Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GcA5z6ZWRK.exe

Overview

General Information

Sample name:GcA5z6ZWRK.exe
renamed because original name is a hash value
Original sample name:29af573d5e1b642841691e783db2da86911450d5a24d6c6814a24c84c05202a7.exe
Analysis ID:1587842
MD5:8c44c88488296fc18ae7c99764dde430
SHA1:41b27e11f1a3c98ea76f86249935d205f1665577
SHA256:29af573d5e1b642841691e783db2da86911450d5a24d6c6814a24c84c05202a7
Tags:exeuser-adrian__luca
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
AI detected suspicious sample
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • GcA5z6ZWRK.exe (PID: 8016 cmdline: "C:\Users\user\Desktop\GcA5z6ZWRK.exe" MD5: 8C44C88488296FC18AE7C99764DDE430)
    • InstallUtil.exe (PID: 8108 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • WerFault.exe (PID: 7316 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8108 -s 1148 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1388036536.0000000005220000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      Process Memory Space: GcA5z6ZWRK.exe PID: 8016JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: GcA5z6ZWRK.exe PID: 8016JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: InstallUtil.exe PID: 8108JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.GcA5z6ZWRK.exe.5220000.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

              Data Obfuscation

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\GcA5z6ZWRK.exe, ProcessId: 8016, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bag.vbs
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: GcA5z6ZWRK.exeAvira: detected
              Source: C:\Users\user\AppData\Roaming\bag.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\AppData\Roaming\bag.exeReversingLabs: Detection: 91%
              Source: C:\Users\user\AppData\Roaming\bag.exeVirustotal: Detection: 70%Perma Link
              Source: GcA5z6ZWRK.exeVirustotal: Detection: 70%Perma Link
              Source: GcA5z6ZWRK.exeReversingLabs: Detection: 91%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
              Source: C:\Users\user\AppData\Roaming\bag.exeJoe Sandbox ML: detected
              Source: GcA5z6ZWRK.exeJoe Sandbox ML: detected
              Source: GcA5z6ZWRK.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: GcA5z6ZWRK.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\InstallUtil.pdbE source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: GcA5z6ZWRK.exe, 00000000.00000002.1389890592.0000000005EB0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.00000000016C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: GcA5z6ZWRK.exe, 00000000.00000002.1389890592.0000000005EB0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb( source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb6 source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdbz source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: @go.pdb source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.pdbx source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: HP[o8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.PDB source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: ((.pdb"s( source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ?goC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb8 source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 4x nop then jmp 05F1C190h0_2_05F1C0D0
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 4x nop then jmp 05F1C190h0_2_05F1C0D8
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmp, GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_05F1D998 NtProtectVirtualMemory,0_2_05F1D998
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_05F1D990 NtProtectVirtualMemory,0_2_05F1D990
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_025CBE200_2_025CBE20
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_025C87BF0_2_025C87BF
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_025C7E300_2_025C7E30
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_025C7E210_2_025C7E21
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_05F1A5900_2_05F1A590
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_05F12F780_2_05F12F78
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_05F1A5820_2_05F1A582
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_05F12F770_2_05F12F77
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_05F1CAB00_2_05F1CAB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_01742D602_2_01742D60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_01746B102_2_01746B10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_01742D502_2_01742D50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_017441C02_2_017441C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_017441B92_2_017441B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_033610682_2_03361068
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_033610592_2_03361059
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8108 -s 1148
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002C23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWzvqjmgvaw.exe" vs GcA5z6ZWRK.exe
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1363309740.00000000009EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs GcA5z6ZWRK.exe
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1389890592.0000000005EB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs GcA5z6ZWRK.exe
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1387704032.0000000005140000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJmxinbigz.exe4 vs GcA5z6ZWRK.exe
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs GcA5z6ZWRK.exe
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs GcA5z6ZWRK.exe
              Source: GcA5z6ZWRK.exeBinary or memory string: OriginalFilenameJmxinbigz.exe4 vs GcA5z6ZWRK.exe
              Source: GcA5z6ZWRK.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: GcA5z6ZWRK.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: bag.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: classification engineClassification label: mal100.expl.evad.winEXE@4/3@0/0
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bag.vbsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7316:64:WilError_03
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\4c56e911-5e03-4d16-97ae-efa274dd0c7dJump to behavior
              Source: GcA5z6ZWRK.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: GcA5z6ZWRK.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: GcA5z6ZWRK.exeVirustotal: Detection: 70%
              Source: GcA5z6ZWRK.exeReversingLabs: Detection: 91%
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeFile read: C:\Users\user\Desktop\GcA5z6ZWRK.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\GcA5z6ZWRK.exe "C:\Users\user\Desktop\GcA5z6ZWRK.exe"
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8108 -s 1148
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: GcA5z6ZWRK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: GcA5z6ZWRK.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: GcA5z6ZWRK.exeStatic file information: File size 1361408 > 1048576
              Source: GcA5z6ZWRK.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x14bc00
              Source: GcA5z6ZWRK.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\InstallUtil.pdbE source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: GcA5z6ZWRK.exe, 00000000.00000002.1389890592.0000000005EB0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.00000000016C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: GcA5z6ZWRK.exe, 00000000.00000002.1389890592.0000000005EB0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb( source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb6 source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdbz source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: @go.pdb source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.pdbx source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: HP[o8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.PDB source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: ((.pdb"s( source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606999082.0000000001619000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ?goC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb8 source: InstallUtil.exe, 00000002.00000002.2606677995.0000000001368000.00000004.00000010.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 0.2.GcA5z6ZWRK.exe.5220000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1388036536.0000000005220000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: GcA5z6ZWRK.exe PID: 8016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8108, type: MEMORYSTR
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_025C7B8B push ds; retf 0_2_025C7B9A
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeCode function: 0_2_05F12F6A push ss; retf 0_2_05F12F76
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_033643B8 push edx; iretd 2_2_033643BB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_03364801 push es; retf 2_2_03364807
              Source: GcA5z6ZWRK.exeStatic PE information: section name: .text entropy: 7.999700185013848
              Source: bag.exe.0.drStatic PE information: section name: .text entropy: 7.999700185013848
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeFile created: C:\Users\user\AppData\Roaming\bag.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bag.vbsJump to dropped file
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bag.vbsJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bag.vbsJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: GcA5z6ZWRK.exe PID: 8016, type: MEMORYSTR
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: EXPLORER SBIEDLL.DLL!CUCKOOMON.DLL"WIN32_PROCESS.HANDLE='{0}'#PARENTPROCESSID$CMD%SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE&VERSION'SERIALNUMBER)VMWARE|VIRTUAL|A M I|XEN*SELECT * FROM WIN32_COMPUTERSYSTEM+MANUFACTURER,MODEL-MICROSOFT|VMWARE|VIRTUAL.JOHN/ANNA0XXXXXXXX
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLP
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory allocated: 2580000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory allocated: 2710000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory allocated: 4710000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1740000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 3420000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1980000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:Microsoft|VMWare|Virtual
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:VMware|VIRTUAL|A M I|Xen
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
              Source: GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: explorer SbieDll.dll!cuckoomon.dll"win32_process.handle='{0}'#ParentProcessId$cmd%select * from Win32_BIOS8Unexpected WMI query failure&version'SerialNumber)VMware|VIRTUAL|A M I|Xen*select * from Win32_ComputerSystem+manufacturer,model-Microsoft|VMWare|Virtual.john/anna0xxxxxxxx
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 480000Jump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 482000Jump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 108F008Jump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeQueries volume information: C:\Users\user\Desktop\GcA5z6ZWRK.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\GcA5z6ZWRK.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid Accounts2
              Windows Management Instrumentation
              1
              Scripting
              211
              Process Injection
              1
              Masquerading
              OS Credential Dumping221
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Registry Run Keys / Startup Folder
              2
              Registry Run Keys / Startup Folder
              3
              Virtualization/Sandbox Evasion
              LSASS Memory3
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
              Process Injection
              NTDS32
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
              Obfuscated Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Software Packing
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              GcA5z6ZWRK.exe70%VirustotalBrowse
              GcA5z6ZWRK.exe92%ReversingLabsByteCode-MSIL.Trojan.Crysan
              GcA5z6ZWRK.exe100%AviraTR/Dropper.Gen
              GcA5z6ZWRK.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\bag.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\bag.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\bag.exe92%ReversingLabsByteCode-MSIL.Trojan.Crysan
              C:\Users\user\AppData\Roaming\bag.exe70%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://github.com/mgravell/protobuf-netGcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpfalse
                  high
                  https://github.com/mgravell/protobuf-netiGcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpfalse
                    high
                    https://stackoverflow.com/q/14436606/23354GcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmp, GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpfalse
                      high
                      https://github.com/mgravell/protobuf-netJGcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameGcA5z6ZWRK.exe, 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/11564914/23354;GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/2152978/23354GcA5z6ZWRK.exe, 00000000.00000002.1388931153.0000000005340000.00000004.08000000.00040000.00000000.sdmpfalse
                              high
                              No contacted IP infos
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1587842
                              Start date and time:2025-01-10 18:28:20 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 9s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:10
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:GcA5z6ZWRK.exe
                              renamed because original name is a hash value
                              Original Sample Name:29af573d5e1b642841691e783db2da86911450d5a24d6c6814a24c84c05202a7.exe
                              Detection:MAL
                              Classification:mal100.expl.evad.winEXE@4/3@0/0
                              EGA Information:
                              • Successful, ratio: 50%
                              HCA Information:
                              • Successful, ratio: 94%
                              • Number of executed functions: 64
                              • Number of non-executed functions: 6
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target InstallUtil.exe, PID 8108 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              TimeTypeDescription
                              18:29:23AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bag.vbs
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              s-part-0017.t-0009.t-msedge.netUnconfirmed 287374.emlGet hashmaliciousUnknownBrowse
                              • 13.107.246.45
                              https://www.depoqq.win/genoGet hashmaliciousUnknownBrowse
                              • 13.107.246.45
                              17048156412338914445.jsGet hashmaliciousStrela DownloaderBrowse
                              • 13.107.246.45
                              251443863021115246.jsGet hashmaliciousStrela DownloaderBrowse
                              • 13.107.246.45
                              12662108703247616042.jsGet hashmaliciousStrela DownloaderBrowse
                              • 13.107.246.45
                              wN7EPNiHSM.exeGet hashmaliciousFormBookBrowse
                              • 13.107.246.45
                              334130052300215064.jsGet hashmaliciousStrela DownloaderBrowse
                              • 13.107.246.45
                              http://infarmbureau.comGet hashmaliciousUnknownBrowse
                              • 13.107.246.45
                              489131343024428850.jsGet hashmaliciousStrela DownloaderBrowse
                              • 13.107.246.45
                              zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                              • 13.107.246.45
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\GcA5z6ZWRK.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):77
                              Entropy (8bit):4.74554721719143
                              Encrypted:false
                              SSDEEP:3:FER/n0eFHHoMEREaKC5k9dAnHn:FER/lFHIFiaZ5km
                              MD5:2425098FB2AD39B91CA315DBDE0EC345
                              SHA1:E753C583F2E7AF535364FE8A71707181D8C28419
                              SHA-256:26E983C048E4C71EA62945557B16FA5ED2026D79E89AEAC7202A99711DAA0EEA
                              SHA-512:55ED42FD61468C1DA02EE35063EF6DBC20A4D84ACAF2B2A8D73B22918D80431C98217EF982D3A5B151E4CB66077FB3112D7A8E7110A250147CBC51345410D7BE
                              Malicious:true
                              Reputation:low
                              Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\bag.exe"""
                              Process:C:\Users\user\Desktop\GcA5z6ZWRK.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):1361408
                              Entropy (8bit):7.99918044482795
                              Encrypted:true
                              SSDEEP:24576:TDLMJn8nEIEZRPylkbEhMw9s6dGVoMlZnjUPqFNNzYzdynHUdz9zv7yuJQTry9iP:TDIN8nE7Oa2/dgpHj7ShoHUdJz5J6W9+
                              MD5:8C44C88488296FC18AE7C99764DDE430
                              SHA1:41B27E11F1A3C98EA76F86249935D205F1665577
                              SHA-256:29AF573D5E1B642841691E783DB2DA86911450D5A24D6C6814A24C84C05202A7
                              SHA-512:D6ADB7AA356E9E770B15159D3DD92B8A65CB6C276BC2294298491720F362B0B37D8AD8F66DE0A1FD4D3AE27587073EFA383B12E6BB2BDDB5CF89FD043F4C1541
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 92%
                              • Antivirus: Virustotal, Detection: 70%, Browse
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{.cg................................. ........@.. ....................... ............`.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........................!...............................................($...*.~....:....r...p.....(%...o&...s'........~....*.~....*.......*j(....r...p~....o(...t....*..&...(%....r...p().........o*...&*.0............8.......(..........&...9....s......r...p(....o.....r3..p(....o.....o........io...........9.....o.....(.....o.......(....:j....o....(...+........83.......o....o ...rM..p(!...9........o......8.......X......o"...2....(#...:......(......X....?....*..................
