea133bf7180f342d42cf418e9f246df5fb41f0a8fa8e08bc
                                                                • Instruction Fuzzy Hash: A202B575E00218CFDB24DFA9C984B9DBBB6BF49300F1580A9E809AB355DB35AD81CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8061f00d7961db184ce58224ea7e6de1d680b60b2722ece242ee9894ce4cd5a2
                                                                • Instruction ID: 9b0b0602779ba93cd5f3053d0d7c4dccea82dda6980c22cb3316930d5a31495a
                                                                • Opcode Fuzzy Hash: 8061f00d7961db184ce58224ea7e6de1d680b60b2722ece242ee9894ce4cd5a2
                                                                • Instruction Fuzzy Hash: E8E1C274E01218CFEB24DFA9C944B9DBBB2BF49304F2081A9E409AB394DB355E85CF54
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3db6d6990af5c5b82d0811bb8bbfdb2242c475357f9ceb2b09cd51ceab921a44
                                                                • Instruction ID: 7256cd1482cc109f8f35acd781f98ead12dce77695d3d029d3eb77e4f5aaa683
                                                                • Opcode Fuzzy Hash: 3db6d6990af5c5b82d0811bb8bbfdb2242c475357f9ceb2b09cd51ceab921a44
                                                                • Instruction Fuzzy Hash: 77C19F75E00218CFDB14DFA9C994B9DBBB2BF89305F2080A9E809AB355DB355E85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1993ca79c3d6c5e5d86a477a2863025b83b225b7b251818f9d67d72d4ab4e123
                                                                • Instruction ID: c33fc3d1b6e1b4ec198be5ed3526440470e46be633093b8050f5522ec5a11b85
                                                                • Opcode Fuzzy Hash: 1993ca79c3d6c5e5d86a477a2863025b83b225b7b251818f9d67d72d4ab4e123
                                                                • Instruction Fuzzy Hash: ABC19075E00218CFDB14DFA9C994B9DBBB2BF89305F2080A9E809AB355DB355E85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7c5ddfa21736667e2b20a688104c6b7f85d8f2ff588d7973bb33f7caebd3a2fe
                                                                • Instruction ID: 20b7e5a31ceefc3e43342fa4b4ec2fbc58ea55568fc6c6f0b3cd94654be70343
                                                                • Opcode Fuzzy Hash: 7c5ddfa21736667e2b20a688104c6b7f85d8f2ff588d7973bb33f7caebd3a2fe
                                                                • Instruction Fuzzy Hash: 69C19E75E00218CFDB54DFA9C994B9DBBB2BF89304F2080A9D809AB355DB349E85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bf94a056743387eb1de2a3e51abc58ab450a4016eff13d20de3440b38d511097
                                                                • Instruction ID: 64809ac4958ec293b3d58d9bfcbd8b1ee85b1a64639a41dbf3a0d1f0fb5197ca
                                                                • Opcode Fuzzy Hash: bf94a056743387eb1de2a3e51abc58ab450a4016eff13d20de3440b38d511097
                                                                • Instruction Fuzzy Hash: DDC19F75E00218CFDB14DFA9C994B9DBBB2BF89304F2080A9E809AB355DB355E85CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2836c3ea1125c13565fe3db17379f73063f6631536bf006856985d6b1dcf891a
                                                                • Instruction ID: cfcd578f1e99da5ed3e134db101509281404443198e3b0e3d9310de8416a6f41
                                                                • Opcode Fuzzy Hash: 2836c3ea1125c13565fe3db17379f73063f6631536bf006856985d6b1dcf891a
                                                                • Instruction Fuzzy Hash: 88C19E75E00218CFDB54DFA9C994B9DBBB2BF89304F2080A9D809AB355DB349E85CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 23973eac322c07020cd55fa27a1082e82e32d35cb7b60b5d26072bf760da9a42
                                                                • Instruction ID: 7227fda45c5d9d9f3e452463cf5a9476049060078f4d26e124fe86c54620cbcf
                                                                • Opcode Fuzzy Hash: 23973eac322c07020cd55fa27a1082e82e32d35cb7b60b5d26072bf760da9a42
                                                                • Instruction Fuzzy Hash: 30C1AF75E00218CFDB54DFA9C994B9DBBB2BF89304F2080A9D809AB355DB349E85CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: df90b1efada0df83aa3d792509c0b69973f564c4c85211f50622cea14d44c3c2
                                                                • Instruction ID: ecf1491433e03b736bc8d7735ab1e6218f2c24a4008ddcc3877375e87a56a085
                                                                • Opcode Fuzzy Hash: df90b1efada0df83aa3d792509c0b69973f564c4c85211f50622cea14d44c3c2
                                                                • Instruction Fuzzy Hash: 34C18D75E00218CFDB54DFA9C994B9DBBB2EF89304F2080A9D809AB355DB349E85CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1fab63bed6e2e18d93a05a7ceefa27baa9529a80ac73ea2350dcc1642aba5588
                                                                • Instruction ID: 92f2ee1edd949a868338b50a1078bcd850a301ba7435554ed39cb56620cda40a
                                                                • Opcode Fuzzy Hash: 1fab63bed6e2e18d93a05a7ceefa27baa9529a80ac73ea2350dcc1642aba5588
                                                                • Instruction Fuzzy Hash: 0CC1AD75E00218CFDB14DFA9C994B9DBBB2EF89304F2080A9D809AB355DB349E85CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0cf078d7954c9c22897b61b2b51d339a162c6638f0a7b5db33c1234a8999d86e
                                                                • Instruction ID: a98d2e375aadbfc6e92b20eda3b56bda8f37b4d2e5558801b3dcb7d6999053c9
                                                                • Opcode Fuzzy Hash: 0cf078d7954c9c22897b61b2b51d339a162c6638f0a7b5db33c1234a8999d86e
                                                                • Instruction Fuzzy Hash: 90C18E75E00218CFDB14DFA9C994B9DBBB2BF89304F2080A9D809AB355DB355E85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3a4b24c1439414f3b0706ca09af3fec428fce7f333c47a8662856969cec51fb9
                                                                • Instruction ID: 87210525d62d01119e9c4eba1a9f065e72550e8d23d14c333c554dbb238dd5fc
                                                                • Opcode Fuzzy Hash: 3a4b24c1439414f3b0706ca09af3fec428fce7f333c47a8662856969cec51fb9
                                                                • Instruction Fuzzy Hash: 85C19E75E00218CFDB54DFA9C994B9DBBB2BF89304F2080A9D809AB355DB349E85CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d4aae2d2bdced3f03306d92f8e0ee3cddd91797b247401bb63ada0edb73aa104
                                                                • Instruction ID: fd649edac0a391b1d408244061919d2be189abb3d08fb7434fe36845bc674866
                                                                • Opcode Fuzzy Hash: d4aae2d2bdced3f03306d92f8e0ee3cddd91797b247401bb63ada0edb73aa104
                                                                • Instruction Fuzzy Hash: 06C18E75E00218CFDB14DFA9C994B9DBBB2EF89304F2080A9D809AB355DB355E85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8e4b19aaf9a817b495870099bfd2a197b0c2377bf562c50cc173d8fb51c26ecf
                                                                • Instruction ID: 881489d83fc0e012cef0681146e0d6aae44e086e8d8589a54ff4f29d6c33a8f2
                                                                • Opcode Fuzzy Hash: 8e4b19aaf9a817b495870099bfd2a197b0c2377bf562c50cc173d8fb51c26ecf
                                                                • Instruction Fuzzy Hash: B8C1AE75E01218CFDB54DFA9C994B9DBBB2BF89304F2080A9D809AB354DB359E85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4b54ad0d5130091d0e648d0a701ed21cf32b36fe1d01a039bfc8694c773803d4
                                                                • Instruction ID: cb972d0b3d36f761ad9755bf97e9b8455b4be33f003b1637d480c2f8b54a00f8
                                                                • Opcode Fuzzy Hash: 4b54ad0d5130091d0e648d0a701ed21cf32b36fe1d01a039bfc8694c773803d4
                                                                • Instruction Fuzzy Hash: 7CC19E75E00218CFDB14DFA9C994B9DBBB2EF89304F2080A9D809AB355DB355E85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5bf6569ce2769348ffbf2f7bb9d8875fd0d5bb1f56d63dd7799e2d0f8abb1ab4
                                                                • Instruction ID: 1f02fe4798b0e81843c8328ed9008878011a15f47d2f5cd0e7dc46a20d9ffa42
                                                                • Opcode Fuzzy Hash: 5bf6569ce2769348ffbf2f7bb9d8875fd0d5bb1f56d63dd7799e2d0f8abb1ab4
                                                                • Instruction Fuzzy Hash: F9C19F75E00218CFDB14DFA9C994B9DBBB2BF89304F2080A9D809AB355DB359E85CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 872cdd88e37aab5404cd9fa36b07386194d9d36acf7e813599223ed7b8d19665
                                                                • Instruction ID: 0daf99ce6fd3fe89380fb608dd36d50eda2c91072e11a435dfb06a157b3c8b74
                                                                • Opcode Fuzzy Hash: 872cdd88e37aab5404cd9fa36b07386194d9d36acf7e813599223ed7b8d19665
                                                                • Instruction Fuzzy Hash: D5C19E75E00218CFDB14DFA9D994B9DBBB2BF89304F2080A9E809AB355DB355E85CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 954d9ac33bf1f514bbb3db661a0fe342518f6fec26caa70b94f5a059f2ef33f1
                                                                • Instruction ID: b86b0eef533685f0496cab0e0a1fff48ac0015e3b1331720bce9f81ca1cbf08e
                                                                • Opcode Fuzzy Hash: 954d9ac33bf1f514bbb3db661a0fe342518f6fec26caa70b94f5a059f2ef33f1
                                                                • Instruction Fuzzy Hash: 37C19175E00218CFDB14DFA9C994B9DBBB2BF89304F2081A9E809AB355DB355E85CF50
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2637183812.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_56a0000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (oq$(oq$(oq$(oq
                                                                • API String ID: 0-3853041632
                                                                • Opcode ID: fbb4fc41abf749f8c3d074ba151dc0a69bedb73dfd95619a40a7b2e76e0ea63c
                                                                • Instruction ID: 90366c0e29997e4d2bb0923ee2d2f6c9e3dc709f35e936f0c3d070328baf987e
                                                                • Opcode Fuzzy Hash: fbb4fc41abf749f8c3d074ba151dc0a69bedb73dfd95619a40a7b2e76e0ea63c
                                                                • Instruction Fuzzy Hash: 88C14735A002099FDB24CF69C984AAEBBF2BF48314F148559F91AAB761D731ED41CF90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2632659726.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_1010000_tx4pkcHL9o.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Xq$Xq$Xq$Xq
                                                                • API String ID: 0-3965792415
                                                                • Opcode ID: 3cde3fed6bd1faa0f29ab569e2b62daf46bce429891297e31104a1f7e2f6edaa
                                                                • Instruction ID: 310a34b6786614f9f4d9acefd91f5bc61f18f2d8ab63c1e11e56cefb72a2e9c4
                                                                • Opcode Fuzzy Hash: 3cde3fed6bd1faa0f29ab569e2b62daf46bce429891297e31104a1f7e2f6edaa
                                                                • Instruction Fuzzy Hash: 3C319C31E0031E8FEFB9CB7884953AE7BF6BF84210F1444A5C589A7245DB348985CBD2

                                                                Execution Graph

                                                                Execution Coverage:12.4%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:390
                                                                Total number of Limit Nodes:21
