Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FylY1FW6fl.exe

Overview

General Information

Sample name:FylY1FW6fl.exe
renamed because original name is a hash value
Original sample name:ef8db8c775992ab8b93fccd7ded9c5cba67faba2bd0c1c6fff900fe87e79e62f.exe
Analysis ID:1588136
MD5:b1ebcd89d248f11a6bbee488bdecfc07
SHA1:4ef62c22addafdae91dfc66d8fa5bc9fbd06cd2f
SHA256:ef8db8c775992ab8b93fccd7ded9c5cba67faba2bd0c1c6fff900fe87e79e62f
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • FylY1FW6fl.exe (PID: 1408 cmdline: "C:\Users\user\Desktop\FylY1FW6fl.exe" MD5: B1EBCD89D248F11A6BBEE488BDECFC07)
    • powershell.exe (PID: 5248 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 5088 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • FylY1FW6fl.exe (PID: 6152 cmdline: "C:\Users\user\Desktop\FylY1FW6fl.exe" MD5: B1EBCD89D248F11A6BBEE488BDECFC07)
  • cleanup
{"EXfil Mode": "SMTP", "From": "rock@supamemo.sbs", "Password": "W0kz);5}7i_aesKD", "Server": "mail.supamemo.sbs", "To": "rocee@supamemo.sbs", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xee6f:$a1: get_encryptedPassword
        • 0xf197:$a2: get_encryptedUsername
        • 0xec0a:$a3: get_timePasswordChanged
        • 0xed2b:$a4: get_passwordField
        • 0xee85:$a5: set_encryptedPassword
        • 0x107d6:$a7: get_logins
        • 0x10487:$a8: GetOutlookPasswords
        • 0x10279:$a9: StartKeylogger
        • 0x10726:$a10: KeyLoggerEventArgs
        • 0x102d6:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 17 entries
          SourceRuleDescriptionAuthorStrings
          0.2.FylY1FW6fl.exe.40dab28.1.raw.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.FylY1FW6fl.exe.40dab28.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.FylY1FW6fl.exe.40dab28.1.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.FylY1FW6fl.exe.40dab28.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf06f:$a1: get_encryptedPassword
                • 0xf397:$a2: get_encryptedUsername
                • 0xee0a:$a3: get_timePasswordChanged
                • 0xef2b:$a4: get_passwordField
                • 0xf085:$a5: set_encryptedPassword
                • 0x109d6:$a7: get_logins
                • 0x10687:$a8: GetOutlookPasswords
                • 0x10479:$a9: StartKeylogger
                • 0x10926:$a10: KeyLoggerEventArgs
                • 0x104d6:$a11: KeyLoggerEventArgsEventHandler
                0.2.FylY1FW6fl.exe.40dab28.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x13ffd:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x134fb:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x13809:$a4: \Orbitum\User Data\Default\Login Data
                • 0x14601:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 30 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FylY1FW6fl.exe", ParentImage: C:\Users\user\Desktop\FylY1FW6fl.exe, ParentProcessId: 1408, ParentProcessName: FylY1FW6fl.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", ProcessId: 5248, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FylY1FW6fl.exe", ParentImage: C:\Users\user\Desktop\FylY1FW6fl.exe, ParentProcessId: 1408, ParentProcessName: FylY1FW6fl.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", ProcessId: 5248, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FylY1FW6fl.exe", ParentImage: C:\Users\user\Desktop\FylY1FW6fl.exe, ParentProcessId: 1408, ParentProcessName: FylY1FW6fl.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe", ProcessId: 5248, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T21:46:33.704097+010028032742Potentially Bad Traffic192.168.2.749701132.226.8.16980TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "rock@supamemo.sbs", "Password": "W0kz);5}7i_aesKD", "Server": "mail.supamemo.sbs", "To": "rocee@supamemo.sbs", "Port": 587}
                Source: FylY1FW6fl.exeVirustotal: Detection: 74%Perma Link
                Source: FylY1FW6fl.exeReversingLabs: Detection: 76%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: FylY1FW6fl.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: FylY1FW6fl.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49703 version: TLS 1.0
                Source: FylY1FW6fl.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 02989731h4_2_02989480
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 02989E5Ah4_2_02989A40
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 02989E5Ah4_2_02989A30
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 02989E5Ah4_2_02989D87
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 056362B5h4_2_056360D8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05636C3Fh4_2_056360D8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 056318A0h4_2_056315F8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05633840h4_2_05633598
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 056326E0h4_2_05632438
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05630740h4_2_05630498
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 056349A0h4_2_056346F8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 056333E8h4_2_05633140
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then mov esp, ebp4_2_05639120
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_056351E8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05631448h4_2_056311A0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 056302E8h4_2_05630040
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05634548h4_2_056342A0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05630FF0h4_2_05630D48
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05632F90h4_2_05632CE8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 056340F0h4_2_05633E48
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05632152h4_2_05631EA8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05633C98h4_2_056339F0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_056359FB
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_0563581B
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05630B98h4_2_056308F0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05632B38h4_2_05632890
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05634DF8h4_2_05634B50
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4x nop then jmp 05631CF8h4_2_05631A50
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49701 -> 132.226.8.169:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49703 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B42000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: FylY1FW6fl.exe, 00000000.00000002.1243702755.000000000323C000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

                System Summary

                barindex
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: FylY1FW6fl.exe PID: 1408, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: FylY1FW6fl.exe PID: 6152, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_055BD74C0_2_055BD74C
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F55E80_2_078F55E8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F64580_2_078F6458
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FD2800_2_078FD280
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F42F00_2_078F42F0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FBC580_2_078FBC58
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FDB800_2_078FDB80
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F4BB00_2_078F4BB0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F37930_2_078F3793
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F37A00_2_078F37A0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F87390_2_078F8739
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F87480_2_078F8748
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FC6380_2_078FC638
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FC6480_2_078FC648
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F55DB0_2_078F55DB