                              Process:C:\Users\user\Desktop\GcA5z6ZWRK.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:[ZoneTransfer]....ZoneId=0
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.99918044482795
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:GcA5z6ZWRK.exe
                              File size:1'361'408 bytes
                              MD5:8c44c88488296fc18ae7c99764dde430
                              SHA1:41b27e11f1a3c98ea76f86249935d205f1665577
                              SHA256:29af573d5e1b642841691e783db2da86911450d5a24d6c6814a24c84c05202a7
                              SHA512:d6adb7aa356e9e770b15159d3dd92b8a65cb6c276bc2294298491720f362b0b37d8ad8f66de0a1fd4d3ae27587073efa383b12e6bb2bddb5cf89fd043f4c1541
                              SSDEEP:24576:TDLMJn8nEIEZRPylkbEhMw9s6dGVoMlZnjUPqFNNzYzdynHUdz9zv7yuJQTry9iP:TDIN8nE7Oa2/dgpHj7ShoHUdJz5J6W9+
                              TLSH:7F55331C4A1456B4DE9E8DF5EEB17D128A1A93CC18A2B73C0C7726BE1363493BD35CA1
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{.cg................................. ........@.. ....................... ............`................................
                              Icon Hash:90cececece8e8eb0
                              Entrypoint:0x54dace
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x6763A77B [Thu Dec 19 04:56:27 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x14da780x53.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x14e0000x5a6.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1500000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x14bad40x14bc00a935e602e90576307fa3f092b6f026e6False0.9991500153070837data7.999700185013848IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x14e0000x5a60x6006aefd71f938a57eba7f97a30f6edc182False0.41796875data4.0991029503669845IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x1500000xc0x200d6317c53578daa34b7eb47b3aac2f7f4False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x14e0a00x31cdata0.43090452261306533
                              RT_MANIFEST0x14e3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 10, 2025 18:29:15.788992882 CET1.1.1.1192.168.2.100x70daNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                              Jan 10, 2025 18:29:15.788992882 CET1.1.1.1192.168.2.100x70daNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:12:29:19
                              Start date:10/01/2025
                              Path:C:\Users\user\Desktop\GcA5z6ZWRK.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\GcA5z6ZWRK.exe"
                              Imagebase:0x2f0000
                              File size:1'361'408 bytes
                              MD5 hash:8C44C88488296FC18AE7C99764DDE430
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1388036536.0000000005220000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1365927589.0000000002711000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:12:29:21
                              Start date:10/01/2025
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              Imagebase:0xfd0000
                              File size:42'064 bytes
                              MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:5
                              Start time:12:29:23
                              Start date:10/01/2025
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8108 -s 1148
                              Imagebase:0xa90000
                              File size:483'680 bytes
                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:12.9%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:1.3%
                                Total number of Nodes:228
                                Total number of Limit Nodes:16
                                execution_graph 17920 5f118e6 17921 5f118ec 17920->17921 17925 5f141f0 17921->17925 17929 5f141e4 17921->17929 17927 5f1424c CopyFileA 17925->17927 17928 5f1437d 17927->17928 17931 5f1424c CopyFileA 17929->17931 17932 5f1437d 17931->17932 17916 5f1d998 17917 5f1d9e7 NtProtectVirtualMemory 17916->17917 17919 5f1da5f 17917->17919 17933 5f14de8 17934 5f14dfd 17933->17934 17942 5f14fe0 17934->17942 17946 5f14e28 17934->17946 17950 5f14e19 17934->17950 17954 5f15024 17934->17954 17958 5f14f32 17934->17958 17962 5f14eb3 17934->17962 17935 5f14e13 17944 5f14e85 17942->17944 17943 5f1501d 17943->17935 17944->17943 17966 5f167a8 17944->17966 17947 5f14e52 17946->17947 17948 5f1501d 17947->17948 17949 5f167a8 8 API calls 17947->17949 17948->17935 17949->17947 17952 5f14e28 17950->17952 17951 5f1501d 17951->17935 17952->17951 17953 5f167a8 8 API calls 17952->17953 17953->17952 17956 5f14e85 17954->17956 17955 5f1501d 17955->17935 17956->17955 17957 5f167a8 8 API calls 17956->17957 17957->17956 17960 5f14e85 17958->17960 17959 5f1501d 17959->17935 17960->17959 17961 5f167a8 8 API calls 17960->17961 17961->17960 17964 5f14e85 17962->17964 17963 5f1501d 17963->17935 17964->17963 17965 5f167a8 8 API calls 17964->17965 17965->17964 17967 5f167b2 17966->17967 17969 5f167ef 17966->17969 17975 5f167a8 8 API calls 17967->17975 17980 5f169e3 17967->17980 17984 5f16ca2 17967->17984 17988 5f16a1c 17967->17988 17992 5f16d36 17967->17992 17996 5f16808 17967->17996 18000 5f169d9 17967->18000 18004 5f16c1c 17967->18004 18008 5f167f7 17967->18008 17968 5f168f9 17968->17944 17969->17944 17969->17968 18012 5f17080 17969->18012 17975->17969 17982 5f1686d 17980->17982 17981 5f168f9 17981->17969 17982->17981 17983 5f17080 8 API calls 17982->17983 17983->17982 17986 5f1686d 17984->17986 17985 5f168f9 17985->17969 17986->17985 17987 5f17080 8 API calls 17986->17987 17987->17986 17990 5f1686d 17988->17990 17989 5f168f9 17989->17969 17990->17989 17991 5f17080 8 API calls 17990->17991 17991->17990 17994 5f1686d 17992->17994 17993 5f168f9 17993->17969 17994->17993 17995 5f17080 8 API calls 17994->17995 17995->17994 17998 5f1680c 17996->17998 17997 5f168f9 17997->17969 17998->17997 17999 5f17080 8 API calls 17998->17999 17999->17998 18002 5f1686d 18000->18002 18001 5f168f9 18001->17969 18002->18001 18003 5f17080 8 API calls 18002->18003 18003->18002 18006 5f1686d 18004->18006 18005 5f168f9 18005->17969 18006->18005 18007 5f17080 8 API calls 18006->18007 18007->18006 18010 5f16802 18008->18010 18009 5f168f9 18009->17969 18010->18009 18011 5f17080 8 API calls 18010->18011 18011->18010 18013 5f170a5 18012->18013 18020 5f170c7 18013->18020 18024 5f174fb 18013->18024 18029 5f18197 18013->18029 18034 5f17cb0 18013->18034 18039 5f17b6d 18013->18039 18044 5f174ab 18013->18044 18049 5f17727 18013->18049 18055 5f177a2 18013->18055 18060 5f18040 18013->18060 18065 5f173dc 18013->18065 18020->17969 18025 5f1750a 18024->18025 18070 5f1fbc0 18025->18070 18074 5f1fbb9 18025->18074 18026 5f1715b 18026->18020 18030 5f181a1 18029->18030 18078 5f1f4b0 18030->18078 18082 5f1f4b8 18030->18082 18031 5f1823d 18031->18020 18035 5f17cbf 18034->18035 18037 5f1fbc0 WriteProcessMemory 18035->18037 18038 5f1fbb9 WriteProcessMemory 18035->18038 18036 5f1715b 18036->18020 18037->18036 18038->18036 18040 5f17b7c 18039->18040 18086 5f1ee00 18040->18086 18090 5f1edf8 18040->18090 18041 5f17ba8 18045 5f174af 18044->18045 18046 5f1715b 18045->18046 18047 5f1fbc0 WriteProcessMemory 18045->18047 18048 5f1fbb9 WriteProcessMemory 18045->18048 18046->18020 18047->18046 18048->18046 18051 5f17731 18049->18051 18050 5f1715b 18050->18020 18051->18050 18053 5f1f4b0 VirtualAllocEx 18051->18053 18054 5f1f4b8 VirtualAllocEx 18051->18054 18052 5f1823d 18052->18020 18053->18052 18054->18052 18056 5f177a8 18055->18056 18058 5f1fbc0 WriteProcessMemory 18056->18058 18059 5f1fbb9 WriteProcessMemory 18056->18059 18057 5f1715b 18057->18020 18058->18057 18059->18057 18061 5f1804a 18060->18061 18062 5f1715b 18060->18062 18063 5f1ee00 Wow64SetThreadContext 18061->18063 18064 5f1edf8 Wow64SetThreadContext 18061->18064 18062->18020 18063->18062 18064->18062 18066 5f173f4 18065->18066 18094 5f18910 18066->18094 18114 5f18900 18066->18114 18067 5f1740c 18071 5f1fc0c WriteProcessMemory 18070->18071 18073 5f1fca5 18071->18073 18073->18026 18075 5f1fbc0 WriteProcessMemory 18074->18075 18077 5f1fca5 18075->18077 18077->18026 18079 5f1f4b8 VirtualAllocEx 18078->18079 18081 5f1f574 18079->18081 18081->18031 18083 5f1f4fc VirtualAllocEx 18082->18083 18085 5f1f574 18083->18085 18085->18031 18087 5f1ee49 Wow64SetThreadContext 18086->18087 18089 5f1eec1 18087->18089 18089->18041 18091 5f1ee00 Wow64SetThreadContext 18090->18091 18093 5f1eec1 18091->18093 18093->18041 18095 5f18927 18094->18095 18108 5f18949 18095->18108 18134 5f18f6b 18095->18134 18138 5f191e8 18095->18138 18142 5f18fc6 18095->18142 18146 5f18f04 18095->18146 18150 