                                                                execution_graph 45902 120d740 DuplicateHandle 45903 120d7d6 45902->45903 46011 2e14090 46012 2e140d2 46011->46012 46014 2e140d9 46011->46014 46013 2e1412a CallWindowProcW 46012->46013 46012->46014 46013->46014 45645 1204668 45646 120467a 45645->45646 45647 1204686 45646->45647 45651 1204778 45646->45651 45656 1204218 45647->45656 45649 12046a5 45652 120479d 45651->45652 45660 1204878 45652->45660 45664 1204888 45652->45664 45657 1204223 45656->45657 45672 1205c7c 45657->45672 45659 1206ffb 45659->45649 45662 1204888 45660->45662 45661 120498c 45662->45661 45668 12044e0 45662->45668 45665 12048af 45664->45665 45666 120498c 45665->45666 45667 12044e0 CreateActCtxA 45665->45667 45667->45666 45669 1205918 CreateActCtxA 45668->45669 45671 12059db 45669->45671 45673 1205c87 45672->45673 45676 1205c9c 45673->45676 45675 12071b5 45675->45659 45677 1205ca7 45676->45677 45680 1205ccc 45677->45680 45679 120729a 45679->45675 45681 1205cd7 45680->45681 45682 1205cfc 3 API calls 45681->45682 45683 120738d 45682->45683 45683->45679 45684 120d4f8 45685 120d53e GetCurrentProcess 45684->45685 45687 120d590 GetCurrentThread 45685->45687 45688 120d589 45685->45688 45689 120d5c6 45687->45689 45690 120d5cd GetCurrentProcess 45687->45690 45688->45687 45689->45690 45693 120d603 45690->45693 45691 120d62b GetCurrentThreadId 45692 120d65c 45691->45692 45693->45691 45694 7088850 45695 70889db 45694->45695 45697 7088876 45694->45697 45697->45695 45698 708552c 45697->45698 45699 7088ad0 PostMessageW 45698->45699 45700 7088b3c 45699->45700 45700->45697 45514 5492d40 45517 54929d4 45514->45517 45516 5492d5f 45518 54929df 45517->45518 45522 12083c8 45518->45522 45528 1205cfc 45518->45528 45519 5492de4 45519->45516 45523 12083d8 45522->45523 45525 120868b 45523->45525 45534 120ad38 45523->45534 45524 12086c9 45524->45519 45525->45524 45538 120ce20 45525->45538 45529 1205d07 45528->45529 45531 120868b 45529->45531 45532 120ad38 GetModuleHandleW 45529->45532 45530 12086c9 45530->45519 45531->45530 45533 120ce20 3 API calls 45531->45533 45532->45531 45533->45530 45543 120ad60 45534->45543 45547 120ad70 45534->45547 45535 120ad4e 45535->45525 45539 120ce51 45538->45539 45540 120ce75 45539->45540 45556 120cfe0 45539->45556 45560 120cfd0 45539->45560 45540->45524 45544 120ad70 45543->45544 45550 120ae59 45544->45550 45545 120ad7f 45545->45535 45549 120ae59 GetModuleHandleW 45547->45549 45548 120ad7f 45548->45535 45549->45548 45551 120ae62 45550->45551 45552 120ae01 45550->45552 45553 120ae9c 45551->45553 45554 120b0a0 GetModuleHandleW 45551->45554 45552->45545 45553->45545 45555 120b0cd 45554->45555 45555->45545 45557 120cfed 45556->45557 45559 120d027 45557->45559 45564 120b840 45557->45564 45559->45540 45561 120cfe0 45560->45561 45562 120d027 45561->45562 45563 120b840 3 API calls 45561->45563 45562->45540 45563->45562 45565 120b84b 45564->45565 45567 120dd38 45565->45567 45568 120d144 45565->45568 45569 120d14f 45568->45569 45570 1205cfc 3 API calls 45569->45570 45571 120dda7 45570->45571 45575 120fb28 45571->45575 45581 120fb10 45571->45581 45572 120dde1 45572->45567 45577 120fb59 45575->45577 45578 120fc59 45575->45578 45576 120fb65 45576->45572 45577->45576 45587 2e10a00 45577->45587 45591 2e10a08 45577->45591 45578->45572 45583 120fb59 45581->45583 45584 120fc59 45581->45584 45582 120fb65 45582->45572 45583->45582 45585 2e10a00 2 API calls 45583->45585 45586 2e10a08 2 API calls 45583->45586 45584->45572 45585->45584 45586->45584 45588 2e10a33 45587->45588 45589 2e10ae2 45588->45589 45595 2e118d0 45588->45595 45592 2e10a33 45591->45592 45593 2e10ae2 45592->45593 45594 2e118d0 2 API calls 45592->45594 45594->45593 45599 2e11930 45595->45599 45603 2e11924 45595->45603 45600 2e11998 CreateWindowExW 45599->45600 45602 2e11a54 45600->45602 45604 2e11930 CreateWindowExW 45603->45604 45606 2e11a54 45604->45606 45606->45606 45701 70860d1 45702 7086031 45701->45702 45703 7085df9 45702->45703 45706 7087548 45702->45706 45713 7087558 45702->45713 45707 708753a 45706->45707 45708 7087552 45706->45708 45707->45702 45719 70875fe 45708->45719 45739 7087598 45708->45739 45758 7087588 45708->45758 45709 708757f 45709->45702 45714 708756d 45713->45714 45716 7087588 12 API calls 45714->45716 45717 7087598 12 API calls 45714->45717 45718 70875fe 12 API calls 45714->45718 45715 708757f 45715->45702 45716->45715 45717->45715 45718->45715 45720 708758c 45719->45720 45721 7087601 45719->45721 45725 70875ba 45720->45725 45777 70879c6 45720->45777 45782 70881c6 45720->45782 45787 7087da2 45720->45787 45792 7087dcb 45720->45792 45800 7087b29 45720->45800 45805 7087d08 45720->45805 45809 7087a76 45720->45809 45814 7087b76 45720->45814 45819 7087b55 45720->45819 45824 7087b15 45720->45824 45829 7087cb4 45720->45829 45834 7087bb1 45720->45834 45839 7087a9d 45720->45839 45844 7087c1b 45720->45844 45849 708795a 45720->45849 45854 7087cc7 45720->45854 45721->45709 45725->45709 45740 70875b2 45739->45740 45741 7087d08 2 API calls 45740->45741 45742 7087b29 2 API calls 45740->45742 45743 7087dcb 4 API calls 45740->45743 45744 70875ba 45740->45744 45745 7087da2 2 API calls 45740->45745 45746 70881c6 2 API calls 45740->45746 45747 70879c6 2 API calls 45740->45747 45748 7087cc7 2 API calls 45740->45748 45749 708795a 2 API calls 45740->45749 45750 7087c1b 2 API calls 45740->45750 45751 7087a9d 2 API calls 45740->45751 45752 7087bb1 2 API calls 45740->45752 45753 7087cb4 2 API calls 45740->45753 45754 7087b15 2 API calls 45740->45754 45755 7087b55 2 API calls 45740->45755 45756 7087b76 2 API calls 45740->45756 45757 7087a76 2 API calls 45740->45757 45741->45744 45742->45744 45743->45744 45744->45709 45745->45744 45746->45744 45747->45744 45748->45744 45749->45744 45750->45744 45751->45744 45752->45744 45753->45744 45754->45744 45755->45744 45756->45744 45757->45744 45759 708758c 45758->45759 45760 70875ba 45759->45760 45761 7087d08 2 API calls 45759->45761 45762 7087b29 2 API calls 45759->45762 45763 7087dcb 4 API calls 45759->45763 45764 7087da2 2 API calls 45759->45764 45765 70881c6 2 API calls 45759->45765 45766 70879c6 2 API calls 45759->45766 45767 7087cc7 2 API calls 45759->45767 45768 708795a 2 API calls 45759->45768 45769 7087c1b 2 API calls 45759->45769 45770 7087a9d 2 API calls 45759->45770 45771 7087bb1 2 API calls 45759->45771 45772 7087cb4 2 API calls 45759->45772 45773 7087b15 2 API calls 45759->45773 45774 7087b55 2 API calls 45759->45774 45775 7087b76 2 API calls 45759->45775 45776 7087a76 2 API calls 45759->45776 45760->45709 45761->45760 45762->45760 45763->45760 45764->45760 45765->45760 45766->45760 45767->45760 45768->45760 45769->45760 45770->45760 45771->45760 45772->45760 45773->45760 45774->45760 45775->45760 45776->45760 45778 708797c 45777->45778 45858 70858d0 45778->45858 45862 70858c5 45778->45862 45783 70881ec 45782->45783 45785 7084ff9 ResumeThread 45783->45785 45866 7085000 45783->45866 45784 7088201 45785->45784 45788 7087dc5 45787->45788 45870 7085248 45788->45870 45874 7085240 45788->45874 45789 7087afc 45789->45725 45793 7087dd8 45792->45793 45794 7087b7a 45792->45794 45878 70850a8 45793->45878 45882 70850b0 45793->45882 45798 7084ff9 ResumeThread 45794->45798 45799 7085000 ResumeThread 45794->45799 45795 7088201 45798->45795 45799->45795 45801 7087b14 45800->45801 45803 7084ff9 ResumeThread 45801->45803 45804 7085000 ResumeThread 45801->45804 45802 7088201 45803->45802 45804->45802 45886 7085181 45805->45886 45890 7085188 45805->45890 45806 7087d26 45806->45725 45810 708797c 45809->45810 45812 70858d0 CreateProcessA 45810->45812 45813 70858c5 CreateProcessA 45810->45813 45811 7087ad1 45811->45725 45812->45811 45813->45811 45815 7087b7a 45814->45815 45817 7084ff9 ResumeThread 45815->45817 45818 7085000 ResumeThread 45815->45818 45816 7088201 45817->45816 45818->45816 45820 7087ea0 45819->45820 45822 70850a8 Wow64SetThreadContext 45820->45822 45823 70850b0 Wow64SetThreadContext 45820->45823 45821 7087afc 45821->45725 45822->45821 45823->45821 45825 7088182 45824->45825 45827 7084ff9 ResumeThread 45825->45827 45828 7085000 ResumeThread 45825->45828 45826 7088201 45826->45826 45827->45826 45828->45826 45830 7087cc1 45829->45830 45832 7085248 WriteProcessMemory 45830->45832 45833 7085240 WriteProcessMemory 45830->45833 45831 7087e84 45832->45831 45833->45831 45835 7087bba 45834->45835 45837 7085248 WriteProcessMemory 45835->45837 45838 7085240 WriteProcessMemory 45835->45838 45836 7087d5f 45836->45725 45837->45836 45838->45836 45840 7087aa3 45839->45840 45841 7087ad1 45840->45841 45842 70858d0 CreateProcessA 45840->45842 45843 70858c5 CreateProcessA 45840->45843 45841->45725 45842->45841 45843->45841 45845 7087c1c 45844->45845 45847 7084ff9 ResumeThread 45845->45847 45848 7085000 ResumeThread 45845->45848 45846 7088201 45847->45846 45848->45846 45850 708797c 45849->45850 45852 70858d0 CreateProcessA 45850->45852 45853 70858c5 CreateProcessA 45850->45853 45851 7087ad1 45851->45725 45852->45851 45853->45851 45855 7087c2f 45854->45855 45894 7085338 45854->45894 45898 7085330 45854->45898 45859 7085959 CreateProcessA 45858->45859 45861 7085b1b 45859->45861 45861->45861 45863 7085959 CreateProcessA 45862->45863 45865 7085b1b 45863->45865 45865->45865 45867 7085040 ResumeThread 45866->45867 45869 7085071 45867->45869 45869->45784 45871 7085290 WriteProcessMemory 45870->45871 45873 70852e7 45871->45873 45873->45789 45875 7085290 WriteProcessMemory 45874->45875 45877 70852e7 45875->45877 45877->45789 45879 70850f5 Wow64SetThreadContext 45878->45879 45881 708513d 45879->45881 45881->45794 45883 70850f5 Wow64SetThreadContext 45882->45883 45885 708513d 45883->45885 45885->45794 45887 70851c8 VirtualAllocEx 45886->45887 45889 7085205 45887->45889 45889->45806 45891 70851c8 VirtualAllocEx 45890->45891 45893 7085205 45891->45893 45893->45806 45895 7085383 ReadProcessMemory 45894->45895 45897 70853ba 45895->45897 45897->45855 45899 7085383 ReadProcessMemory 45898->45899 45901 70853ba 45899->45901 45901->45855 45904 2e17c88 45905 2e17cb5 45904->45905 45920 2e1777c 45905->45920 45907 2e17d0e 45924 2e1f297 45907->45924 45928 2e1f2a8 45907->45928 45908 2e1b651 45932 2e17944 45908->45932 45910 2e1b665 45911 2e17944 DrawTextExW 45910->45911 45912 2e1b68f 45911->45912 45918 2e1f297 DrawTextExW 45912->45918 45919 2e1f2a8 DrawTextExW 45912->45919 45913 2e1b6b0 45914 2e17944 DrawTextExW 45913->45914 45915 2e1b6bc 45914->45915 45918->45913 45919->45913 45921 2e17787 45920->45921 45938 2e17954 45921->45938 45923 2e1b735 45923->45907 45925 2e1f2d7 45924->45925 45927 2e1f349 45924->45927 45926 2e17944 DrawTextExW 45925->45926 45925->45927 45926->45927 45927->45908 45929 2e1f2d7 45928->45929 45931 2e1f349 45928->45931 45930 2e17944 DrawTextExW 45929->45930 45929->45931 45930->45931 45931->45908 45933 2e1794f 45932->45933 45934 2e1fef7 45933->45934 45955 2e1d229 45933->45955 45961 2e1d238 45933->45961 45934->45910 45935 2e1fee4 45935->45910 45939 2e1795f 45938->45939 45943 1205ccc 3 API calls 45939->45943 45947 12072d7 45939->45947 45940 2e1b8cc 45944 2e1f297 DrawTextExW 45940->45944 45945 2e1f2a8 DrawTextExW 45940->45945 45951 2e1f32e 45940->45951 45941 2e1bc1f 45941->45923 45943->45940 45944->45941 45945->45941 45948 120731b 45947->45948 45949 1205cfc 3 API calls 45948->45949 45950 120738d 45949->45950 45950->45940 45952 2e1f30e 45951->45952 45953 2e17944 DrawTextExW 45952->45953 45954 2e1f349 45952->45954 45953->45954 45954->45941 45956 2e1d230 45955->45956 45957 2e1d1e8 45956->45957 45967 5497d18 45956->45967 45971 5497d28 45956->45971 45957->45935 45958 2e1d2fd 45962 2e1d25b 45961->45962 45963 2e1d25f 45962->45963 45965 5497d18 DrawTextExW 45962->45965 45966 5497d28 DrawTextExW 45962->45966 45963->45935 45964 2e1d2fd 45965->45964 45966->45964 45968 5497d50 45967->45968 45969 5497d3a 45967->45969 45968->45958 45975 5496db8 45969->45975 45972 5497d50 45971->45972 45973 5497d3a 45971->45973 45972->45958 45974 5496db8 DrawTextExW 45973->45974 45974->45972 45976 5496dc3 45975->45976 45977 54981a6 45976->45977 45980 5499520 45976->45980 45985 5499530 45976->45985 45977->45968 45981 5499524 45980->45981 45982 5499566 45981->45982 45990 54991dc 45981->45990 45982->45976 45987 5499531 45985->45987 45986 5499566 45986->45976 45987->45986 45988 54991dc DrawTextExW 45987->45988 45989 54995b6 45988->45989 45991 54991e7 45990->45991 45994 549a314 45991->45994 45993 54995b6 45996 549a31f 45994->45996 45995 549b131 45995->45993 45996->45995 46000 549bc41 45996->46000 46004 549bc50 45996->46004 45997 549b235 45997->45993 46001 549bc4c 46000->46001 46001->46001 46007 549a4ec 46001->46007 46005 549bc6d 46004->46005 46006 549a4ec DrawTextExW 46004->46006 46005->45997 46006->46005 46008 549bc88 DrawTextExW 46007->46008 46010 549bc6d 46008->46010 46010->45997 45640 7081eb2 45641 7081ebd 45640->45641 45643 7084bb8 ResumeThread 45641->45643 45644 7084baa ResumeThread 45641->45644 45642 70820ca 45643->45642 45644->45642 45607 7081f84 45608 7081f94 45607->45608 45612 7084bb8 45608->45612 45617 7084baa 45608->45617 45609 7082329 45613 7084beb 45612->45613 45622 7084f50 45613->45622 45626 7084f40 45613->45626 45614 7084c59 45614->45609 45618 7084beb 45617->45618 45620 7084f40 ResumeThread 45618->45620 45621 7084f50 ResumeThread 45618->45621 45619 7084c59 45619->45609 45620->45619 45621->45619 45623 7084f70 45622->45623 45624 7084f8a 45623->45624 45630 7084ff9 45623->45630 45624->45614 45627 7084f70 45626->45627 45628 7084f8a 45627->45628 45629 7084ff9 ResumeThread 45627->45629 45628->45614 45629->45628 45631 7084ffe ResumeThread 45630->45631 45632 7084fcc 45630->45632 45634 7085071 45631->45634 45632->45624 45634->45624