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F85300_2_078F8530
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F85400_2_078F8540
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F63910_2_078F6391
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F633A0_2_078F633A
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F73380_2_078F7338
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F73310_2_078F7331
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F63710_2_078F6371
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F42DF0_2_078F42DF
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F42EF0_2_078F42EF
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FC2410_2_078FC241
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FC2500_2_078FC250
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F42500_2_078F4250
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FD2700_2_078FD270
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FE1200_2_078FE120
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FE1300_2_078FE130
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F50480_2_078F5048
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F50470_2_078F5047
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FBF000_2_078FBF00
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FBF100_2_078FBF10
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FBC480_2_078FBC48
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F4BAF0_2_078F4BAF
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F8BB80_2_078F8BB8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F8BB70_2_078F8BB7
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FDB700_2_078FDB70
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FCA080_2_078FCA08
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FCA070_2_078FCA07
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F89D80_2_078F89D8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F89D70_2_078F89D7
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FC8200_2_078FC820
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_0298C5304_2_0298C530
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_029894804_2_02989480
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_0298C5214_2_0298C521
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_02982DD14_2_02982DD1
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_0298946F4_2_0298946F
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056380304_2_05638030
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056360D84_2_056360D8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056373904_2_05637390
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05636D484_2_05636D48
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056379E04_2_056379E0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056315E84_2_056315E8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056315F84_2_056315F8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056335884_2_05633588
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056335984_2_05633598
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056324274_2_05632427
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056324384_2_05632438
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056304884_2_05630488
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056304984_2_05630498
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056346E94_2_056346E9
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056346F84_2_056346F8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056386B04_2_056386B0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_0563869F4_2_0563869F
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056331404_2_05633140
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056331324_2_05633132
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056351E84_2_056351E8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056351D84_2_056351D8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056311A04_2_056311A0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056311904_2_05631190
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056300404_2_05630040
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056380244_2_05638024
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056300074_2_05630007
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056360C94_2_056360C9
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056373804_2_05637380
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056342A04_2_056342A0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056342904_2_05634290
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05630D484_2_05630D48
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05636D374_2_05636D37
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05630D394_2_05630D39
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05632CE84_2_05632CE8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05632CD84_2_05632CD8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05633E484_2_05633E48
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05633E384_2_05633E38
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05631EA84_2_05631EA8
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05631E9A4_2_05631E9A
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056339E24_2_056339E2
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056339F04_2_056339F0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056379D04_2_056379D0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056308E14_2_056308E1
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056308F04_2_056308F0
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056328804_2_05632880
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_056328904_2_05632890
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05634B404_2_05634B40
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05634B504_2_05634B50
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05631A404_2_05631A40
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_05631A504_2_05631A50
                Source: FylY1FW6fl.exe, 00000000.00000000.1227567997.0000000000DA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedbPa.exe4 vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000000.00000002.1242169245.00000000012DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000000.00000002.1251195476.000000000A4E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000000.00000002.1248851723.0000000005A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000000.00000002.1243702755.000000000323C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exe, 00000004.00000002.2472937490.00000000009F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exeBinary or memory string: OriginalFilenamedbPa.exe4 vs FylY1FW6fl.exe
                Source: FylY1FW6fl.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: FylY1FW6fl.exe PID: 1408, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: FylY1FW6fl.exe PID: 6152, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: FylY1FW6fl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@2/2
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FylY1FW6fl.exe.logJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5884:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lvl14bdx.2j1.ps1Jump to behavior
                Source: FylY1FW6fl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: FylY1FW6fl.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002BAE000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002BBE000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2476383811.0000000003AFD000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002BED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: FylY1FW6fl.exeVirustotal: Detection: 74%
                Source: FylY1FW6fl.exeReversingLabs: Detection: 76%