5f18980 18095->18150 18154 5f18cc0 18095->18154 18158 5f1921d 18095->18158 18162 5f189fd 18095->18162 18166 5f1919b 18095->18166 18170 5f18a16 18095->18170 18174 5f192d5 18095->18174 18178 5f19375 18095->18178 18182 5f18c75 18095->18182 18186 5f18ad5 18095->18186 18190 5f18b71 18095->18190 18194 5f18971 18095->18194 18198 5f18b8c 18095->18198 18108->18067 18115 5f18910 18114->18115 18116 5f18971 2 API calls 18115->18116 18117 5f18b71 2 API calls 18115->18117 18118 5f18ad5 2 API calls 18115->18118 18119 5f18c75 2 API calls 18115->18119 18120 5f19375 2 API calls 18115->18120 18121 5f192d5 2 API calls 18115->18121 18122 5f18a16 2 API calls 18115->18122 18123 5f1919b 2 API calls 18115->18123 18124 5f189fd 2 API calls 18115->18124 18125 5f1921d 2 API calls 18115->18125 18126 5f18cc0 2 API calls 18115->18126 18127 5f18980 2 API calls 18115->18127 18128 5f18949 18115->18128 18129 5f18f04 2 API calls 18115->18129 18130 5f18fc6 2 API calls 18115->18130 18131 5f191e8 2 API calls 18115->18131 18132 5f18f6b 2 API calls 18115->18132 18133 5f18b8c 2 API calls 18115->18133 18116->18128 18117->18128 18118->18128 18119->18128 18120->18128 18121->18128 18122->18128 18123->18128 18124->18128 18125->18128 18126->18128 18127->18128 18128->18067 18129->18128 18130->18128 18131->18128 18132->18128 18133->18128 18135 5f189e4 18134->18135 18202 5f1e550 18135->18202 18206 5f1e544 18135->18206 18139 5f189e4 18138->18139 18140 5f1e550 CreateProcessA 18139->18140 18141 5f1e544 CreateProcessA 18139->18141 18140->18139 18141->18139 18143 5f189e4 18142->18143 18144 5f1e550 CreateProcessA 18143->18144 18145 5f1e544 CreateProcessA 18143->18145 18144->18143 18145->18143 18147 5f189e4 18146->18147 18148 5f1e550 CreateProcessA 18147->18148 18149 5f1e544 CreateProcessA 18147->18149 18148->18147 18149->18147 18151 5f189b3 18150->18151 18152 5f1e550 CreateProcessA 18151->18152 18153 5f1e544 CreateProcessA 18151->18153 18152->18151 18153->18151 18155 5f189e4 18154->18155 18155->18154 18156 5f1e550 CreateProcessA 18155->18156 18157 5f1e544 CreateProcessA 18155->18157 18156->18155 18157->18155 18159 5f189e4 18158->18159 18160 5f1e550 CreateProcessA 18159->18160 18161 5f1e544 CreateProcessA 18159->18161 18160->18159 18161->18159 18163 5f189e4 18162->18163 18164 5f1e550 CreateProcessA 18163->18164 18165 5f1e544 CreateProcessA 18163->18165 18164->18163 18165->18163 18167 5f189e4 18166->18167 18168 5f1e550 CreateProcessA 18167->18168 18169 5f1e544 CreateProcessA 18167->18169 18168->18167 18169->18167 18171 5f189e4 18170->18171 18172 5f1e550 CreateProcessA 18171->18172 18173 5f1e544 CreateProcessA 18171->18173 18172->18171 18173->18171 18175 5f189e4 18174->18175 18176 5f1e550 CreateProcessA 18175->18176 18177 5f1e544 CreateProcessA 18175->18177 18176->18175 18177->18175 18179 5f189e4 18178->18179 18180 5f1e550 CreateProcessA 18179->18180 18181 5f1e544 CreateProcessA 18179->18181 18180->18179 18181->18179 18183 5f189e4 18182->18183 18184 5f1e550 CreateProcessA 18183->18184 18185 5f1e544 CreateProcessA 18183->18185 18184->18183 18185->18183 18189 5f189e4 18186->18189 18187 5f1e550 CreateProcessA 18187->18189 18188 5f1e544 CreateProcessA 18188->18189 18189->18187 18189->18188 18191 5f189e4 18190->18191 18192 5f1e550 CreateProcessA 18191->18192 18193 5f1e544 CreateProcessA 18191->18193 18192->18191 18193->18191 18195 5f18980 18194->18195 18196 5f1e550 CreateProcessA 18195->18196 18197 5f1e544 CreateProcessA 18195->18197 18196->18195 18197->18195 18199 5f189e4 18198->18199 18200 5f1e550 CreateProcessA 18199->18200 18201 5f1e544 CreateProcessA 18199->18201 18200->18199 18201->18199 18205 5f1e5d0 CreateProcessA 18202->18205 18204 5f1e7cc 18205->18204 18207 5f1e5d0 CreateProcessA 18206->18207 18209 5f1e7cc 18207->18209

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 117 25cbe20-25cbe41 118 25cbe48-25cbf2f 117->118 119 25cbe43 117->119 121 25cbf35-25cc076 call 25c8370 118->121 122 25cc631-25cc659 118->122 119->118 168 25cc07c-25cc0d7 121->168 169 25cc5fa-25cc624 121->169 125 25ccd5f-25ccd68 122->125 126 25ccd6e-25ccd85 125->126 127 25cc667-25cc671 125->127 129 25cc678-25cc76c call 25c8370 127->129 130 25cc673 127->130 150 25cc76e-25cc77a 129->150 151 25cc796 129->151 130->129 153 25cc77c-25cc782 150->153 154 25cc784-25cc78a 150->154 155 25cc79c-25cc7bc 151->155 157 25cc794 153->157 154->157 160 25cc81c-25cc89c 155->160 161 25cc7be-25cc817 155->161 157->155 182 25cc89e-25cc8f1 160->182 183 25cc8f3-25cc936 call 25c8370 160->183 172 25ccd5c 161->172 176 25cc0dc-25cc0e7 168->176 177 25cc0d9 168->177 179 25cc62e 169->179 180 25cc626 169->180 172->125 181 25cc50f-25cc515 176->181 177->176 179->122 180->179 184 25cc0ec-25cc10a 181->184 185 25cc51b-25cc597 call 25c03ac 181->185 212 25cc941-25cc94a 182->212 183->212 188 25cc10c-25cc110 184->188 189 25cc161-25cc176 184->189 228 25cc5e4-25cc5ea 185->228 188->189 194 25cc112-25cc11d 188->194 192 25cc17d-25cc193 189->192 193 25cc178 189->193 198 25cc19a-25cc1b1 192->198 199 25cc195 192->199 193->192 200 25cc153-25cc159 194->200 204 25cc1b8-25cc1ce 198->204 205 25cc1b3 198->205 199->198 202 25cc11f-25cc123 200->202 203 25cc15b-25cc15c 200->203 206 25cc129-25cc141 202->206 207 25cc125 202->207 211 25cc1df-25cc24a 203->211 208 25cc1d5-25cc1dc 204->208 209 25cc1d0 204->209 205->204 213 25cc148-25cc150 206->213 214 25cc143 206->214 207->206 208->211 209->208 215 25cc24c-25cc258 211->215 216 25cc25e-25cc413 211->216 218 25cc9aa-25cc9b9 212->218 213->200 214->213 215->216 226 25cc415-25cc419 216->226 227 25cc477-25cc48c 216->227 219 25cc94c-25cc974 218->219 220 25cc9bb-25cca43 218->220 223 25cc97b-25cc9a4 219->223 224 25cc976 219->224 256 25ccbbc-25ccbc8 220->256 223->218 224->223 226->227 234 25cc41b-25cc42a 226->234 232 25cc48e 227->232 233 25cc493-25cc4b4 227->233 230 25cc5ec-25cc5f2 228->230 231 25cc599-25cc5e1 228->231 230->169 231->228 232->233 235 25cc4bb-25cc4da 233->235 236 25cc4b6 233->236 238 25cc469-25cc46f 234->238 242 25cc4dc 235->242 243 25cc4e1-25cc501 235->243 236->235 240 25cc42c-25cc430 238->240 241 25cc471-25cc472 238->241 247 25cc43a-25cc45b 240->247 248 25cc432-25cc436 240->248 245 25cc50c 241->245 242->243 249 25cc508 243->249 250 25cc503 243->250 245->181 251 25cc45d 247->251 252 25cc462-25cc466 247->252 248->247 249->245 250->249 251->252 252->238 257 25ccbce-25ccc29 256->257 258 25cca48-25cca51 256->258 273 25ccc2b-25ccc5e 257->273 274 25ccc60-25ccc8a 257->274 259 25cca5a-25ccbb0 258->259 260 25cca53 258->260 277 25ccbb6 259->277 260->259 263 25ccb2f-25ccb6f 260->263 264 25ccaea-25ccb2a 260->264 265 25ccaa5-25ccae5 260->265 266 25cca60-25ccaa0 260->266 263->277 264->277 265->277 266->277 282 25ccc93-25ccd26 273->282 274->282 277->256 286 25ccd2d-25ccd4d 282->286 286->172
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: !"AQ$TJq
                                • API String ID: 0-3212949648
                                • Opcode ID: 763bdca81b56ac009977ea71888bb6ba839ace7232a69022602674d7bd579016
                                • Instruction ID: 587eae3524561f3727a0dc67bcec34bed92f7e0444aeb2ffc4a5f522572fc97c
                                • Opcode Fuzzy Hash: 763bdca81b56ac009977ea71888bb6ba839ace7232a69022602674d7bd579016
                                • Instruction Fuzzy Hash: 54A2C275A00228CFDB65CF69C884A99BBB2FF89305F1581E9D50DAB321DB319E81CF40

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 288 5f1a590-5f1a5b1 289 5f1a5b3 288->289 290 5f1a5b8-5f1a648 call 5f1b0e2 288->290 289->290 295 5f1a64e-5f1a68b 290->295 297 5f1a69a 295->297 298 5f1a68d-5f1a698 295->298 299 5f1a6a4-5f1a7bf 297->299 298->299 310 5f1a7d1-5f1a7fc 299->310 311 5f1a7c1-5f1a7c7 299->311 312 5f1afbf-5f1afdb 310->312 311->310 313 5f1a801-5f1a964 call 5f19570 312->313 314 5f1afe1-5f1affc 312->314 325 5f1a976-5f1ab02 call 5f16f38 call 5f13eb0 313->325 326 5f1a966-5f1a96c 313->326 338 5f1ab04-5f1ab08 325->338 339 5f1ab67-5f1ab71 325->339 326->325 340 5f1ab10-5f1ab62 338->340 341 5f1ab0a-5f1ab0b 338->341 342 5f1ad98-5f1adb7 339->342 343 5f1ae3d-5f1aea8 340->343 341->343 344 5f1ab76-5f1acbc call 5f19570 342->344 345 5f1adbd-5f1ade7 342->345 362 5f1aeba-5f1af05 343->362 363 5f1aeaa-5f1aeb0 343->363 374 5f1ad91-5f1ad92 344->374 375 5f1acc2-5f1ad8e call 5f19570 344->375 351 5f1ade9-5f1ae37 345->351 352 5f1ae3a-5f1ae3b 345->352 351->352 352->343 365 5f1afa4-5f1afbc 362->365 366 5f1af0b-5f1afa3 362->366 363->362 365->312 366->365 374->342 375->374
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: fq$8
                                • API String ID: 0-1651916650
                                • Opcode ID: 9852e5b8985bab011bbf0d5e44a9d89e7788488ee65c8487182fe952f3c7af92
                                • Instruction ID: 07c9db0cc8707478d1c4bc126263037b3781799c42e17a2e8ef47c761d4f8c80