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 296 120d4e8-120d587 GetCurrentProcess 301 120d590-120d5c4 GetCurrentThread 296->301 302 120d589-120d58f 296->302 303 120d5c6-120d5cc 301->303 304 120d5cd-120d601 GetCurrentProcess 301->304 302->301 303->304 305 120d603-120d609 304->305 306 120d60a-120d625 call 120d6c8 304->306 305->306 310 120d62b-120d65a GetCurrentThreadId 306->310 311 120d663-120d6c5 310->311 312 120d65c-120d662 310->312 312->311
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 0120D576
                                                                • GetCurrentThread.KERNEL32 ref: 0120D5B3
                                                                • GetCurrentProcess.KERNEL32 ref: 0120D5F0
                                                                • GetCurrentThreadId.KERNEL32 ref: 0120D649
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460609479.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1200000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID: $G'z
                                                                • API String ID: 2063062207-299128439
                                                                • Opcode ID: 874a847fd3702567a4c343821b0f163bcc674901ee645f9f488642071a07ffa2
                                                                • Instruction ID: 6c2d8384b0f0bd7f4cc0c2fcd1b8fb50b58abf7c5c82e8691bb32407795ef8b8
                                                                • Opcode Fuzzy Hash: 874a847fd3702567a4c343821b0f163bcc674901ee645f9f488642071a07ffa2
                                                                • Instruction Fuzzy Hash: B15177B09113498FEB15CFAAD948BEEBFF1EF48304F208459E448AB391D735A944CB65

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 319 120d4f8-120d587 GetCurrentProcess 323 120d590-120d5c4 GetCurrentThread 319->323 324 120d589-120d58f 319->324 325 120d5c6-120d5cc 323->325 326 120d5cd-120d601 GetCurrentProcess 323->326 324->323 325->326 327 120d603-120d609 326->327 328 120d60a-120d625 call 120d6c8 326->328 327->328 332 120d62b-120d65a GetCurrentThreadId 328->332 333 120d663-120d6c5 332->333 334 120d65c-120d662 332->334 334->333
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 0120D576
                                                                • GetCurrentThread.KERNEL32 ref: 0120D5B3
                                                                • GetCurrentProcess.KERNEL32 ref: 0120D5F0
                                                                • GetCurrentThreadId.KERNEL32 ref: 0120D649
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460609479.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1200000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID: $G'z
                                                                • API String ID: 2063062207-299128439
                                                                • Opcode ID: 2d8d497020826b3562852a727854b7d06b7835202dc58129cd6ca934a617c139
                                                                • Instruction ID: b2b4cb54fc37c27a0f4a71e24e0ef5069d5b774822c264748cb41cbbbb2b4b77
                                                                • Opcode Fuzzy Hash: 2d8d497020826b3562852a727854b7d06b7835202dc58129cd6ca934a617c139
                                                                • Instruction Fuzzy Hash: 235155B0D11309CFEB14CFAAD948BEEBBF1EB48304F208459E549AB391D7359944CB65

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 341 70858c5-7085965 343 708599e-70859be 341->343 344 7085967-7085971 341->344 351 70859c0-70859ca 343->351 352 70859f7-7085a26 343->352 344->343 345 7085973-7085975 344->345 346 7085998-708599b 345->346 347 7085977-7085981 345->347 346->343 349 7085983 347->349 350 7085985-7085994 347->350 349->350 350->350 353 7085996 350->353 351->352 354 70859cc-70859ce 351->354 358 7085a28-7085a32 352->358 359 7085a5f-7085b19 CreateProcessA 352->359 353->346 356 70859d0-70859da 354->356 357 70859f1-70859f4 354->357 360 70859dc 356->360 361 70859de-70859ed 356->361 357->352 358->359 362 7085a34-7085a36 358->362 372 7085b1b-7085b21 359->372 373 7085b22-7085ba8 359->373 360->361 361->361 363 70859ef 361->363 364 7085a38-7085a42 362->364 365 7085a59-7085a5c 362->365 363->357 367 7085a44 364->367 368 7085a46-7085a55 364->368 365->359 367->368 368->368 369 7085a57 368->369 369->365 372->373 383 7085bb8-7085bbc 373->383 384 7085baa-7085bae 373->384 385 7085bcc-7085bd0 383->385 386 7085bbe-7085bc2 383->386 384->383 387 7085bb0 384->387 389 7085be0-7085be4 385->389 390 7085bd2-7085bd6 385->390 386->385 388 7085bc4 386->388 387->383 388->385 392 7085bf6-7085bfd 389->392 393 7085be6-7085bec 389->393 390->389 391 7085bd8 390->391 391->389 394 7085bff-7085c0e 392->394 395 7085c14 392->395 393->392 394->395 396 7085c15 395->396 396->396
                                                                APIs
                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07085B06
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID: $G'z$$G'z
                                                                • API String ID: 963392458-3191743983
                                                                • Opcode ID: 313dd05e34a03b154eff720827e8c33a6b0c7a748c972e2663b5d216d4da68a8
                                                                • Instruction ID: 85853c702969e4b877b8e8ae839798570426b07c6777a0e11a6229ec02d5c867
                                                                • Opcode Fuzzy Hash: 313dd05e34a03b154eff720827e8c33a6b0c7a748c972e2663b5d216d4da68a8
                                                                • Instruction Fuzzy Hash: 0CA14DB1D00219CFEB64DF68CC41BEDBBF2AF48310F148669E849A7240DB749995CF91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 398 70858d0-7085965 400 708599e-70859be 398->400 401 7085967-7085971 398->401 408 70859c0-70859ca 400->408 409 70859f7-7085a26 400->409 401->400 402 7085973-7085975 401->402 403 7085998-708599b 402->403 404 7085977-7085981 402->404 403->400 406 7085983 404->406 407 7085985-7085994 404->407 406->407 407->407 410 7085996 407->410 408->409 411 70859cc-70859ce 408->411 415 7085a28-7085a32 409->415 416 7085a5f-7085b19 CreateProcessA 409->416 410->403 413 70859d0-70859da 411->413 414 70859f1-70859f4 411->414 417 70859dc 413->417 418 70859de-70859ed 413->418 414->409 415->416 419 7085a34-7085a36 415->419 429 7085b1b-7085b21 416->429 430 7085b22-7085ba8 416->430 417->418 418->418 420 70859ef 418->420 421 7085a38-7085a42 419->421 422 7085a59-7085a5c 419->422 420->414 424 7085a44 421->424 425 7085a46-7085a55 421->425 422->416 424->425 425->425 426 7085a57 425->426 426->422 429->430 440 7085bb8-7085bbc 430->440 441 7085baa-7085bae 430->441 442 7085bcc-7085bd0 440->442 443 7085bbe-7085bc2 440->443 441->440 444 7085bb0 441->444 446 7085be0-7085be4 442->446 447 7085bd2-7085bd6 442->447 443->442 445 7085bc4 443->445 444->440 445->442 449 7085bf6-7085bfd 446->449 450 7085be6-7085bec 446->450 447->446 448 7085bd8 447->448 448->446 451 7085bff-7085c0e 449->451 452 7085c14 449->452 450->449 451->452 453 7085c15 452->453 453->453
                                                                APIs
                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07085B06
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID: $G'z$$G'z
                                                                • API String ID: 963392458-3191743983
                                                                • Opcode ID: 39859e070480b739cf6258f6e21f67c496e5c7d02af8b7bb589cf2d95fb10a4f
                                                                • Instruction ID: e0064f2b4d82b331634871bc8eb02d6d452dd184c9e6086cbb97006e0da3e772
                                                                • Opcode Fuzzy Hash: 39859e070480b739cf6258f6e21f67c496e5c7d02af8b7bb589cf2d95fb10a4f
                                                                • Instruction Fuzzy Hash: C0914CB1D00319DFEB64DF68CC41BDEBBF2AB48310F148669E848A7240DB749995CF91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 455 2e11924-2e11996 457 2e119a1-2e119a8 455->457 458 2e11998-2e1199e 455->458 459 2e119b3-2e11a52 CreateWindowExW 457->459 460 2e119aa-2e119b0 457->460 458->457 462 2e11a54-2e11a5a 459->462 463 2e11a5b-2e11a93 459->463 460->459 462->463 467 2e11aa0 463->467 468 2e11a95-2e11a98 463->468 469 2e11aa1 467->469 468->467 469->469
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02E11A42
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1464720080.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_2e10000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID: $G'z$$G'z
                                                                • API String ID: 716092398-3191743983
                                                                • Opcode ID: 9812a24cdc16efbdfac938b08b76d72aa8f2fa8152c2e71822b0d769e6a3dd49
                                                                • Instruction ID: b4d3db99f130f485058ec71ae0a333af35bde844237f1ed097a8fb2714e102b3
                                                                • Opcode Fuzzy Hash: 9812a24cdc16efbdfac938b08b76d72aa8f2fa8152c2e71822b0d769e6a3dd49
                                                                • Instruction Fuzzy Hash: F051CFB1D003499FDF14CF9AC884ADEBFB5BF48314F24812AE919AB250D775A985CF90

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 470 2e11930-2e11996 471 2e119a1-2e119a8 470->471 472 2e11998-2e1199e 470->472 473 2e119b3-2e11a52 CreateWindowExW 471->473 474 2e119aa-2e119b0 471->474 472->471 476 2e11a54-2e11a5a 473->476 477 2e11a5b-2e11a93 473->477 474->473 476->477 481 2e11aa0 477->481 482 2e11a95-2e11a98 477->482 483 2e11aa1 481->483 482->481 483->483
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02E11A42
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1464720080.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_2e10000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID: $G'z$$G'z
                                                                • API String ID: 716092398-3191743983
                                                                • Opcode ID: 1a80e2c72229c3835a835e66c9f362fb9418708d0574dbb985a7e7d6a6bbc534
                                                                • Instruction ID: 1b85cf3d752785f50ca99fa4099c186cc841c8eedf2296c0afcbfe5beaa45322
                                                                • Opcode Fuzzy Hash: 1a80e2c72229c3835a835e66c9f362fb9418708d0574dbb985a7e7d6a6bbc534
                                                                • Instruction Fuzzy Hash: 7C41CEB1D003499FDF14CF9AC884ADEBFB5BF48314F24812AE919AB250D775A985CF90