                Source: unknownProcess created: C:\Users\user\Desktop\FylY1FW6fl.exe "C:\Users\user\Desktop\FylY1FW6fl.exe"
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe"
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess created: C:\Users\user\Desktop\FylY1FW6fl.exe "C:\Users\user\Desktop\FylY1FW6fl.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess created: C:\Users\user\Desktop\FylY1FW6fl.exe "C:\Users\user\Desktop\FylY1FW6fl.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: FylY1FW6fl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: FylY1FW6fl.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F77F7 push esi; ret 0_2_078F7806
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F542B push ecx; ret 0_2_078F5436
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F6302 push edx; ret 0_2_078F6304
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F6224 push eax; ret 0_2_078F6225
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F6157 push edx; ret 0_2_078F6159
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F6092 push ebx; ret 0_2_078F6094
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FD04B push CC078FCCh; retf 0_2_078FD051
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078FE05B pushfd ; ret 0_2_078FE061
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F5F00 push eax; ret 0_2_078F5F02
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F4ED8 push ebx; ret 0_2_078F4EE6
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F5CAA push esi; ret 0_2_078F5CAC
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F5CD8 push eax; ret 0_2_078F5CE7
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F5937 push ebx; ret 0_2_078F5938
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F5972 push ebx; ret 0_2_078F5974
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F5880 push edx; ret 0_2_078F5882
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 0_2_078F5854 push ebx; ret 0_2_078F5856
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeCode function: 4_2_0563BCDF push esp; retf 4_2_0563BD19
                Source: FylY1FW6fl.exeStatic PE information: section name: .text entropy: 7.595029409985664

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 1408, type: MEMORYSTR
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 3090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 5090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 7A40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 8A40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 8BE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 9BE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: A540000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: B540000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: C540000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: 28E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5669Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4140Jump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exe TID: 7152Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 60Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: FylY1FW6fl.exe, 00000000.00000002.1242169245.0000000001315000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\,o
                Source: FylY1FW6fl.exe, 00000004.00000002.2473880158.0000000000F55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe"
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeProcess created: C:\Users\user\Desktop\FylY1FW6fl.exe "C:\Users\user\Desktop\FylY1FW6fl.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Users\user\Desktop\FylY1FW6fl.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Users\user\Desktop\FylY1FW6fl.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 1408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 6152, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 1408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 6152, type: MEMORYSTR
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\FylY1FW6fl.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2475218687.0000000002BF3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 1408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 6152, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 1408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 6152, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40dab28.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FylY1FW6fl.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4adac38.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.40c4108.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FylY1FW6fl.exe.4a7fc18.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 1408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FylY1FW6fl.exe PID: 6152, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                11
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                11
                Disable or Modify Tools
                LSASS Memory1
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Software Packing
                Cached Domain Credentials1
                System Network Configuration Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync1
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem13
                System Information Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                FylY1FW6fl.exe74%VirustotalBrowse
                FylY1FW6fl.exe76%ReversingLabsByteCode-MSIL.Backdoor.njRAT
                FylY1FW6fl.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.32.1
                truefalse
                  high
                  checkip.dyndns.com
                  132.226.8.169
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/8.46.123.189lFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comdFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qFylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgdFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189dFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgdFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B42000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.org/dFylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFylY1FW6fl.exe, 00000000.00000002.1243702755.000000000323C000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot-/sendDocument?chat_id=FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.org/xml/FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2475218687.0000000002B4E000.00000004.00000800.00020000.00000000.sdmp, FylY1FW6fl.exe, 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      132.226.8.169
                                                      checkip.dyndns.comUnited States
                                                      16989UTMEMUSfalse
                                                      104.21.32.1
                                                      reallyfreegeoip.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1588136
                                                      Start date and time:2025-01-10 21:45:37 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 5m 36s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:17
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:FylY1FW6fl.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:ef8db8c775992ab8b93fccd7ded9c5cba67faba2bd0c1c6fff900fe87e79e62f.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@7/6@2/2
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 100%
                                                      • Number of executed functions: 81
                                                      • Number of non-executed functions: 48
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 2.23.242.162, 13.107.246.45, 4.245.163.56
                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtCreateKey calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      TimeTypeDescription