                                • Opcode Fuzzy Hash: 9852e5b8985bab011bbf0d5e44a9d89e7788488ee65c8487182fe952f3c7af92
                                • Instruction Fuzzy Hash: B652D575E016288FDB65DF69C850AD9B7B2FB89300F1085EAD949A7344DB34AE81CF90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 383 5f1a582-5f1a5b1 384 5f1a5b3 383->384 385 5f1a5b8-5f1a648 call 5f1b0e2 383->385 384->385 390 5f1a64e-5f1a68b 385->390 392 5f1a69a 390->392 393 5f1a68d-5f1a698 390->393 394 5f1a6a4-5f1a7bf 392->394 393->394 405 5f1a7d1-5f1a7fc 394->405 406 5f1a7c1-5f1a7c7 394->406 407 5f1afbf-5f1afdb 405->407 406->405 408 5f1a801-5f1a964 call 5f19570 407->408 409 5f1afe1-5f1affc 407->409 420 5f1a976-5f1ab02 call 5f16f38 call 5f13eb0 408->420 421 5f1a966-5f1a96c 408->421 433 5f1ab04-5f1ab08 420->433 434 5f1ab67-5f1ab71 420->434 421->420 435 5f1ab10-5f1ab62 433->435 436 5f1ab0a-5f1ab0b 433->436 437 5f1ad98-5f1adb7 434->437 438 5f1ae3d-5f1aea8 435->438 436->438 439 5f1ab76-5f1acbc call 5f19570 437->439 440 5f1adbd-5f1ade7 437->440 457 5f1aeba-5f1af05 438->457 458 5f1aeaa-5f1aeb0 438->458 469 5f1ad91-5f1ad92 439->469 470 5f1acc2-5f1ad8e call 5f19570 439->470 446 5f1ade9-5f1ae37 440->446 447 5f1ae3a-5f1ae3b 440->447 446->447 447->438 460 5f1afa4-5f1afbc 457->460 461 5f1af0b-5f1afa3 457->461 458->457 460->407 461->460 469->437 470->469
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: fq$h
                                • API String ID: 0-152923806
                                • Opcode ID: 1cd4d6c0936d152fcb95ec07ef9ceb3665dd25ab9486b83afcd3de3024b6930b
                                • Instruction ID: 9c3fdc412a99e97c9bbfc91a392a40dc4eb3bb6bc81701542a5bf604293cf754
                                • Opcode Fuzzy Hash: 1cd4d6c0936d152fcb95ec07ef9ceb3665dd25ab9486b83afcd3de3024b6930b
                                • Instruction Fuzzy Hash: BB710A75D016288BEB64DF69C840BDAB7B2FF89300F1082AAC90DB7254DB345E81CF90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 711 5f1d990-5f1da5d NtProtectVirtualMemory 715 5f1da66-5f1dab0 711->715 716 5f1da5f-5f1da65 711->716 716->715
                                APIs
                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05F1DA4D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: MemoryProtectVirtual
                                • String ID:
                                • API String ID: 2706961497-0
                                • Opcode ID: 72f5c7b685040af9205005c8023849ac6a4c30670bb7a385d1e8fde87ba6cdc7
                                • Instruction ID: 81663ef0476a7f9ca4d5b8b03f3a0caa473b11a1a4135ed8d2ee0ea4112e0350
                                • Opcode Fuzzy Hash: 72f5c7b685040af9205005c8023849ac6a4c30670bb7a385d1e8fde87ba6cdc7
                                • Instruction Fuzzy Hash: 84418AB5D042589FCF10CFAAD880ADEFBB5FB49310F14942AE819B7210D779A946CF64

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 721 5f1d998-5f1da5d NtProtectVirtualMemory 724 5f1da66-5f1dab0 721->724 725 5f1da5f-5f1da65 721->725 725->724
                                APIs
                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05F1DA4D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: MemoryProtectVirtual
                                • String ID:
                                • API String ID: 2706961497-0
                                • Opcode ID: 19481c8dbbec073567e962f3d428ed00405ebfd0950e6b355b1e9662ab1b103d
                                • Instruction ID: 594150d3b1835c08fc7ba4e6d8963e4ed3bc5c3de5cae16fdd0b1c3da95f7d1c
                                • Opcode Fuzzy Hash: 19481c8dbbec073567e962f3d428ed00405ebfd0950e6b355b1e9662ab1b103d
                                • Instruction Fuzzy Hash: EB418AB5D042589FCF10CFAAD880ADEFBB5BB49310F14942AE815B7200D735A945CF64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: q]\#
                                • API String ID: 0-583714348
                                • Opcode ID: de6c101cd8e659a33ae5dc08edd817915f4a10a03c488efb927b23e0d127c046
                                • Instruction ID: 81d2575f458fb6fc8c513072e72b06398f07598396c1cdabe774a3b94a45f7a0
                                • Opcode Fuzzy Hash: de6c101cd8e659a33ae5dc08edd817915f4a10a03c488efb927b23e0d127c046
                                • Instruction Fuzzy Hash: 4BC1F271E04218CFDB54DFAAD444BADBBF6FF49304F1085AAD809AB285DB785885CF18
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: q]\#
                                • API String ID: 0-583714348
                                • Opcode ID: 8a423b2d38bbc503a1c41fddaabac2a160ed599320ba2f860a352ffd1cbf792b
                                • Instruction ID: a8fe6d8ffa65e062ba9e0d09db2b1af057ea43dcf2738483cff4d5ab95f23c1f
                                • Opcode Fuzzy Hash: 8a423b2d38bbc503a1c41fddaabac2a160ed599320ba2f860a352ffd1cbf792b
                                • Instruction Fuzzy Hash: FEC1F175E04208CFDB54DFAAD444BADBBF2FF49304F1085AAD809AB285DB785985CF14

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 518 5f1e544-5f1e5e2 520 5f1e5e4-5f1e5fb 518->520 521 5f1e62b-5f1e653 518->521 520->521 526 5f1e5fd-5f1e602 520->526 524 5f1e655-5f1e669 521->524 525 5f1e699-5f1e6ef 521->525 524->525 536 5f1e66b-5f1e670 524->536 534 5f1e6f1-5f1e705 525->534 535 5f1e735-5f1e7ca CreateProcessA 525->535 527 5f1e625-5f1e628 526->527 528 5f1e604-5f1e60e 526->528 527->521 531 5f1e610 528->531 532 5f1e612-5f1e621 528->532 531->532 532->532 533 5f1e623 532->533 533->527 534->535 543 5f1e707-5f1e70c 534->543 548 5f1e7d3-5f1e849 535->548 549 5f1e7cc-5f1e7d2 535->549 537 5f1e693-5f1e696 536->537 538 5f1e672-5f1e67c 536->538 537->525 540 5f1e680-5f1e68f 538->540 541 5f1e67e 538->541 540->540 544 5f1e691 540->544 541->540 545 5f1e72f-5f1e732 543->545 546 5f1e70e-5f1e718 543->546 544->537 545->535 550 5f1e71a 546->550 551 5f1e71c-5f1e72b 546->551 557 5f1e859-5f1e85d 548->557 558 5f1e84b-5f1e84f 548->558 549->548 550->551 551->551 552 5f1e72d 551->552 552->545 560 5f1e86d-5f1e871 557->560 561 5f1e85f-5f1e863 557->561 558->557 559 5f1e851 558->559 559->557 562 5f1e881 560->562 563 5f1e873-5f1e877 560->563 561->560 564 5f1e865 561->564 566 5f1e882 562->566 563->562 565 5f1e879 563->565 564->560 565->562 566->566
                                APIs
                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05F1E7B7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 57ef4c2965ac40bd533198e81ecd38dca5af6e265da7b95b66063fc5a64991f2
                                • Instruction ID: 7fbdcefc5f8c4a492bbb6438a0f7dbccb986d7c712195f66a369c81db111bc19
                                • Opcode Fuzzy Hash: 57ef4c2965ac40bd533198e81ecd38dca5af6e265da7b95b66063fc5a64991f2
                                • Instruction Fuzzy Hash: 16A11274D00318CFDB20CFA9C885BEEBBB5FB09310F149569E859A7240DB789985CF55

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 567 5f1e550-5f1e5e2 569 5f1e5e4-5f1e5fb 567->569 570 5f1e62b-5f1e653 567->570 569->570 575 5f1e5fd-5f1e602 569->575 573 5f1e655-5f1e669 570->573 574 5f1e699-5f1e6ef 570->574 573->574 585 5f1e66b-5f1e670 573->585 583 5f1e6f1-5f1e705 574->583 584 5f1e735-5f1e7ca CreateProcessA 574->584 576 5f1e625-5f1e628 575->576 577 5f1e604-5f1e60e 575->577 576->570 580 5f1e610 577->580 581 5f1e612-5f1e621 577->581 580->581 581->581 582 5f1e623 581->582 582->576 583->584 592 5f1e707-5f1e70c 583->592 597 5f1e7d3-5f1e849 584->597 598 5f1e7cc-5f1e7d2 584->598 586 5f1e693-5f1e696 585->586 587 5f1e672-5f1e67c 585->587 586->574 589 5f1e680-5f1e68f 587->589 590 5f1e67e 587->590 589->589 593 5f1e691 589->593 590->589 594 5f1e72f-5f1e732 592->594 595 5f1e70e-5f1e718 592->595 593->586 594->584 599 5f1e71a 595->599 600 5f1e71c-5f1e72b 595->600 606 5f1e859-5f1e85d 597->606 607 5f1e84b-5f1e84f 597->607 598->597 599->600 600->600 601 5f1e72d 600->601 601->594 609 5f1e86d-5f1e871 606->609 610 5f1e85f-5f1e863 606->610 607->606 608 5f1e851 607->608 608->606 611 5f1e881 609->611 612 5f1e873-5f1e877 609->612 610->609 613 5f1e865 610->613 615 5f1e882 611->615 612->611 614 5f1e879 612->614 613->609 614->611 615->615
                                APIs
                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05F1E7B7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: c4bd962fd5c355fedf05517806f521b37d8fc5efa48c325f7d6b8c8fe05f9bb8
                                • Instruction ID: 31e7babd7b1b593254f366863c06c3767f72e865a0d9d3d2ef74361f2940fb22
                                • Opcode Fuzzy Hash: c4bd962fd5c355fedf05517806f521b37d8fc5efa48c325f7d6b8c8fe05f9bb8
                                • Instruction Fuzzy Hash: 92A10270D00318CFDB20CFA9C885BEEBBB5FB09310F149569E959A7280DB789985CF59