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2147 120ae59-120ae60 2148 120ae01-120ae35 2147->2148 2149 120ae62-120ae77 2147->2149 2160 120ae44-120ae4c 2148->2160 2161 120ae37-120ae42 2148->2161 2151 120aea3-120aea7 2149->2151 2152 120ae79-120ae86 call 1209494 2149->2152 2153 120aea9-120aeb3 2151->2153 2154 120aebb-120aefc 2151->2154 2158 120ae88 2152->2158 2159 120ae9c 2152->2159 2153->2154 2165 120af09-120af17 2154->2165 2166 120aefe-120af06 2154->2166 2211 120ae8e call 120b100 2158->2211 2212 120ae8e call 120b0f1 2158->2212 2159->2151 2164 120ae4f-120ae54 2160->2164 2161->2164 2168 120af19-120af1e 2165->2168 2169 120af3b-120af3d 2165->2169 2166->2165 2167 120ae94-120ae96 2167->2159 2170 120afd8-120aff1 2167->2170 2172 120af20-120af27 call 120a1d0 2168->2172 2173 120af29 2168->2173 2171 120af40-120af47 2169->2171 2187 120aff2-120b050 2170->2187 2176 120af54-120af5b 2171->2176 2177 120af49-120af51 2171->2177 2175 120af2b-120af39 2172->2175 2173->2175 2175->2171 2179 120af68-120af71 call 120a1e0 2176->2179 2180 120af5d-120af65 2176->2180 2177->2176 2185 120af73-120af7b 2179->2185 2186 120af7e-120af83 2179->2186 2180->2179 2185->2186 2188 120afa1-120afae 2186->2188 2189 120af85-120af8c 2186->2189 2205 120b052-120b098 2187->2205 2196 120afb0-120afce 2188->2196 2197 120afd1-120afd7 2188->2197 2189->2188 2191 120af8e-120af9e call 120a1f0 call 120a200 2189->2191 2191->2188 2196->2197 2206 120b0a0-120b0cb GetModuleHandleW 2205->2206 2207 120b09a-120b09d 2205->2207 2208 120b0d4-120b0e8 2206->2208 2209 120b0cd-120b0d3 2206->2209 2207->2206 2209->2208 2211->2167 2212->2167
                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0120B0BE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460609479.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1200000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID: $G'z
                                                                • API String ID: 4139908857-299128439
                                                                • Opcode ID: 9c026623f0153e2281c07e785d8a417a75c3d4c5118e1443fb87bc6566dbbec1
                                                                • Instruction ID: 2aad4d80cd9f1d5433b96031a0f52c002d3d171c3489e3390099a01b9e386cde
                                                                • Opcode Fuzzy Hash: 9c026623f0153e2281c07e785d8a417a75c3d4c5118e1443fb87bc6566dbbec1
                                                                • Instruction Fuzzy Hash: 05915C70A107458FE726CF29D05579ABBF1FF88304F008A2DD586CB692D776E846CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2213 120590d-1205916 2214 1205918-12059d9 CreateActCtxA 2213->2214 2216 12059e2-1205a3c 2214->2216 2217 12059db-12059e1 2214->2217 2224 1205a4b-1205a4f 2216->2224 2225 1205a3e-1205a41 2216->2225 2217->2216 2226 1205a60 2224->2226 2227 1205a51-1205a5d 2224->2227 2225->2224 2228 1205a61 2226->2228 2227->2226 2228->2228
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 012059C9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460609479.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1200000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID: $G'z
                                                                • API String ID: 2289755597-299128439
                                                                • Opcode ID: 39f019b8c5e330497e16a9f5d7f69b084aa8138b0a4161d8f3de0aa68ac93649
                                                                • Instruction ID: ec0c67c97335b01ead35cd12488786e8b06c233488330e96e7d7a6536d041b36
                                                                • Opcode Fuzzy Hash: 39f019b8c5e330497e16a9f5d7f69b084aa8138b0a4161d8f3de0aa68ac93649
                                                                • Instruction Fuzzy Hash: 4341E170C10719CFEB25DFAAC8847CDBBB5BF49314F20816AD508AB291D7756946CF90
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 012059C9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460609479.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1200000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID: $G'z
                                                                • API String ID: 2289755597-299128439
                                                                • Opcode ID: 475125683d4aaa3b26da5e047c102cef04ffa710b213e6e075443a077c1979d9
                                                                • Instruction ID: 7300cf25619f7b33ef757bd0b0cdc06da04a6bb737d3c1e0c9cffdf6f85c8f39
                                                                • Opcode Fuzzy Hash: 475125683d4aaa3b26da5e047c102cef04ffa710b213e6e075443a077c1979d9
                                                                • Instruction Fuzzy Hash: 3641D071C1071DCFEB25DFA9C884B8EBBB5BF49304F20815AD508AB291DB75A946CF90
                                                                APIs
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 02E14151
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1464720080.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_2e10000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: CallProcWindow
                                                                • String ID: $G'z
                                                                • API String ID: 2714655100-299128439
                                                                • Opcode ID: e3f7b616b8cb7a185fcb03739bce5ff8a7ee78151f1b01e950893b25a4dbcdbe
                                                                • Instruction ID: d0c65b2e0b806fe504a0d262fed90e5f973251ea9e58a816c1ac00658c067ee5
                                                                • Opcode Fuzzy Hash: e3f7b616b8cb7a185fcb03739bce5ff8a7ee78151f1b01e950893b25a4dbcdbe
                                                                • Instruction Fuzzy Hash: 094109B5A00309DFDB14CF99C848AAABBF5FF88314F25C499D519AB361D375A841CFA0
                                                                APIs
                                                                • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,0549BC6D,?,?), ref: 0549BD1F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1470260108.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_5490000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: DrawText
                                                                • String ID: $G'z
                                                                • API String ID: 2175133113-299128439
                                                                • Opcode ID: b9c8664cecda0be54ad7e20281d999d55a0b60ba37e8f09a40e8c780d0417bd8
                                                                • Instruction ID: f0f91b74595ed12c14985aa5e18d35f90c7744642f755f54efa76090bfdbae38
                                                                • Opcode Fuzzy Hash: b9c8664cecda0be54ad7e20281d999d55a0b60ba37e8f09a40e8c780d0417bd8
                                                                • Instruction Fuzzy Hash: B031F4B5D042499FDF14CF99E885ADEBBF5FB48210F14841AE819A7710C774A940CFA0
                                                                APIs
                                                                • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,0549BC6D,?,?), ref: 0549BD1F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1470260108.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_5490000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: DrawText
                                                                • String ID: $G'z
                                                                • API String ID: 2175133113-299128439
                                                                • Opcode ID: 7353bf44f6dcbd647e430cda052a8c2166a570d670b69df9ab3cbbe876f51173
                                                                • Instruction ID: 0ee736c770576a30dc9798340466c825f30d95552a36e6aa4af84f87ea36ea15
                                                                • Opcode Fuzzy Hash: 7353bf44f6dcbd647e430cda052a8c2166a570d670b69df9ab3cbbe876f51173
                                                                • Instruction Fuzzy Hash: EA31DFB59042499FDB14CF9AE884AEEBBF5FB48210F14842EE919A7310D774A940CBA0
                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070852D8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID: $G'z
                                                                • API String ID: 3559483778-299128439
                                                                • Opcode ID: 5602101262256d7739b48c239cb29f54a8e7e11a67fd3e0854df5e649480c145
                                                                • Instruction ID: 65b3ff712b2250c15cbf8042ec476aa04ff6eb2ce6444ab914a5a2b1cbf820a2
                                                                • Opcode Fuzzy Hash: 5602101262256d7739b48c239cb29f54a8e7e11a67fd3e0854df5e649480c145
                                                                • Instruction Fuzzy Hash: 482148B59003599FDB50DFA9C881BDEBBF1FF48310F10842AE958A7240C7789554CBA4
                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070852D8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID: $G'z
                                                                • API String ID: 3559483778-299128439
                                                                • Opcode ID: 03e54d5e9a90f14fe1a739439791a181436581244c08df70707f13f1de2eec4a
                                                                • Instruction ID: 1cdf74066d61063e8ac1c24e007cc71605a2007a66d653dbee1ac8dfce90b616
                                                                • Opcode Fuzzy Hash: 03e54d5e9a90f14fe1a739439791a181436581244c08df70707f13f1de2eec4a
                                                                • Instruction Fuzzy Hash: 05212AB59003599FDB10DFAAC841BDEBBF5FF48310F108429E958A7240C7789550CB64
                                                                APIs
                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070853B8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID: $G'z
                                                                • API String ID: 1726664587-299128439
                                                                • Opcode ID: 8f529a1da60cc64c37b2d345cf4bc03b1691e0e487be8685c0c21fb96db2404d
                                                                • Instruction ID: ff0e5fdc50d360df6361e38e39f6238654b359abe53887491d7e6dba04d45d38
                                                                • Opcode Fuzzy Hash: 8f529a1da60cc64c37b2d345cf4bc03b1691e0e487be8685c0c21fb96db2404d
                                                                • Instruction Fuzzy Hash: A0212AB6C003599FDB10DFA9C9817EEBBF5FF48320F10881AE558A7640C7789541CBA5
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0120D7C7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460609479.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1200000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID: $G'z
                                                                • API String ID: 3793708945-299128439
                                                                • Opcode ID: e4195e0de548a3be1bd6eb39b5a9d7d958ea5c539f0f6e41ac14b5c86b0aacc6
                                                                • Instruction ID: 44c6678267f541a27bf95f1248615139bd12f981cf91fd1666de1fe2df4831d0
                                                                • Opcode Fuzzy Hash: e4195e0de548a3be1bd6eb39b5a9d7d958ea5c539f0f6e41ac14b5c86b0aacc6
                                                                • Instruction Fuzzy Hash: 6521E3B5900249EFDB10CFAAD884ADEFFF4EB48310F14841AE954A7351D378AA41CFA5
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0708512E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID: $G'z
                                                                • API String ID: 983334009-299128439
                                                                • Opcode ID: 2de21b46db0c909157c13bb526da6560113058ae962264dddbc94891de93fa29