                                                      15:46:30API Interceptor2x Sleep call for process: FylY1FW6fl.exe modified
                                                      15:46:31API Interceptor12x Sleep call for process: powershell.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      132.226.8.169v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • checkip.dyndns.org/
                                                      xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • checkip.dyndns.org/
                                                      3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      104.21.32.1QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                      • www.mzkd6gp5.top/3u0p/
                                                      SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                      • redroomaudio.com/administrator/index.php
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      reallyfreegeoip.orgv4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.64.1
                                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.112.1
                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.48.1
                                                      19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.112.1
                                                      9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.32.1
                                                      y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.80.1
                                                      FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.64.1
                                                      ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.96.1
                                                      checkip.dyndns.comv4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.8.169
                                                      xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 193.122.6.168
                                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 158.101.44.242
                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 193.122.6.168
                                                      hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 193.122.6.168
                                                      19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.247.73
                                                      9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.6.168
                                                      y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 193.122.130.0
                                                      FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 193.122.6.168
                                                      ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.8.169
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      UTMEMUSv4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.8.169
                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.247.73
                                                      ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.8.169
                                                      CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 132.226.8.169
                                                      fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.247.73
                                                      xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 132.226.8.169
                                                      eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.247.73
                                                      3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.8.169
                                                      v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 132.226.247.73
                                                      CLOUDFLARENETUSv4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.64.1
                                                      HGhGAjCVw5.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      https://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      https://cocteldedeas.mx/rx567#cmVjaWJhc2VAc2VhbWFyaXRpbWEuY29tGet hashmaliciousHTMLPhisherBrowse
                                                      • 188.114.96.3
                                                      NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                                      • 104.21.80.1
                                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.112.1
                                                      http://unikuesolutions.com/ck/bd/%7BRANDOM_NUMBER05%7D/YmVuc29uLmxpbkB2aGFjb3JwLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                      • 188.114.96.3
                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 104.16.184.241
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      54328bd36c14bd82ddaa0c04b25ed9adv4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.32.1
                                                      19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.32.1
                                                      9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.32.1
                                                      y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.32.1
                                                      FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      No context
                                                      Process:C:\Users\user\Desktop\FylY1FW6fl.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.34331486778365
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):2232
                                                      Entropy (8bit):5.380805901110357
                                                      Encrypted:false
                                                      SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//8PUyus:lGLHyIFKL3IZ2KRH9Oug8s
                                                      MD5:F9B7CF60C22DBE6B73266580FFD54629
                                                      SHA1:05ED734C0A5EF2ECD025D4E39321ECDC96612623
                                                      SHA-256:880A3240A482AB826198F84F548F4CB5B906E4A2D7399D19E3EF60916B8D2D89
                                                      SHA-512:F55EFB17C1A45D594D165B9DC4FA2D1364B38AA2B0D1B3BAAE6E1E14B8F3BD77E3A28B7D89FA7F6BF3EEF3652434228B1A42BF9851F2CFBB6A7DCC0254AAAE38
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.589386827651128
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Windows Screen Saver (13104/52) 0.07%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      File name:FylY1FW6fl.exe
                                                      File size:684'032 bytes
                                                      MD5:b1ebcd89d248f11a6bbee488bdecfc07
                                                      SHA1:4ef62c22addafdae91dfc66d8fa5bc9fbd06cd2f
                                                      SHA256:ef8db8c775992ab8b93fccd7ded9c5cba67faba2bd0c1c6fff900fe87e79e62f
                                                      SHA512:48c23a05c14348ff2ad8137a14b111fecc000d0490ae2df50d2f7d84e9b93bcd7e499a2ac18ab8d5c92dcda45b6d33c89562d154463fb5679059a223cee49830
                                                      SSDEEP:12288:0iMKhM39TXsTAiALDKuxoMpn0c7TX2XRRfjgx6M0XiKu8h2cWp18:bMaciJuxPL7TXeRfjgwXluGy1
                                                      TLSH:95E4BFC03F3AB312DE6CB434852AEDB862592E74B104B9F36EDD3B5776991129A0CF14
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....RYg..............0..X...........v... ........@.. ....................................@................................