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 616 5f141e4-5f1425b 618 5f142a1-5f142c6 616->618 619 5f1425d-5f14271 616->619 622 5f142c8-5f142dc 618->622 623 5f1430c-5f1437b CopyFileA 618->623 619->618 624 5f14273-5f14278 619->624 622->623 631 5f142de-5f142e3 622->631 636 5f14384-5f143e6 623->636 637 5f1437d-5f14383 623->637 625 5f1429b-5f1429e 624->625 626 5f1427a-5f14284 624->626 625->618 628 5f14286 626->628 629 5f14288-5f14297 626->629 628->629 629->629 632 5f14299 629->632 634 5f142e5-5f142ef 631->634 635 5f14306-5f14309 631->635 632->625 638 5f142f1 634->638 639 5f142f3-5f14302 634->639 635->623 645 5f143f6-5f143fa 636->645 646 5f143e8-5f143ec 636->646 637->636 638->639 639->639 640 5f14304 639->640 640->635 648 5f1440a 645->648 649 5f143fc-5f14400 645->649 646->645 647 5f143ee 646->647 647->645 651 5f1440b 648->651 649->648 650 5f14402 649->650 650->648 651->651
                                APIs
                                • CopyFileA.KERNEL32(?,?,?), ref: 05F1436B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: CopyFile
                                • String ID:
                                • API String ID: 1304948518-0
                                • Opcode ID: 982b68c97c8092818a6ba2d9374057893d8dde936a9564fc92e59820df1f2e01
                                • Instruction ID: 3c144b1255b3c2687dd03345fe5477a19dcc16e17d82942fd2a58633b6a52cdb
                                • Opcode Fuzzy Hash: 982b68c97c8092818a6ba2d9374057893d8dde936a9564fc92e59820df1f2e01
                                • Instruction Fuzzy Hash: 27612470D003598FDF14CFA9C9897EDBBB1FB48310F248229E815AB280DB788985DF45

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 652 5f141f0-5f1425b 654 5f142a1-5f142c6 652->654 655 5f1425d-5f14271 652->655 658 5f142c8-5f142dc 654->658 659 5f1430c-5f1437b CopyFileA 654->659 655->654 660 5f14273-5f14278 655->660 658->659 667 5f142de-5f142e3 658->667 672 5f14384-5f143e6 659->672 673 5f1437d-5f14383 659->673 661 5f1429b-5f1429e 660->661 662 5f1427a-5f14284 660->662 661->654 664 5f14286 662->664 665 5f14288-5f14297 662->665 664->665 665->665 668 5f14299 665->668 670 5f142e5-5f142ef 667->670 671 5f14306-5f14309 667->671 668->661 674 5f142f1 670->674 675 5f142f3-5f14302 670->675 671->659 681 5f143f6-5f143fa 672->681 682 5f143e8-5f143ec 672->682 673->672 674->675 675->675 676 5f14304 675->676 676->671 684 5f1440a 681->684 685 5f143fc-5f14400 681->685 682->681 683 5f143ee 682->683 683->681 687 5f1440b 684->687 685->684 686 5f14402 685->686 686->684 687->687
                                APIs
                                • CopyFileA.KERNEL32(?,?,?), ref: 05F1436B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: CopyFile
                                • String ID:
                                • API String ID: 1304948518-0
                                • Opcode ID: 1615758ce6a6805ccbcef32c87844a24abc6f5a10993252a9f93af576917247a
                                • Instruction ID: 0e89d451a695351ff0d06586a311840d658945b6e571bf989c6f3759b2129686
                                • Opcode Fuzzy Hash: 1615758ce6a6805ccbcef32c87844a24abc6f5a10993252a9f93af576917247a
                                • Instruction Fuzzy Hash: 16611370D003589FDF14CFA9C8897EDBBB1FB89310F248129E815AB280DB789985DF55

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 688 5f1fbb9-5f1fc2b 691 5f1fc42-5f1fca3 WriteProcessMemory 688->691 692 5f1fc2d-5f1fc3f 688->692 694 5f1fca5-5f1fcab 691->694 695 5f1fcac-5f1fcfe 691->695 692->691 694->695
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05F1FC93
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: ae7003f2735f2629525e9c1038c1546f342502025f16b0be89945344ccee0c39
                                • Instruction ID: 25945e42c247f703b50b6f672c4931f0440d919b519caae397f69da65c19e072
                                • Opcode Fuzzy Hash: ae7003f2735f2629525e9c1038c1546f342502025f16b0be89945344ccee0c39
                                • Instruction Fuzzy Hash: 32419AB5D012589FCF10DFA9D984ADEFBF1BB49310F14942AE819B7200D739AA45CF68

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 700 5f1fbc0-5f1fc2b 702 5f1fc42-5f1fca3 WriteProcessMemory 700->702 703 5f1fc2d-5f1fc3f 700->703 705 5f1fca5-5f1fcab 702->705 706 5f1fcac-5f1fcfe 702->706 703->702 705->706
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05F1FC93
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: b3b7f84c10cde907cd126e2159cdb58aeef109ecc4ec964ce7d280822b157f4f
                                • Instruction ID: 1f042b7421a69998d8f77581877f2c9cfd80bfa7abc19fd573011fc60d4e8f59
                                • Opcode Fuzzy Hash: b3b7f84c10cde907cd126e2159cdb58aeef109ecc4ec964ce7d280822b157f4f
                                • Instruction Fuzzy Hash: 76419AB5D012589FCF10DFA9D984ADEFBF1BB49310F14942AE819B7200D739AA45CF68
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05F1F562
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 76d8ce073e8629199612efb93f22efe4a294dd307974f817dfbe19507d9c55e4
                                • Instruction ID: c0b1b171134005891f2c90dc0d686b36e3700e153864b28fbc943d0c022fc1a7
                                • Opcode Fuzzy Hash: 76d8ce073e8629199612efb93f22efe4a294dd307974f817dfbe19507d9c55e4
                                • Instruction Fuzzy Hash: 7C318AB9D042589FCF10CFA9D980ADEFBB5FB49320F14941AE815B7210D739A946CF64
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05F1F562
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 1cabef2f6114a45b6962684214af8de982f2a7c87827edae4492d11391060f0a
                                • Instruction ID: 84b765534b702c78d992dce5414c87e0f474099b7c5ec36d9171f4b62778520d
                                • Opcode Fuzzy Hash: 1cabef2f6114a45b6962684214af8de982f2a7c87827edae4492d11391060f0a
                                • Instruction Fuzzy Hash: C53165B9D042589FCF10CFA9D980ADEFBB5BB49310F14942AE815B7210D739A946CF68
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,?), ref: 05F1EEAF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: 9048f7fc070675b79ec09c1ce5a482beadf5c6f54253351a2056e8c5db00d09b
                                • Instruction ID: db24e1c22a8f2ec3130553e3f8d8ba17f2c1569de3fcacc6d0a0ac8e28ad905a
                                • Opcode Fuzzy Hash: 9048f7fc070675b79ec09c1ce5a482beadf5c6f54253351a2056e8c5db00d09b
                                • Instruction Fuzzy Hash: 5241ACB5D012589FDB10DFA9D884AEEFBF5BB48320F24842AE815B7240D778A945CF64
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,?), ref: 05F1EEAF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: dc9383c1f7e887cfcbc2133d6a930dfd2687ddef75fad692458245f26efc58aa
                                • Instruction ID: 25f98814f5dc91e151e41f86c8f9033a84c16aca31a5a91317bad6c38c3f8ce0
                                • Opcode Fuzzy Hash: dc9383c1f7e887cfcbc2133d6a930dfd2687ddef75fad692458245f26efc58aa
                                • Instruction Fuzzy Hash: B531BEB5D012589FDB10CFA9D884AEEFBF5BF48310F14842AE815B7240D738A945CF64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: TJq
                                • API String ID: 0-48878262
                                • Opcode ID: 537a67214978c9506e1ae2c275e5ef72878f3d91c7fd928f7d268538c80c6229
                                • Instruction ID: 9f51edab12aaffef9078605f57d237a514aca749ed3fe1a0d7a25108e74e4bfe
                                • Opcode Fuzzy Hash: 537a67214978c9506e1ae2c275e5ef72878f3d91c7fd928f7d268538c80c6229
                                • Instruction Fuzzy Hash: 5671A375E00208DFDB45EFA9E4546AEBBF2FB89301F20846AE506A7358EB385D45CF50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: toq
                                • API String ID: 0-207910900
                                • Opcode ID: f58d959cfa029962808771214fa01962896399c754d88c1e5b4e264ebe242362
                                • Instruction ID: 735eb76119ef609f7bb4e461e645fb294f1809990544649d4e29558b3326b49d
                                • Opcode Fuzzy Hash: f58d959cfa029962808771214fa01962896399c754d88c1e5b4e264ebe242362
                                • Instruction Fuzzy Hash: 2F217E71A04244CFD7059B7CC8A8BED7FB1BF8D314F258499D041AB3A1DA748C45CB55
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: toq
                                • API String ID: 0-207910900
                                • Opcode ID: 7ddd217fc7463c77c37538a3807e6be66992d0e9ebc4ab24de9ee47a238eab44
                                • Instruction ID: 7e0cc7731596514c56a16786650ed9cf09be51514d9e4a2caca05ff5052f7c25
                                • Opcode Fuzzy Hash: 7ddd217fc7463c77c37538a3807e6be66992d0e9ebc4ab24de9ee47a238eab44
                                • Instruction Fuzzy Hash: 73213A35E40108CFDB08DFA9D458AEDBBF1FB8C315F248469E506A73A0DB309844CBA4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID: toq