                                                                • Instruction ID: 5d30be9275f22be59821fcd5ca56c44bafe57824bd19197bddf881fa6caf6dbf
                                                                • Opcode Fuzzy Hash: 2de21b46db0c909157c13bb526da6560113058ae962264dddbc94891de93fa29
                                                                • Instruction Fuzzy Hash: 742138B5D003098FDB14DFAAC9857EEBBF4AF48224F14842AD559A7340CB789545CFA4
                                                                APIs
                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070853B8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID: $G'z
                                                                • API String ID: 1726664587-299128439
                                                                • Opcode ID: 83b6307c2852f71f37b14fb199b6a6532c75560bb419029c67d35adacfdd4347
                                                                • Instruction ID: 515f53712efa52afb9cecfe2b2198d3ae4aaada9904cceddc7eb0348a1d3052d
                                                                • Opcode Fuzzy Hash: 83b6307c2852f71f37b14fb199b6a6532c75560bb419029c67d35adacfdd4347
                                                                • Instruction Fuzzy Hash: 862125B1C003499FDB10DFAAC880BEEBBF5FF48310F10842AE958A7240C7799940CBA5
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0708512E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID: $G'z
                                                                • API String ID: 983334009-299128439
                                                                • Opcode ID: f991de600c55563491a0dffdad86af3db4534c47546503494a93620f19225ee4
                                                                • Instruction ID: 380c4ec3e939bb35dfd058e7312e3fd16ec46fe1e95442f696f484812e6901f7
                                                                • Opcode Fuzzy Hash: f991de600c55563491a0dffdad86af3db4534c47546503494a93620f19225ee4
                                                                • Instruction Fuzzy Hash: D32137B19003098FDB14DFAAC8857EEBBF4EF48210F14842AD559A7340CB789945CFA5
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0120D7C7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460609479.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1200000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID: $G'z
                                                                • API String ID: 3793708945-299128439
                                                                • Opcode ID: 11bb1f97476f8474af7b075086b421d440b84f3f880d3fb61445d5dbfbf54203
                                                                • Instruction ID: 35fc52082e592bf81a6de5cd2faeed10e8cd833ebeb3a9cfbbcd8ae6dec2e6a4
                                                                • Opcode Fuzzy Hash: 11bb1f97476f8474af7b075086b421d440b84f3f880d3fb61445d5dbfbf54203
                                                                • Instruction Fuzzy Hash: 0221E4B5D00248DFDB10CF9AD484ADEBBF4EB48310F14841AE914A7350C378A940CF65
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID: $G'z
                                                                • API String ID: 947044025-299128439
                                                                • Opcode ID: d95e8c098a1ab85f3549f6ca5dbc43559c75534507f28ef7f613c20e3da35a7a
                                                                • Instruction ID: 94fa1a1163aa4ac4bf465027c5d7a6c06170d2497b9e6432f10e4e2a90ba100e
                                                                • Opcode Fuzzy Hash: d95e8c098a1ab85f3549f6ca5dbc43559c75534507f28ef7f613c20e3da35a7a
                                                                • Instruction Fuzzy Hash: 3B2188B5D003488FDB20DFA9C8457EEBBF4EF48210F14851AD919AB700CB399541CF94
                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 070851F6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID: $G'z
                                                                • API String ID: 4275171209-299128439
                                                                • Opcode ID: 0b9de76015ebf506ea5ef743d5b051adfb92fb6bff3f8b92e100eb3b736ab39e
                                                                • Instruction ID: 4b8f338c2fb69517860b3f6e90c3288df906a88277a46e93882114e893669ad2
                                                                • Opcode Fuzzy Hash: 0b9de76015ebf506ea5ef743d5b051adfb92fb6bff3f8b92e100eb3b736ab39e
                                                                • Instruction Fuzzy Hash: B01159768003499FDB20DFAAC844BDEBBF5EF48320F108819E955A7250CB759950CB91
                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 070851F6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID: $G'z
                                                                • API String ID: 4275171209-299128439
                                                                • Opcode ID: 6b4ab74baf7efa737a06b8d6bb2892e92a49b0a847a1d2a8a311ec7d5252c7a9
                                                                • Instruction ID: c0b3b2b42b08cd543e38baa110ae219310c002ffbf21fc127ca24441d99fa27a
                                                                • Opcode Fuzzy Hash: 6b4ab74baf7efa737a06b8d6bb2892e92a49b0a847a1d2a8a311ec7d5252c7a9
                                                                • Instruction Fuzzy Hash: DD1156728003499FDB20DFAAC844BDFBBF5EF48310F108819E555A7250CB79A540CBA4
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID: $G'z
                                                                • API String ID: 947044025-299128439
                                                                • Opcode ID: 203a26be57bf8760251f175ad448c13684dd5028c46dfc30eaa590c100630c56
                                                                • Instruction ID: 3a86e044b6568a8c971d69e1dee44176c6badb932b068145f178da09ae5f3dac
                                                                • Opcode Fuzzy Hash: 203a26be57bf8760251f175ad448c13684dd5028c46dfc30eaa590c100630c56
                                                                • Instruction Fuzzy Hash: FC1128B5D003488FDB24DFAAC8457EEFBF4EF48210F248419D559A7240CB79A544CFA5
                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0120B0BE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460609479.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1200000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID: $G'z
                                                                • API String ID: 4139908857-299128439
                                                                • Opcode ID: 91762da08df193c239ea2478082a56845f3eed22b49667ceec16342f6238841f
                                                                • Instruction ID: 6d8f512718fe6f8e3f547fc6987d75c5704f0b03ff61941ea10901a380d967eb
                                                                • Opcode Fuzzy Hash: 91762da08df193c239ea2478082a56845f3eed22b49667ceec16342f6238841f
                                                                • Instruction Fuzzy Hash: EB1110BAC00249CFDB20CF9AC444BDEFBF5EF88210F10851AD928A7640D379A545CFA5
                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 07088B2D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID: $G'z
                                                                • API String ID: 410705778-299128439
                                                                • Opcode ID: 643198e37f06231b8cdf5ceab0e74671e551f1d19a54f1392355ebe3df1ae787
                                                                • Instruction ID: 7e7ab4877f291884432951eff5788f41b764b64001eaa4f4c30ed141ee85e3d9
                                                                • Opcode Fuzzy Hash: 643198e37f06231b8cdf5ceab0e74671e551f1d19a54f1392355ebe3df1ae787
                                                                • Instruction Fuzzy Hash: 9311F2B5800349DFDB20DF9AD485BDEBBF8EB48320F108419E958A7740C375A944CFA5
                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 07088B2D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1471550779.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7080000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID: $G'z
                                                                • API String ID: 410705778-299128439
                                                                • Opcode ID: be8db98ed74371a62b157ec849d85eca3aed27b24f68384244806aa8119df718
                                                                • Instruction ID: 482613e67fe62e11602d0f809967b3e26c687e02f02805e4950211094d2e6d71
                                                                • Opcode Fuzzy Hash: be8db98ed74371a62b157ec849d85eca3aed27b24f68384244806aa8119df718
                                                                • Instruction Fuzzy Hash: E41103BA800249DFDB20DF99D545BDEFBF4EB48310F20881AD558A7740C375A544CFA5
                                                                APIs
                                                                • KiUserCallbackDispatcher.NTDLL(00000014,?,?,03E44104,02E6093C,?,00000000), ref: 02E1EFBE
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1464720080.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_2e10000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: CallbackDispatcherUser
                                                                • String ID:
                                                                • API String ID: 2492992576-0
                                                                • Opcode ID: d68d1c507c8df8a6aee4267af05a44174913e85a9cc99c82e5747e8264d89b02
                                                                • Instruction ID: 55e1c2eab21511ed99f3c017a8b03f536102f4b5672e279a7a0f68eefe11669d
                                                                • Opcode Fuzzy Hash: d68d1c507c8df8a6aee4267af05a44174913e85a9cc99c82e5747e8264d89b02
                                                                • Instruction Fuzzy Hash: 7181CF74A41208EFCB15DFA9D894DAEBBB2AF49314F1590A8F902AB361C731EC41CF50
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460211273.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_105d000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fb262ae38a979fb268e32c34b82216b6f2aa6588b79a42086873a45b3137a712
                                                                • Instruction ID: cc2d4e2d57a363c128079fdeeb9259e06f51dd83ee7b00065089015d881bf8b4
                                                                • Opcode Fuzzy Hash: fb262ae38a979fb268e32c34b82216b6f2aa6588b79a42086873a45b3137a712
                                                                • Instruction Fuzzy Hash: 4A21E272504200DFDB959F94D9C0B2BBBA5FB98324F20C5AAED490B256C336D416CBA2
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460281243.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_106d000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a8e76e6ebc480be2b75125714316923cac75acefe462395b275b8eb7e2854508
                                                                • Instruction ID: 83355c398700076724db4f460a25cff8276cd282eb6858a969966c5837c830b8
                                                                • Opcode Fuzzy Hash: a8e76e6ebc480be2b75125714316923cac75acefe462395b275b8eb7e2854508
                                                                • Instruction Fuzzy Hash: B3212571A04200EFDB15DF94D5C0B25BBA9FB84324F24C5ADE8894F292C336D446CB61
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460281243.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_106d000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f9813cd25c3012c7bafd4bfb9e5a79dc34c1e9440bd0d75e915d156668a289d8
                                                                • Instruction ID: 9af2f4e7a5a9a591d24fa49e7222ca88122f0aaef50cd104cbf91f13d51db06b
                                                                • Opcode Fuzzy Hash: f9813cd25c3012c7bafd4bfb9e5a79dc34c1e9440bd0d75e915d156668a289d8
                                                                • Instruction Fuzzy Hash: 07210371604300DFEB15DF64D580B26BBA9EB84314F20C5ADE98A0F292C336D407CB62
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460281243.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_106d000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 14c4fc777ed8f43efc051bcce8dba5e71221c8b549c1c78c33874aeabbfac00d
                                                                • Instruction ID: c472a14fe7e8ac948d312396a2de0d03f01ec5aebb7ff9c442b3e31db8139321
                                                                • Opcode Fuzzy Hash: 14c4fc777ed8f43efc051bcce8dba5e71221c8b549c1c78c33874aeabbfac00d
                                                                • Instruction Fuzzy Hash: 422183755093809FDB12CF64D590715BFB1EB46214F28C5DAD8898F6A7C33A980ACB62
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460211273.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_105d000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 63590c6d4b85089a62ccbb5b73be6abf778bad766966e0b930af7b7dfcf8d66b
                                                                • Instruction ID: 5cef1a3c940c95f516cc295eda5f8da22a63ba56af445725dffc64adf08bfce7
                                                                • Opcode Fuzzy Hash: 63590c6d4b85089a62ccbb5b73be6abf778bad766966e0b930af7b7dfcf8d66b
                                                                • Instruction Fuzzy Hash: 6421CDB6404240DFDB46CF44D9C4B16BFA2FB84320F24C5AADD480B656C33AD426CBA2
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460281243.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_106d000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                                                • Instruction ID: c31fdde6ead0109bd15ae0f87611f8c33b83a913a2fe0ba2cf7d2895e39d9e1a
                                                                • Opcode Fuzzy Hash: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                                                                • Instruction Fuzzy Hash: EF11BBB5A04280DFDB16CF54D5C0B15FFA1FB84324F28C6A9D8894B696C33AD44ACB62
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460211273.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_105d000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9d9ea7c08ffe4c073ff79e6766a3a7db3c0e0e93a8687227149c31eeb5f7e86f
                                                                • Instruction ID: c0b179cc98737b99a21024acd35b48d31679716ff309a089f46779561b9e637f
                                                                • Opcode Fuzzy Hash: 9d9ea7c08ffe4c073ff79e6766a3a7db3c0e0e93a8687227149c31eeb5f7e86f
                                                                • Instruction Fuzzy Hash: 1601F7310043889AF7A04F69CD84B6BBBD8FF41664F04855BED880E282E2399441CBB2
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1460211273.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_105d000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 95b9ad68a832c3ccd5d993dd86572546b27af494b09ff83c978c9bda01f77651
                                                                • Instruction ID: ca55b0e6f5ae6d0a8b9bf2cd276d0429f4b3eb76ace258adc5dd7de33dbedd01
                                                                • Opcode Fuzzy Hash: 95b9ad68a832c3ccd5d993dd86572546b27af494b09ff83c978c9bda01f77651
                                                                • Instruction Fuzzy Hash: 9DF06271404384AEE7608E19C988B67FFD8EB41634F18C55BED484F287D2799844CBB1
                                                                APIs
                                                                • GetSystemMetrics.USER32 ref: 05490A2E
                                                                • GetSystemMetrics.USER32(00000006), ref: 05490A68
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1470260108.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_5490000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem
                                                                • String ID: $G'z
                                                                • API String ID: 4116985748-299128439
                                                                • Opcode ID: b92311740cd7c7f4d6db1a71831161ed40e106ae29412e185e0d70cf3fadb9a9
                                                                • Instruction ID: a3468cdeae5d304371a33fe8d2bc719d5b9bf166db6e7352dd714167781732bd
                                                                • Opcode Fuzzy Hash: b92311740cd7c7f4d6db1a71831161ed40e106ae29412e185e0d70cf3fadb9a9
                                                                • Instruction Fuzzy Hash: C12135B2901348CFEB24CF99D44A7AEBFF4EB18314F21845AD149AB380D3755544CFA6
                                                                APIs
                                                                • GetSystemMetrics.USER32(00000050), ref: 0549E3EB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1470260108.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_5490000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem
                                                                • String ID: $G'z$4'q
                                                                • API String ID: 4116985748-455860590
                                                                • Opcode ID: e4f4021fdbf4a055fbbb0cd8ac84c57a4c039d60c46bbd74b9b7d5be66f4b8f9
                                                                • Instruction ID: 0a0c0329fc38d07c2c11e4fdb849c400b75457bc0de6391ba95b5be54a0921f3
                                                                • Opcode Fuzzy Hash: e4f4021fdbf4a055fbbb0cd8ac84c57a4c039d60c46bbd74b9b7d5be66f4b8f9
                                                                • Instruction Fuzzy Hash: BC2166B5C043599FDB14DFAAE8056EEBBF4EB08310F10855AE419B7381C3346900CFA5
                                                                APIs
                                                                • GetSystemMetrics.USER32(00000050), ref: 0549E3EB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.1470260108.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_5490000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem
                                                                • String ID: $G'z$4'q
                                                                • API String ID: 4116985748-455860590
                                                                • Opcode ID: 9b4f1633f7e743edc3df81c2f69d7ccba79f70d2fe1304e78c32be73ed4a7461
                                                                • Instruction ID: 17b6fcaaf313891c00052844705dc03672a0419bcf6880eeb694864ddf6a85a2
                                                                • Opcode Fuzzy Hash: 9b4f1633f7e743edc3df81c2f69d7ccba79f70d2fe1304e78c32be73ed4a7461
                                                                • Instruction Fuzzy Hash: 002134B5D0035A8FDB14DFAAE8456EEBBB4FB08320F10855AE819B7380C7346904CFA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: N
                                                                • API String ID: 0-1130791706
                                                                • Opcode ID: 835dc511c821d8c29b4c5c490893ae92be62e1c5748d9287ee8c781aa82a5f46
                                                                • Instruction ID: 3f961e79e58ecffe843f6633da8b06a2f69d29060a91b2062792c6e5b09e2d45
                                                                • Opcode Fuzzy Hash: 835dc511c821d8c29b4c5c490893ae92be62e1c5748d9287ee8c781aa82a5f46
                                                                • Instruction Fuzzy Hash: 8F73F831D1075A8EDB21EF68C984A99FBB1FF95300F51C6DAE45867121EB70AAC4CF81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Xq$$q
                                                                • API String ID: 0-855381642
                                                                • Opcode ID: 2e7a01d06ff5669f6433d15d68784bf0d7378f59bc9b1a7b59d5836754031291
                                                                • Instruction ID: c89d7bce1483facecde1da50002d8632a596d08931fa4336088804fb87e6db7a
                                                                • Opcode Fuzzy Hash: 2e7a01d06ff5669f6433d15d68784bf0d7378f59bc9b1a7b59d5836754031291
                                                                • Instruction Fuzzy Hash: 2DE17134E04288DFDB18DFB9D8946AEBBB2BF89310F148569E406EB394DF349941CB51
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 73f2474bb1c38908a050a475deb398c8bab5b1a2e2d068f745169c206e020108
                                                                • Instruction ID: dd15cad7a6188241d5f7216667c52e58e3b3ed2a9e246d5950cbbc49a072322e
                                                                • Opcode Fuzzy Hash: 73f2474bb1c38908a050a475deb398c8bab5b1a2e2d068f745169c206e020108
                                                                • Instruction Fuzzy Hash: D5C19074E01218CFDB24DFA5D994B9DBBB2FB89300F2081A9E809AB355DB355E85CF50
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c7e4669f91675bec0600561f00476aa2b64788e0be43a1b6c974b984899d9a0a
                                                                • Instruction ID: 672e7c62a341cc6ac383bb686237867bcb1f9cc8f79749da3f935e53d2e2967b
                                                                • Opcode Fuzzy Hash: c7e4669f91675bec0600561f00476aa2b64788e0be43a1b6c974b984899d9a0a
                                                                • Instruction Fuzzy Hash: 28B12671D116198FDB20DFA9C8847EDFBB1EF89304F10C2AAE45867261EB709A85CF41
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 73dc320dd9e89734235554fa7f9f2a4139f31a070a6b3938a5c477627304d3eb
                                                                • Instruction ID: d949f0f200a59fcb3805221425f87a5e1ac46767286e78cf5de6292df8ee783e
                                                                • Opcode Fuzzy Hash: 73dc320dd9e89734235554fa7f9f2a4139f31a070a6b3938a5c477627304d3eb
                                                                • Instruction Fuzzy Hash: 96A11571D016198FDB24DFA9C8847EDFBB1EF89304F14C2AAE45867261EB709A85CF41
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 18f2dd6227db1845b86e3389e10214ee890f0b46dd26fe2fda836c38e8dfa5aa
                                                                • Instruction ID: ed8837d988adf7fa62da9b8c901cc0b14df51cd179aea896614ef7e8f4d9d87d
                                                                • Opcode Fuzzy Hash: 18f2dd6227db1845b86e3389e10214ee890f0b46dd26fe2fda836c38e8dfa5aa
                                                                • Instruction Fuzzy Hash: A4A11670D00208CFEB24DFA9D588BDDBBB1FF89311F248269E419AB291DB749985CF54
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e78c02632b598edfe5cb3a25fbdf8a715b94c82b064e406018561a8accb93ee6
                                                                • Instruction ID: 1c1d4350617ce67830e9b1ba1b578782fe39dd67d3b822fb3b6a144ffb4ca1ae
                                                                • Opcode Fuzzy Hash: e78c02632b598edfe5cb3a25fbdf8a715b94c82b064e406018561a8accb93ee6
                                                                • Instruction Fuzzy Hash: F0910770D00208CFEB24DFA9D9887DCBBB5FF89311F208269E419AB291DB759985CF54
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6e35eb3722302745c0e939adcf800e5fe607211ba47885e0f23ce74f50a8d852
                                                                • Instruction ID: 7ab3053871c30515cb42515ce4d1b0502b5873138237fcc2d4d465a56b0e4fcd
                                                                • Opcode Fuzzy Hash: 6e35eb3722302745c0e939adcf800e5fe607211ba47885e0f23ce74f50a8d852
                                                                • Instruction Fuzzy Hash: 9141D274D05248CBEB18DFAAD5546ADFBB2FF89300F24C12AD815AB298DB345945CF10