                                • API String ID: 0-207910900
                                • Opcode ID: 7f3c4f46f934b8f5f0da55be62256922292ec0d167b19c81a762012df0407a60
                                • Instruction ID: a243ce557675d4be947c3c6a2ee8882fc408d37786ba7b35437a2947412d5af6
                                • Opcode Fuzzy Hash: 7f3c4f46f934b8f5f0da55be62256922292ec0d167b19c81a762012df0407a60
                                • Instruction Fuzzy Hash: 1D110674A40204CFDB08DFA8D458BAD7BB1BB4C715F258859E102EB3A1DB709840CF55
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 92b09cb925bb5045e50bf3951ecb63b2bd38b0fd8b266f642c55ea62caa8b2e9
                                • Instruction ID: 53e7eac406817b82895cb3d55ce28fc08dc7f85ce512ee93280e1cf9f1792747
                                • Opcode Fuzzy Hash: 92b09cb925bb5045e50bf3951ecb63b2bd38b0fd8b266f642c55ea62caa8b2e9
                                • Instruction Fuzzy Hash: C531B635704241CFD718DB78C494A68BBB2FF8535472684A9D986DB3A2EB35EC02CB94
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 00f855faad6c58ed727ca0bc8727b6440e3dc4cb1591ea74b7a35cc45eac108c
                                • Instruction ID: 33471dc55aca9be3dbf4a3a943647cfc2c32019e862ecd67b00a67ece2a93bbc
                                • Opcode Fuzzy Hash: 00f855faad6c58ed727ca0bc8727b6440e3dc4cb1591ea74b7a35cc45eac108c
                                • Instruction Fuzzy Hash: 39313CF0D042099FDB05EFAAD8446AEBBB6BB86301F20C86AC019A7244E7784545CF45
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: af8750e8287654ba4d958da616cf464e74c669e22bcf854a4a74da838452361b
                                • Instruction ID: 58f95b49d58c828a29e654d110630ade9f294666458c124d8fcf33a63761519d
                                • Opcode Fuzzy Hash: af8750e8287654ba4d958da616cf464e74c669e22bcf854a4a74da838452361b
                                • Instruction Fuzzy Hash: 0B3136B0D05208DFDB41EFA9C0487ADBBF5FB49301F6085AAC506A7684E7784A46CF55
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 788dd9901a4ba4a6245d0f24872f25be37b9b4489ffb0b09582861d0051b6de5
                                • Instruction ID: 0cd65e33fbd4c8b2eb1306ac7bcb998e4d381e318136fcb6f9223525c408bc26
                                • Opcode Fuzzy Hash: 788dd9901a4ba4a6245d0f24872f25be37b9b4489ffb0b09582861d0051b6de5
                                • Instruction Fuzzy Hash: F73138B0D05208DFDB40EFA9C0487ADFBF9FB48305F6084AAC40AA7684EB784A45CF55
                                Memory Dump Source
                                • Source File: 00000000.00000002.1364957288.00000000024FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_24fd000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 27411cdc6e804c2c6f50364b52768ef326ef6488d66ed48466911b837a35bb51
                                • Instruction ID: d9d5d304615bc5ab61c9f77fb748dcb1723881e08f98226ddcae73b498393661
                                • Opcode Fuzzy Hash: 27411cdc6e804c2c6f50364b52768ef326ef6488d66ed48466911b837a35bb51
                                • Instruction Fuzzy Hash: 8A21D371904244DFDB55DF14D9C4B17BBA5EBC4318F24C56AEA090B642C336D447CAA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1364957288.00000000024FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_24fd000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ef37239f6771f28b17ab3ec451f69e1a166b90b82affe300979a20102e314c70
                                • Instruction ID: 9423becdd1ed7df2ab43e8e6f43d4531f759ac0d921bba045f13e967812ee180
                                • Opcode Fuzzy Hash: ef37239f6771f28b17ab3ec451f69e1a166b90b82affe300979a20102e314c70
                                • Instruction Fuzzy Hash: B121B0755093C0CFCB02CF20D994716BF71EB86214F2881DBD9458B653C33A980ACB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 26676209e5e679b92ea42e87dddf4a560617df51a25586bb9a54804405de1196
                                • Instruction ID: a10dc97644971edc84bb0e22310e67405061d3458106544e7be9ba26dc6615bf
                                • Opcode Fuzzy Hash: 26676209e5e679b92ea42e87dddf4a560617df51a25586bb9a54804405de1196
                                • Instruction Fuzzy Hash: E51112B0D05209DFDB04CFAAD4446FEBBB6FB88320F20842AD915B3250E7755956CBA8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5495e3d470e6e91221de7849a6b55ee1c2a25424b346307a0dcc60c54a7059aa
                                • Instruction ID: 56915bdde6d0a83ecf2c9813ab8a21990fdb5249d53b349b95ad172ebec58cf9
                                • Opcode Fuzzy Hash: 5495e3d470e6e91221de7849a6b55ee1c2a25424b346307a0dcc60c54a7059aa
                                • Instruction Fuzzy Hash: F7015231700201CFDB18DBA4C484A68F7B2FF84358B61C4ADD556AB295EB35EC12CB98
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f827f620e4dab2038c6b41f92a3840e5a4062fd496c6959ba71cced80206607b
                                • Instruction ID: 0656681ea75a1febbbc4387db375a895d6cf8199178c355726ef5e00d3975d45
                                • Opcode Fuzzy Hash: f827f620e4dab2038c6b41f92a3840e5a4062fd496c6959ba71cced80206607b
                                • Instruction Fuzzy Hash: 73F0E2352005408FE706EBBCA860BA93BF5EF8E2417858499D1858B26ADB649C86CF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6ce78bbae60d456885822d74206a81bbbf33b65589f1425c9c0eebf475088318
                                • Instruction ID: 4c9044e0b72fa2b7f15c1a8a8c489dca2878d7392cdf77bbe19b966d0c5926f7
                                • Opcode Fuzzy Hash: 6ce78bbae60d456885822d74206a81bbbf33b65589f1425c9c0eebf475088318
                                • Instruction Fuzzy Hash: 09F0A0327042905FD71A977958507B92FB2AFCA610B1905EED285CB2A2ED968C02C780
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e48d229129cad2a496b3852b492d90c88bbccd7ed119d90a9eb28a5f98d40973
                                • Instruction ID: 0551a3fb84f64add19515e2644f46054a69c10f9f9c0d11ea00a3327ea82abae
                                • Opcode Fuzzy Hash: e48d229129cad2a496b3852b492d90c88bbccd7ed119d90a9eb28a5f98d40973
                                • Instruction Fuzzy Hash: 70E092356001008FEB05EBBDE440B2A77E9EB8C681B51C068D20587369EB69DD458F90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0e3c3b9bc9cc906a8c9bb7246a516b49720c4524e75488fca270e64bdaa9edb5
                                • Instruction ID: 56262d5de21dd93fb0687596be5f8ae92b8cf8e7d3709fc5cdf23d242a99e6fd
                                • Opcode Fuzzy Hash: 0e3c3b9bc9cc906a8c9bb7246a516b49720c4524e75488fca270e64bdaa9edb5
                                • Instruction Fuzzy Hash: A4E04F392046805FC7569B78E4A5AE83FB2EF8A65431548D5E885CB326D9218C57CB00
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 39af4ff857f91d92891be14c1afa8267bc6c8fdca59a14565a01ab657c03b7da
                                • Instruction ID: 5417e667a503977eda83c1df28ffc57bea305033e55dfc4dd19092040370c66d
                                • Opcode Fuzzy Hash: 39af4ff857f91d92891be14c1afa8267bc6c8fdca59a14565a01ab657c03b7da
                                • Instruction Fuzzy Hash: DBF01574D04208EFCB84DFA8C440AACBBB4FB49300F10C0AA981897341D7329A61DF44
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 72327f5a56dc8fa4d25c4cbbff5730af47120ba6165c21891552a1552ed4b328
                                • Instruction ID: 853ca8663d56016fe117547ee5ce3cc048e3a2599473a950428aa7e6602ea943
                                • Opcode Fuzzy Hash: 72327f5a56dc8fa4d25c4cbbff5730af47120ba6165c21891552a1552ed4b328
                                • Instruction Fuzzy Hash: EBE086327402245FD708E66D9800B7A37EAABCC750F1944E9E609DB3A1DEA5DC4187D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fa100d38ea8b0ab20f521beddb301f030b33d6afbea703e6ef494eb8dac94e44
                                • Instruction ID: f52a84ec4be871afc5a2bda618fcf478fb29c484297002e35db70686a2b4bf06
                                • Opcode Fuzzy Hash: fa100d38ea8b0ab20f521beddb301f030b33d6afbea703e6ef494eb8dac94e44
                                • Instruction Fuzzy Hash: 0BE0EC71900208AFDB44EBB1D80879E7BB8EB4A245F1045A59509A3250EE765A509B9A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8634b54b3bffa863ab448921a30cbe108bf10051c17bda757ec5dfaffa961573
                                • Instruction ID: 399d5941b3a999845f5b8b2e11239b90ca7bebee750fa493689600e863faa32a
                                • Opcode Fuzzy Hash: 8634b54b3bffa863ab448921a30cbe108bf10051c17bda757ec5dfaffa961573
                                • Instruction Fuzzy Hash: 81D05E74648108EFC744CB94D400A69B7BDEB46208F20849E8C0853341DB729D11CB88
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c80ddc796a83b64a8749779c428423172ab53a4c7cab3bc3d0e3dd4880ee1cca
                                • Instruction ID: d25d52851d0bd3600a75bc04a11876fb5c60ce6dd089899002a8b9347346516b
                                • Opcode Fuzzy Hash: c80ddc796a83b64a8749779c428423172ab53a4c7cab3bc3d0e3dd4880ee1cca
                                • Instruction Fuzzy Hash: B0712E71E002488FEB4AEF6BE54069A7BF3BFC9300F14C569C145AB269EB745916CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bcd0320212bf7f6dda4ee2fa8a35170ae200e187b94eb9922eae014f34902061
                                • Instruction ID: f5d41f0e06d194568aac8c50457db056cfd1199be85f983e610304b87569f5ad
                                • Opcode Fuzzy Hash: bcd0320212bf7f6dda4ee2fa8a35170ae200e187b94eb9922eae014f34902061
                                • Instruction Fuzzy Hash: A3710C71E002488FEB4AEF6BE540A9ABBF3BFC9300F14C569C145AB269EB745915CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c3a763247c7ced0ca44ad39543492da071f6958cacc6cc352357ec22c602e288
                                • Instruction ID: 8ee6b08d6c4ef3314fad5f5fd8716bc3c533b20c6f21ed76f584851118baa4b8
                                • Opcode Fuzzy Hash: c3a763247c7ced0ca44ad39543492da071f6958cacc6cc352357ec22c602e288
                                • Instruction Fuzzy Hash: D331D4B1E046288BEB18CFABC9447AEFBF6AF88300F14C16AC809B7254DB741941CF54
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: acd870a9c4e2da37fee63c7563b742d935965caf8686ee281c3d20938cb5d5bd
                                • Instruction ID: c3b5cbf379d49579236f854946d38d3360cc9eded0d29af04aed4a8a690836dd
                                • Opcode Fuzzy Hash: acd870a9c4e2da37fee63c7563b742d935965caf8686ee281c3d20938cb5d5bd
                                • Instruction Fuzzy Hash: 2E21FEB5D042189FDB14CFA9D981AEEBBF1BF49310F14945AE809B7210C739A905CFA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1390069910.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5f10000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2644dafc6b76cd395cb43722fa611ba60c3a5360e1122cc98036bd624f2ee186
                                • Instruction ID: 197c1dae18590c1bd69e769360e0e874767b354e9c034a9acbedc0354b749a0d
                                • Opcode Fuzzy Hash: 2644dafc6b76cd395cb43722fa611ba60c3a5360e1122cc98036bd624f2ee186
                                • Instruction Fuzzy Hash: 5721C0B5D042189FDB14CFA9D980AEEFBF5FB49310F14941AE815B7210CB39A945CFA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1365499751.00000000025C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25c0000_GcA5z6ZWRK.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 54fc91ddf881cbaa8509e362a02d3a4ecb77eb1e78bec0f0d15e30a920674488
                                • Instruction ID: 988e20a08989df9fd458f1388fad349207974158e6815fe0b5ec540c24057b28
                                • Opcode Fuzzy Hash: 54fc91ddf881cbaa8509e362a02d3a4ecb77eb1e78bec0f0d15e30a920674488
                                • Instruction Fuzzy Hash: 5B217AB1D016188BEB58CF6BC94978EFBF7AFC9304F14C1A9C40CA6264EB7509458F51
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: TJq
                                • API String ID: 0-48878262
                                • Opcode ID: 928b56027982ac98c517189dc3d1d7e3d4cbc986616ac92e2cd2b10abc26c55f
                                • Instruction ID: d30e28f4526c14a2e266a4746f8a11d55d1eaee24a543e05fa620cf4f0d6119f
                                • Opcode Fuzzy Hash: 928b56027982ac98c517189dc3d1d7e3d4cbc986616ac92e2cd2b10abc26c55f
                                • Instruction Fuzzy Hash: 8BB200B2D443658FD776CF6CC4445AAFFB1BF5A328B1841ADD2419B667E3329802CB84
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: qkB
                                • API String ID: 0-3030993317
                                • Opcode ID: c9cb0493652ec75124326fbe1cb6408f5d9ab8b6a85fb31c2b83e83ec90e405c
                                • Instruction ID: 6a4429394ec105cddbe13ef0db587773c831a028875f829ddd1ff5d622b6faf0
                                • Opcode Fuzzy Hash: c9cb0493652ec75124326fbe1cb6408f5d9ab8b6a85fb31c2b83e83ec90e405c
                                • Instruction Fuzzy Hash: BFA16F34A00105DFE724DF68E548BA9B7B3FB89310F6980A5F5169B766CB759C91CF00
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: qkB
                                • API String ID: 0-3030993317
                                • Opcode ID: f1639970880acf99b1f4071b7292a1472f5aa86039da9a0da2a07449dd637330
                                • Instruction ID: 1cf1d50bbfac55436e1ae68992c6f3c5ac7072df1613e843949c7365211d8ac0
                                • Opcode Fuzzy Hash: f1639970880acf99b1f4071b7292a1472f5aa86039da9a0da2a07449dd637330
                                • Instruction Fuzzy Hash: C6915E34A00105DFE724DF68E548BA9B7B3FB89310F6980A5F51A9B76ACB759C91CF00
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: Dq
                                • API String ID: 0-144822681
                                • Opcode ID: 5edad5aac7058c38fce533686035ed956cd541ab6994a082e830dd44098e5489
                                • Instruction ID: 30eed1eb619c6dc7e5e8d38740a08bbce6226b4d65ad239f65ff01726d6ab914
                                • Opcode Fuzzy Hash: 5edad5aac7058c38fce533686035ed956cd541ab6994a082e830dd44098e5489
                                • Instruction Fuzzy Hash: 86B1AA30A006049FDB25DF28D584B5AFBF6FF89310F5581A9E816AB3A1DB35ED01CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: Dq
                                • API String ID: 0-144822681
                                • Opcode ID: 0166ba903dd049c96ab571f65397b94e7a340ac88159cce709bd88376b589d56
                                • Instruction ID: 4a0ba195e5c50e49e56cf8304a827e69ef0038287cafb436005ef9b9c46c4901
                                • Opcode Fuzzy Hash: 0166ba903dd049c96ab571f65397b94e7a340ac88159cce709bd88376b589d56
                                • Instruction Fuzzy Hash: 7271BB74A006009FDB24DF28C584A59FBF2FF89310B6681A8D816AB362DB35EC41CF80
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607908758.0000000003360000.00000040.00000800.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_3360000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 449fc576408434691b9206ae84e424e1d305871d63d0aaf4ae2db43f6ff5d434
                                • Instruction ID: 4d3f66da44e1b031bbac2d8d27f4769f707a55134ca26d066a7dedfeac872b4e
                                • Opcode Fuzzy Hash: 449fc576408434691b9206ae84e424e1d305871d63d0aaf4ae2db43f6ff5d434
                                • Instruction Fuzzy Hash: AC219A74D0C2489FDB15CFA8D49939CBFB9FB46304F6480E6D0499F28AC7B84988CB41
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d37c7d076ba9458339d186834934a95ea49c07b472b5b9af53c5ad26c3d1a331
                                • Instruction ID: 49c124d84ba63497e2ae7c5eb822ac9039ec82bb071e484e91b1aaec18124c54
                                • Opcode Fuzzy Hash: d37c7d076ba9458339d186834934a95ea49c07b472b5b9af53c5ad26c3d1a331
                                • Instruction Fuzzy Hash: EC31B134740210CFE310DF68C484B6AB7B6FBC9320F6681AAE5469B766C771EC82CB50
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 440891a45368a9a0cb1cb5bf43c73067d87ce1056247ad3f2ac7a4a36beb2460
                                • Instruction ID: 5dd7a752975654bea4059560903b3619d3d32817ae7dc878aba95f2a74b24652
                                • Opcode Fuzzy Hash: 440891a45368a9a0cb1cb5bf43c73067d87ce1056247ad3f2ac7a4a36beb2460
                                • Instruction Fuzzy Hash: 4C01D8303402145FE358EA7A8C54F6F66EEFFCC650F144069B10AEB391DDA59C0087A4
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607908758.0000000003360000.00000040.00000800.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_3360000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7abdfeca623d53f2585d3daf74464e59f6e865c148ec249dbb23350b6d801905
                                • Instruction ID: dc128d5f9b11a7471d7919ed6d4e7d9406f8f6e963685350a23318b635edbd79
                                • Opcode Fuzzy Hash: 7abdfeca623d53f2585d3daf74464e59f6e865c148ec249dbb23350b6d801905
                                • Instruction Fuzzy Hash: 32114974D08208DFEB54DFA9D49939DBBFAFB48308F9081A5D0499F688C7B849848B41
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 973f797c5f74fef59f591b42ca2265ef5e070683508342f6862063edc7c961b6
                                • Instruction ID: bb2ae32da29ec156cc719c2b8b989a8b54d6ffee80f98d6c96cb93c060a801ca
                                • Opcode Fuzzy Hash: 973f797c5f74fef59f591b42ca2265ef5e070683508342f6862063edc7c961b6
                                • Instruction Fuzzy Hash: 84F02B2518E7C44FC75687A06CE85A07FB09A8717172A00EBD895CF1A7D19E288EA732
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fe5431bab80e3872c4cdb671266c9859b0dd83da9326096070598b2386a5027b