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Xq$Xq$Xq$Xq$Xq$Xq
                                                                • API String ID: 0-905847027
                                                                • Opcode ID: 27bff674dc5789f5dd5fef49432288cea54a3677aed03db25e219fe0356cfa82
                                                                • Instruction ID: e713f1d895d24ab4e3826af2748141c9d32d5225a371a2aa059134616f7f9664
                                                                • Opcode Fuzzy Hash: 27bff674dc5789f5dd5fef49432288cea54a3677aed03db25e219fe0356cfa82
                                                                • Instruction Fuzzy Hash: 61627B12A192C1CFE72707388CA47957FE59B27262F4A01CAC4D59F2E3D6A90A47C737
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8q$Hq$Hq$Hq$TJq
                                                                • API String ID: 0-768243005
                                                                • Opcode ID: 28848df88c3fb1f58a5603e4adbfd6e951e22a6428e2c8c189ae825daba3bd86
                                                                • Instruction ID: c26252b5d665f31ec414861216414cf1e1f8745f259d79385bfd9b7099a83d85
                                                                • Opcode Fuzzy Hash: 28848df88c3fb1f58a5603e4adbfd6e951e22a6428e2c8c189ae825daba3bd86
                                                                • Instruction Fuzzy Hash: 53D1E831B042048FDB25DB68D491BAE7BB6EFC9320F244165E506EB391DB31DD82CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0oKp$LjKp$LjKp$PHq$PHq
                                                                • API String ID: 0-2065946399
                                                                • Opcode ID: 5111a4dd434be251317038d2cad7469874887c4e56c1a8d6b469a33c7e89ffbc
                                                                • Instruction ID: 2191391d40723e2680099bb3a8eae0b69bbe0b3446153ec93a6c0cf97bdec1fd
                                                                • Opcode Fuzzy Hash: 5111a4dd434be251317038d2cad7469874887c4e56c1a8d6b469a33c7e89ffbc
                                                                • Instruction Fuzzy Hash: 0A51C474E00218DFDB58DFAAD584A9DBBF2BF89311F248429E815BB364DB34A941CF10
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $Hq$Hq$Hq
                                                                • API String ID: 0-1373062214
                                                                • Opcode ID: d42735d7a57bf05edcc63c0ec1b5911bf2b8abe97447f9ee1fa11d8d5400cad2
                                                                • Instruction ID: 3f371cfb4c54727e027a0a734fa73c44a79f8600fa7a6df3f7227cf44fe64ca6
                                                                • Opcode Fuzzy Hash: d42735d7a57bf05edcc63c0ec1b5911bf2b8abe97447f9ee1fa11d8d5400cad2
                                                                • Instruction Fuzzy Hash: D8A1D8317042449FDB255F78E89926E7BA2EFC6320F24422AE926D73D1CF359D81C791
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8q$TJq
                                                                • API String ID: 0-1436491226
                                                                • Opcode ID: cad5029d99b48da5178a6223e1241c519db9c4bb9b5b925cfcffcc0f14bf69fb
                                                                • Instruction ID: ea9eeb26e7b0a84281ae19f360ac892f70dfe655ecb6e9d647b880db80e39f81
                                                                • Opcode Fuzzy Hash: cad5029d99b48da5178a6223e1241c519db9c4bb9b5b925cfcffcc0f14bf69fb
                                                                • Instruction Fuzzy Hash: 5E310435B002088FDB55DFA8D491EADBBB2EF88320F295054E501EF361DB71ED828B91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8q$TJq
                                                                • API String ID: 0-1436491226
                                                                • Opcode ID: 808da55e8a26a652a38f1a51faca4c64045dad3c4f45715891305b76158b6bc9
                                                                • Instruction ID: a12d833ac9b1b0ebd042e349f9c6b0d5abb68bf5d4416684dc47e0c274481608
                                                                • Opcode Fuzzy Hash: 808da55e8a26a652a38f1a51faca4c64045dad3c4f45715891305b76158b6bc9
                                                                • Instruction Fuzzy Hash: F4311635B002088FDB55DFA8D491E9DBBB2EF88324F295054E501EF361DB71ED828B91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LRq
                                                                • API String ID: 0-3187445251
                                                                • Opcode ID: 7f1e91606dcc6839c2acda300e95c8524d1538111cf18fede9fb95204dc1d9b7
                                                                • Instruction ID: 96f5e043e39f2ea8fe236ec0943c45db7f6488d0514080fa7934995d14dba356
                                                                • Opcode Fuzzy Hash: 7f1e91606dcc6839c2acda300e95c8524d1538111cf18fede9fb95204dc1d9b7
                                                                • Instruction Fuzzy Hash: E2A1BB78E05209CFCF15EFA8E99599DBBB1FB88301B104529E415AF369EB306D06CF81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LRq
                                                                • API String ID: 0-3187445251
                                                                • Opcode ID: 266bddf9903e741b9fe6f101a66343411200dec43233a6bda8f8d6951fc2acbd
                                                                • Instruction ID: 29bdee5c56ece19a0c3f049fe07a19e66e87f7ec02e2550ec757eb661f92acdc
                                                                • Opcode Fuzzy Hash: 266bddf9903e741b9fe6f101a66343411200dec43233a6bda8f8d6951fc2acbd
                                                                • Instruction Fuzzy Hash: 1AA1AB78E05209CFCF15EFA8E99599DBBB1FB88301B104529E415AF369EB306D06CF81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Hq
                                                                • API String ID: 0-1594803414
                                                                • Opcode ID: 7c3c1b61046740873becb3f5ee1bb436bed6650628dfcf2a7727c03e48e1aaaa
                                                                • Instruction ID: 1f250b655ab426e1badd4065bc33b4660edfeb4f7daa00897028f1c567329315
                                                                • Opcode Fuzzy Hash: 7c3c1b61046740873becb3f5ee1bb436bed6650628dfcf2a7727c03e48e1aaaa
                                                                • Instruction Fuzzy Hash: 09218171A001089FDB48EFB8D955AAF7BB6EFC8310F20857AE519D7255DB309E01CB90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Hq
                                                                • API String ID: 0-1594803414
                                                                • Opcode ID: 0b47bcbe6f1c8c774770cecfd562d565b758656a0a0f47edd863daeec1d4e7b2
                                                                • Instruction ID: e81ba938abb41864db7305b474996bd3d720514cb95a3bf3e786f78763843841
                                                                • Opcode Fuzzy Hash: 0b47bcbe6f1c8c774770cecfd562d565b758656a0a0f47edd863daeec1d4e7b2
                                                                • Instruction Fuzzy Hash: 6301DE317002448FDB05EFB8D89569E7BA2EF8A300F60847AE106873A2CA369D46CB40
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c00e97a5744aa6f58a58f82e286b9516cdb638a98f38db7c74075416f85ba25f
                                                                • Instruction ID: 3d811b3930588e2ba98094556cedfc39142da8050f0dd7f4154e582377961a60
                                                                • Opcode Fuzzy Hash: c00e97a5744aa6f58a58f82e286b9516cdb638a98f38db7c74075416f85ba25f
                                                                • Instruction Fuzzy Hash: EA51F772A002059FCB249B79D8C4ABBBBF5EBC9324F14852EE469D7740D631DD018BA0
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d577c2fa50a3bdfc7e0d7b7790f9846707d6fa8ca7337167e55840e31a26729f
                                                                • Instruction ID: ddc7119d3b4ddec88c91d1036950fec52020f3e4ca73d64f213c3973541b59a8
                                                                • Opcode Fuzzy Hash: d577c2fa50a3bdfc7e0d7b7790f9846707d6fa8ca7337167e55840e31a26729f
                                                                • Instruction Fuzzy Hash: 3641CFB4E01248CFDB18DFAAD89499DBBF2BF89310F249429E805BB364DB309945CF14
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6c5f31c0ec8c0914c1d10abd73521834d43178a0912b665ecb875a35e2022c2b
                                                                • Instruction ID: 7863dcd762f21cb83513db033cd79c304fc31a63d63df6b4a4e64bd01cfa39b1
                                                                • Opcode Fuzzy Hash: 6c5f31c0ec8c0914c1d10abd73521834d43178a0912b665ecb875a35e2022c2b
                                                                • Instruction Fuzzy Hash: C531C07106220FCFD2603FA1B9ED67ABBB5FB8F3137446C00E41A90622DB7868C58B55
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 351ef63d4b5cc82d8e982dc5726bf653403aadd1a9768f331863b44d4f8c888a
                                                                • Instruction ID: ff11c85a937949746c9e6aa3b8b0f7e22a5e49b8ff1af6dfe11d4a1b6c81ca85
                                                                • Opcode Fuzzy Hash: 351ef63d4b5cc82d8e982dc5726bf653403aadd1a9768f331863b44d4f8c888a
                                                                • Instruction Fuzzy Hash: CF21C431A002159FCB24DF38C890AAE3BB5EB99350B68C519DD199B394EB31EE05CBC1
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2631853885.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_bdd000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5ee4bfd15ecadfb33f524e923921413c8a8e7ef469dc7097ad22de0c763232dd
                                                                • Instruction ID: 2c4ea605dc3bf5ad68f571c655d1701d66ea0991db9c86f966914baf68c91613
                                                                • Opcode Fuzzy Hash: 5ee4bfd15ecadfb33f524e923921413c8a8e7ef469dc7097ad22de0c763232dd
                                                                • Instruction Fuzzy Hash: 0C21D371504204DFDB14DF14D9D0B26FBA5EB84314F24C5AEE9894B392D336D847CA62
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c79edf17b664d00410c684305cf42242de84307990345fcc700cb79bf9a66689
                                                                • Instruction ID: 5d2f50da445d7e05b5b03ee587c20ace59665eb965ee1d7ab92e61fbd16f060f
                                                                • Opcode Fuzzy Hash: c79edf17b664d00410c684305cf42242de84307990345fcc700cb79bf9a66689
                                                                • Instruction Fuzzy Hash: 0A21D670E042089FCB15EFB9C5903AEB7B2EF85300F1084ADA4156B391DB748A41DF41
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2631853885.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_bdd000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 62bda14e93553681ab86cb6f4da103bbdc396d5759da0f9afe6f51ee88867da6
                                                                • Instruction ID: 4998316c1baac299984f0441154ffcad22463943e23bf96ebfe42b472c737ba1
                                                                • Opcode Fuzzy Hash: 62bda14e93553681ab86cb6f4da103bbdc396d5759da0f9afe6f51ee88867da6
                                                                • Instruction Fuzzy Hash: CE215C755093C09FCB17CF20C9A0715BF71AB46214F28C5DBD8898B6A3D33A980ACB62
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: edfb1c59780fc7ef34b7c310224aaca0464441616a38d37db482b10f1fa5a92d
                                                                • Instruction ID: ed40566f42ccf08307e029fa1a095655efbf054d448976658ba83828289f75f5
                                                                • Opcode Fuzzy Hash: edfb1c59780fc7ef34b7c310224aaca0464441616a38d37db482b10f1fa5a92d
                                                                • Instruction Fuzzy Hash: BA212570C052498FCB11DFB8D8945EDBFF0EF4A301F1845AAD805B7261EB304A85CBA1
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 095c8e27a8e9f14a4838e0de1799ded40a87dde97d37ebdb64ffa06b09e3b63d
                                                                • Instruction ID: 38163a0c7b94b6597dc492a102c5dcd880ac064c043f7d771bb681d7e4269a15
                                                                • Opcode Fuzzy Hash: 095c8e27a8e9f14a4838e0de1799ded40a87dde97d37ebdb64ffa06b09e3b63d
                                                                • Instruction Fuzzy Hash: F9118C367002008FD724DB6AD984A66B7E6EFC8721B208069E15ACF365CB71ED41CB50
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f6b5eb4b83149337872794c94248a6e797e2167c919318e8174aa9e06ae6da85
                                                                • Instruction ID: 1c859b5d857cacf75fa13a6096225376aea91d1b6c8d07319a43b36689ad4c93
                                                                • Opcode Fuzzy Hash: f6b5eb4b83149337872794c94248a6e797e2167c919318e8174aa9e06ae6da85
                                                                • Instruction Fuzzy Hash: 7011A075E002098BCB24EFB9D8C46AEBBF1AF89310B14413AD459E3201DB319C418BE1
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4c93b9f6fe315515c1124f66ce3d0b9dfa86aca056681a4edf917c623d2c189a
                                                                • Instruction ID: 51efd896fdc9aaf49ca925f7f69eea1efd7af61563b75a7c78805b862b55c085
                                                                • Opcode Fuzzy Hash: 4c93b9f6fe315515c1124f66ce3d0b9dfa86aca056681a4edf917c623d2c189a
                                                                • Instruction Fuzzy Hash: DF01B132F043444FDB289B7A889467B7BEBAF88354315853AD905CB7A8FE34CC018750
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 58c207718cb75d0052d25c8edac562ff5bd9ad2947ba3456f3897bd1934782d9
                                                                • Instruction ID: 72cc1ba261ee5c878735f6eb470fd0f331b3f6f5b24fc93ca981846aeb3b0210
                                                                • Opcode Fuzzy Hash: 58c207718cb75d0052d25c8edac562ff5bd9ad2947ba3456f3897bd1934782d9
                                                                • Instruction Fuzzy Hash: AF016232F003144BDB28AB7A585462F7BDBAFC87643154439D905C7758FE70CC018791
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ca070d0b067fac57147425c119904842ec8e1152ae052606e57cbb38690dd858
                                                                • Instruction ID: 25c0229c6f265b2d751f95fd19c5a6276a245442e3e03fdc402e70e2590bd982
                                                                • Opcode Fuzzy Hash: ca070d0b067fac57147425c119904842ec8e1152ae052606e57cbb38690dd858
                                                                • Instruction Fuzzy Hash: 50012B327042045BCB196FB4F85D6AD3FA6EBC5720B24442BE506C7291DE39CD52DBC1
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c7cd26b6a01fde9e4d0f7561fc3172826121b586cf83991fde880de810ca3fc5
                                                                • Instruction ID: 601bac8f7fec78b6ad5635a69409db34a04b237e186534d554ddc2a63cb77e66
                                                                • Opcode Fuzzy Hash: c7cd26b6a01fde9e4d0f7561fc3172826121b586cf83991fde880de810ca3fc5
                                                                • Instruction Fuzzy Hash: 51015275E0020D9FCF14DFA9E8546AE7BB5FBC8310B50442AE92697251DB349D10CBA1
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ab5b3936ee16c646900dda2bf896dbee50ee9fce95d3309c163b9b3b81fd6b93
                                                                • Instruction ID: 96b6703682f72f7bef0ddb368ab75b66f8fbc33b7f8d130970fce0d5315e97a5
                                                                • Opcode Fuzzy Hash: ab5b3936ee16c646900dda2bf896dbee50ee9fce95d3309c163b9b3b81fd6b93
                                                                • Instruction Fuzzy Hash: B70156317002008FD724DB6AD998B26B7E6EFC9721F218069E15ACB365CBB0ED80CB50
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8af5a6a8db2a5723da28d91bef71bdc6eaf83206278edab05fdc8576257ca226
                                                                • Instruction ID: ccc7ed824d3a60023e98b3ce25aecb8bdbd05f75000af122de07ee2722f1c2f1
                                                                • Opcode Fuzzy Hash: 8af5a6a8db2a5723da28d91bef71bdc6eaf83206278edab05fdc8576257ca226
                                                                • Instruction Fuzzy Hash: 3F017175A0051A9FCB54DFA8E8949EE7FB5FB88310B10412AE929D3251D7308D10CB92
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5bfa2ba38a3ff4d2aa1aa5a2855dd1f16570560bff546696a8b33f20a85c74c8
                                                                • Instruction ID: 97087d2a912462ba86f2ac943ebafbb4582bdfc05f83844e06d14e544f85df7d
                                                                • Opcode Fuzzy Hash: 5bfa2ba38a3ff4d2aa1aa5a2855dd1f16570560bff546696a8b33f20a85c74c8
                                                                • Instruction Fuzzy Hash: 09F0E272B005114BCB295B69F8956AEBBA9EFC5330B04007AF108EB351DF31CC028790
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b32fdd287f2635b7b4968e9747fc2ff24c42e9111bff39e9d81f40617387a2d8
                                                                • Instruction ID: ffc5b4e41dc3ecba5844add049d75be006bd3ffd598d9c8e2cc7611396e5ed28
                                                                • Opcode Fuzzy Hash: b32fdd287f2635b7b4968e9747fc2ff24c42e9111bff39e9d81f40617387a2d8
                                                                • Instruction Fuzzy Hash: 2CF0B476E04204AF9B60DFA998815EFBBF5FB88250B14413AE509D3201E7709A0697D1
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cd765359fc36704cee75aca48cf28ca714e51530a87fc583a88f30be2d23ce71
                                                                • Instruction ID: 158420b2e81981b34a044a803d2107391dc82620663966243972249b08152c1b
                                                                • Opcode Fuzzy Hash: cd765359fc36704cee75aca48cf28ca714e51530a87fc583a88f30be2d23ce71
                                                                • Instruction Fuzzy Hash: E1F05E35300205DFC710CF5AD484D6ABBEAFF887257604069E609C7330CB71AC51CB80
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 824287cbd417476f84b268b9cec5451500a3577fe90462b927808bf7cdc4c6e4
                                                                • Instruction ID: 372508a74a26424097c3ac98ce30ea392e9c34e073f4482b13f5c87becf55a1a
                                                                • Opcode Fuzzy Hash: 824287cbd417476f84b268b9cec5451500a3577fe90462b927808bf7cdc4c6e4
                                                                • Instruction Fuzzy Hash: 56E0A579167B428FE3222B60BDBC36ABB75EB1B31BB492C43E05A82471EF7044458B10
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2977999b9ae8f02303b9d8264fe02bbfc21e82f0eca51fe5d59fd6306669f649
                                                                • Instruction ID: 9c3cef6bedcb08ce88929b4a578cc82fd50dbc29904c4fae638236ad21d594a9
                                                                • Opcode Fuzzy Hash: 2977999b9ae8f02303b9d8264fe02bbfc21e82f0eca51fe5d59fd6306669f649
                                                                • Instruction Fuzzy Hash: D0E0D831301205DFC7108F5AE484D9ABBA6FFC8325B504039F618C7230CB728C51CB80
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3f63b9564db09c53254d0722ac9c16fc3c0561bde133732a82884e2e691eeb1e
                                                                • Instruction ID: 91d47a3a93bc0c6bea5c678c5d2eb653b79b1b94dded7860a1223f62d47dc7a4
                                                                • Opcode Fuzzy Hash: 3f63b9564db09c53254d0722ac9c16fc3c0561bde133732a82884e2e691eeb1e
                                                                • Instruction Fuzzy Hash: 6EE00275067B068FE3252B61BDBC73AFB75EB1B31BB906D02A11E82431AF708454CA54
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a4c9021b09e7aa8970b20ceb10756d93838a5558d43f29d3308bc4978862ad3b
                                                                • Instruction ID: 089f6eeb43194924f49d0e72d1bdad8948d230fd1b7567bab0a983cea632a911
                                                                • Opcode Fuzzy Hash: a4c9021b09e7aa8970b20ceb10756d93838a5558d43f29d3308bc4978862ad3b
                                                                • Instruction Fuzzy Hash: 0BE0D831EA03668BCB0297A49C440EE7B349D812117144253C024771D1EB20551AC6D2
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: af9ea9e48b5b4384175317c2d5993d4a386aee139e3b6c8c95fc79e1cc7a7643
                                                                • Instruction ID: 01bee33d49dbe891f419d92e91c8902dac4829102c03bb42200e91b9da9e6017
                                                                • Opcode Fuzzy Hash: af9ea9e48b5b4384175317c2d5993d4a386aee139e3b6c8c95fc79e1cc7a7643
                                                                • Instruction Fuzzy Hash: 46D05B31D2033A57CB10E7A5DC044DFFB38EED5321B514666D51437144FB706659C6E1
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 92825ed7e826f2a4ed811b25677a7254512b3c0aa76e8be73d9b32923621edfa
                                                                • Instruction ID: a7f1b9292fc97c1715b7799e89d9b80cc50e77be5218d93a43d802d29a82df82
                                                                • Opcode Fuzzy Hash: 92825ed7e826f2a4ed811b25677a7254512b3c0aa76e8be73d9b32923621edfa
                                                                • Instruction Fuzzy Hash: EAD0233202020943DA2CBE50DCC7397731CD741306F4043AD5C09D9140F701D41D83C7
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a399c1dcdb0a70be9a2ad9f569876c482aa33cbf33ec322bb888de55e1a77c94
                                                                • Instruction ID: 07189b50a35eabbf54e5c12840c9f21982da470ffc2a4479c81cc88b5a052bcc
                                                                • Opcode Fuzzy Hash: a399c1dcdb0a70be9a2ad9f569876c482aa33cbf33ec322bb888de55e1a77c94
                                                                • Instruction Fuzzy Hash: 79D0C736300118675B051A89B8048AE7B5EF7CD7717048026F91583340CE754D5197D5
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6181960456db0db74d89fcf441b059f74a675beeae218dcc9e6a664db53c4c24
                                                                • Instruction ID: e7065dbc789025f3830f51c042ccc0d4458295eb754535c6a945d81aa8ae24ec
                                                                • Opcode Fuzzy Hash: 6181960456db0db74d89fcf441b059f74a675beeae218dcc9e6a664db53c4c24
                                                                • Instruction Fuzzy Hash: 8FC092A588D3C41FFF2F8770187A099BF20AE17304B2508CFC083DB093E62A99068306
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000011.00000002.2632129197.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_17_2_c60000_VyaPZFtSeDDse.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Xq$Xq$Xq$Xq
                                                                • API String ID: 0-3965792415
                                                                • Opcode ID: b4508eef2beccc2739c2e645b93bdf270a5f58cc4deadfd5d06bf4b3101b3f2c
                                                                • Instruction ID: ad79cde8039c895e759b6de4297e5acf97102cdcc00aba8a12e6320bab1bee14
                                                                • Opcode Fuzzy Hash: b4508eef2beccc2739c2e645b93bdf270a5f58cc4deadfd5d06bf4b3101b3f2c
                                                                • Instruction Fuzzy Hash: 8A317570E1031A4FDF748BA988D53AEB7B6AF84311F1C4065D859A7251EB30CE85DBD2