                                • Instruction ID: 2ff4b020eea029a429f2b789823687d992992b32f5925b95121291029be7d4b5
                                • Opcode Fuzzy Hash: fe5431bab80e3872c4cdb671266c9859b0dd83da9326096070598b2386a5027b
                                • Instruction Fuzzy Hash: 35014B301493418FD353DB24E4853A47BB1EB52324FAA81E3C805CB166E3BE68CACB11
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d96d1bd7df96a4fc8ff2fab43b2f74b4b363e3ae07cc275654767c0e43559c2f
                                • Instruction ID: 8e676298f080941d6009aaf897d29e3709a2acdb5f494a091d4dc717e01bd2a8
                                • Opcode Fuzzy Hash: d96d1bd7df96a4fc8ff2fab43b2f74b4b363e3ae07cc275654767c0e43559c2f
                                • Instruction Fuzzy Hash: F4F02E317182804FC35587B8F4589A87BF5AF4B12071640E7E90ADF363EB25CC04CB62
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d91d2f6a81cc6a0064f651781ca457ab2b282200eadd90b63dc0946decffa2ee
                                • Instruction ID: 5dae4deba4f19385bc8fe74884bc5cafab613c4d2c1ecac0dccdf47d71e79638
                                • Opcode Fuzzy Hash: d91d2f6a81cc6a0064f651781ca457ab2b282200eadd90b63dc0946decffa2ee
                                • Instruction Fuzzy Hash: 00F08235B000508FC764DFA8E08866577E6FB88224B1141A6E90ACF356DB26DC058B51
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b3b05ca813ff5f75dbb489c269edcc29b54c3ee5ff511e366fb0e0b882bd9134
                                • Instruction ID: ff0bb7c539ff720a8c9d2bbe4542bfe7ea98563c2dc8282c0f5e0321dc9ffbb4
                                • Opcode Fuzzy Hash: b3b05ca813ff5f75dbb489c269edcc29b54c3ee5ff511e366fb0e0b882bd9134
                                • Instruction Fuzzy Hash: 3CE06D35A5A3804FC7575B78B4144BC7FB0AE8726531500DBE886CB263DB295C55CBA1
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 55e15d7d4acc13a39ed3349f5df166bbc57b56965c5c06e4a21fcf2f8ae7e0c8
                                • Instruction ID: 0b3decbbf2064e4f4e33e0ae6da6533474096bdf1687cb6e3f05385ad25d91ab
                                • Opcode Fuzzy Hash: 55e15d7d4acc13a39ed3349f5df166bbc57b56965c5c06e4a21fcf2f8ae7e0c8
                                • Instruction Fuzzy Hash: 5AE09230100105CFE366EB24E048775B3B6E794318FD5C2B1D4194A609D7BA78C4CB40
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607908758.0000000003360000.00000040.00000800.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_3360000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8c6990af10ebd710336a50ec4d4feef161141834ff8eb0d82f7626114a9e5fc4
                                • Instruction ID: 17f88365243d1400b1b299b505664ebd2849f7ffaab4c08e8308e7867e40981f
                                • Opcode Fuzzy Hash: 8c6990af10ebd710336a50ec4d4feef161141834ff8eb0d82f7626114a9e5fc4
                                • Instruction Fuzzy Hash: A1F03075E022028BD7A0CF34D8D93A97BA5FB88201F0584659416C7649EB759544EB00
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 89b1e648329d7253da49e2438a04236b6cc4ac18e7621f89d1f3bab6642db7a2
                                • Instruction ID: c4d036ebb7536f1b33ad2eb54bdef2a1da6ef74cb5e4e8fc9301bbbf12d181f6
                                • Opcode Fuzzy Hash: 89b1e648329d7253da49e2438a04236b6cc4ac18e7621f89d1f3bab6642db7a2
                                • Instruction Fuzzy Hash: 24E09A7890120ACFCB388F60C8587ADF331AB06304F1088E9D10AA6292CB764AC9CF41
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3a57cd00e9675c7c2cdc7df18ab8b649b8db995ab1ba41f46b056594e77a19b1
                                • Instruction ID: a52c0bf27ef11accf6dc4134a65ef7ed7c2f26fbf792ddbffab449c5b30ec11d
                                • Opcode Fuzzy Hash: 3a57cd00e9675c7c2cdc7df18ab8b649b8db995ab1ba41f46b056594e77a19b1
                                • Instruction Fuzzy Hash: 0DE086347001148FC354DBB9E048A6577EAFB8D21071240A6E90EDB315DE35DC048B91
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 31ed303fd5670d33121e746d0eef300680738b7fbcc0ace8a385fd374e6c9d22
                                • Instruction ID: 3103d2cf5fe1cbcecaa95a4d50b2c97d3c7be49535a8ef96291d1f9c9a7505a8
                                • Opcode Fuzzy Hash: 31ed303fd5670d33121e746d0eef300680738b7fbcc0ace8a385fd374e6c9d22
                                • Instruction Fuzzy Hash: 12E012315853414FCBE657B464941D93BF0FB473747520496D841CF052E76E2C8AE722
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 27a80338b8c7b7f75f79a06cfd5eebac5b3ffda0129dd28ee54f1ded28536669
                                • Instruction ID: 391f9114a142f37ef42dbeb4bafdabc7ace4cd3ab1760634f3576393c8e4dcd4
                                • Opcode Fuzzy Hash: 27a80338b8c7b7f75f79a06cfd5eebac5b3ffda0129dd28ee54f1ded28536669
                                • Instruction Fuzzy Hash: D7E0B634600100CFC794DF64D599A597BF6FF4C300B6200A5E416DB769DB35DC01CB10
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5110caa26cf5d75eb98705550cab8cee474ec60e4a9a721fa0f33367c48b8ce5
                                • Instruction ID: 269006dae125af820a93cf75ae418770290fd18a2b827ff64fd13600769866da
                                • Opcode Fuzzy Hash: 5110caa26cf5d75eb98705550cab8cee474ec60e4a9a721fa0f33367c48b8ce5
                                • Instruction Fuzzy Hash: 73D01232728141DBD3369634A45536DBAA54744990F544550D52B86346E7185F889781
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607908758.0000000003360000.00000040.00000800.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_3360000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8f043ccc2dc25023cda6b7485d7b9aa120d7f6e97e859e139feb73f57aaba883
                                • Instruction ID: 711f779f4353567362a3cbfb5df9bd28e692a256b06bde0e414651c73c7be4dc
                                • Opcode Fuzzy Hash: 8f043ccc2dc25023cda6b7485d7b9aa120d7f6e97e859e139feb73f57aaba883
                                • Instruction Fuzzy Hash: 91C08071F115014BCFD08F74885D26D37E0F744110F044A25A433C7BC4EF7984445B40
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f85e9ecaa1c7d7c6bb6b9971f76ed505a8ebf6cbeccabef1d7725d9d8f22499c
                                • Instruction ID: 108cb126a140c7f63a78e6e9320190bda674f5478c9d41b82feb5e848456b2bf
                                • Opcode Fuzzy Hash: f85e9ecaa1c7d7c6bb6b9971f76ed505a8ebf6cbeccabef1d7725d9d8f22499c
                                • Instruction Fuzzy Hash: C6C08C702201028BD2B96634A09021C62A6FB80500B808524C1228F380FF189F080382
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 749c4935727f21907deee2b2c73b42f5eda3d7e278bb367f94441bbfd7e1f72e
                                • Instruction ID: 355819c0c95855c93f22f6785a4954c39abfeb4480f7b0ee816bc30d16e35202
                                • Opcode Fuzzy Hash: 749c4935727f21907deee2b2c73b42f5eda3d7e278bb367f94441bbfd7e1f72e
                                • Instruction Fuzzy Hash: 11C08C30A01009FFCF85ABD0F880AAEB6B3FF84300F004014F8026A270CF220C00AB01
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aba82b64526175ebff1a51bdcca12394e035477b54706176d5dbb38acb80ce9e
                                • Instruction ID: 421ffc73a4dbe214d89ede179faba3e91ca3b70576cd77540634704e52754eb1
                                • Opcode Fuzzy Hash: aba82b64526175ebff1a51bdcca12394e035477b54706176d5dbb38acb80ce9e
                                • Instruction Fuzzy Hash: 7FA0223008820C8B80C033E0380EAC8F38C8880032B800000F22C0000A2F202008C2A2
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607908758.0000000003360000.00000040.00000800.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_3360000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8bf1748436078cc065959f295114633e9c2446c023e53536e623e44ad2acd8f3
                                • Instruction ID: fa4a8e69cb4a1814ba5be2ae416150af382516559c012ee1f7bb372d111fa9cf
                                • Opcode Fuzzy Hash: 8bf1748436078cc065959f295114633e9c2446c023e53536e623e44ad2acd8f3
                                • Instruction Fuzzy Hash: 9DA0223000AB0C8E8208B2B02202020338C0800008BA000B8820C0CA200833E0A08088
                                Memory Dump Source
                                • Source File: 00000002.00000002.2607649899.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_1740000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c8180b15232a3330ddd956574152951e2e0036ea3fc7841bc71e1cc7367b1ed0
                                • Instruction ID: 42e8ab9fdfd7c877c5b40efe43b92e0d2ef0046b11664c64af4526a31ccb685c
                                • Opcode Fuzzy Hash: c8180b15232a3330ddd956574152951e2e0036ea3fc7841bc71e1cc7367b1ed0
                                • Instruction Fuzzy Hash: 3890023204860C8F49E027957489695779CA5485267860051E51E456065AA564589696