                                                      Icon Hash:335153b476545533
                                                      Entrypoint:0x4a76be
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x67595200 [Wed Dec 11 08:49:04 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      push ebx
                                                      add byte ptr [ecx+00h], bh
                                                      jnc 00007F1C08AE3A92h
                                                      je 00007F1C08AE3A92h
                                                      add byte ptr [ebp+00h], ch
                                                      add byte ptr [edx+00h], dl
                                                      add byte ptr [esi+00h], ah
                                                      insb
                                                      add byte ptr [ebp+00h], ah
                                                      arpl word ptr [eax], ax
                                                      je 00007F1C08AE3A92h
                                                      imul eax, dword ptr [eax], 006E006Fh
                                                      add byte ptr [ecx+00h], al
                                                      jnc 00007F1C08AE3A92h
                                                      jnc 00007F1C08AE3A92h
                                                      add byte ptr [ebp+00h], ch
                                                      bound eax, dword ptr [eax]
                                                      insb
                                                      add byte ptr [ecx+00h], bh
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      dec esp
                                                      add byte ptr [edi+00h], ch
                                                      popad
                                                      add byte ptr [eax+eax+00h], ah
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xa766c0x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x1294.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xa57040xa5800714743b6e379bb120a766544a0792d77False0.8523428648980362data7.595029409985664IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xa80000x12940x140070065f33e1204a7ab9b3eff71d9ab8edFalse0.7890625data6.741947251644161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xaa0000xc0x200638ca8454a4faacfd287f263cbd07650False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xa80c80xed4PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9444151738672286
                                                      RT_GROUP_ICON0xa8fac0x14data1.05
                                                      RT_VERSION0xa8fd00x2bedata0.4658119658119658
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2025-01-10T21:46:33.704097+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749701132.226.8.16980TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 21:46:32.565464020 CET4970180192.168.2.7132.226.8.169
                                                      Jan 10, 2025 21:46:32.571803093 CET8049701132.226.8.169192.168.2.7
                                                      Jan 10, 2025 21:46:32.571883917 CET4970180192.168.2.7132.226.8.169
                                                      Jan 10, 2025 21:46:32.572132111 CET4970180192.168.2.7132.226.8.169
                                                      Jan 10, 2025 21:46:32.577290058 CET8049701132.226.8.169192.168.2.7
                                                      Jan 10, 2025 21:46:33.380412102 CET8049701132.226.8.169192.168.2.7
                                                      Jan 10, 2025 21:46:33.385458946 CET4970180192.168.2.7132.226.8.169
                                                      Jan 10, 2025 21:46:33.390327930 CET8049701132.226.8.169192.168.2.7
                                                      Jan 10, 2025 21:46:33.662003994 CET8049701132.226.8.169192.168.2.7
                                                      Jan 10, 2025 21:46:33.682529926 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:46:33.682549953 CET44349703104.21.32.1192.168.2.7
                                                      Jan 10, 2025 21:46:33.683044910 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:46:33.689646959 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:46:33.689657927 CET44349703104.21.32.1192.168.2.7
                                                      Jan 10, 2025 21:46:33.704097033 CET4970180192.168.2.7132.226.8.169
                                                      Jan 10, 2025 21:46:34.163556099 CET44349703104.21.32.1192.168.2.7
                                                      Jan 10, 2025 21:46:34.163654089 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:46:34.170244932 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:46:34.170252085 CET44349703104.21.32.1192.168.2.7
                                                      Jan 10, 2025 21:46:34.170542002 CET44349703104.21.32.1192.168.2.7
                                                      Jan 10, 2025 21:46:34.219564915 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:46:34.226138115 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:46:34.267322063 CET44349703104.21.32.1192.168.2.7
                                                      Jan 10, 2025 21:46:34.340730906 CET44349703104.21.32.1192.168.2.7
                                                      Jan 10, 2025 21:46:34.340781927 CET44349703104.21.32.1192.168.2.7
                                                      Jan 10, 2025 21:46:34.340881109 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:46:34.350656986 CET49703443192.168.2.7104.21.32.1
                                                      Jan 10, 2025 21:47:38.661099911 CET8049701132.226.8.169192.168.2.7
                                                      Jan 10, 2025 21:47:38.661190033 CET4970180192.168.2.7132.226.8.169
                                                      Jan 10, 2025 21:48:13.673903942 CET4970180192.168.2.7132.226.8.169
                                                      Jan 10, 2025 21:48:13.678817034 CET8049701132.226.8.169192.168.2.7
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 21:46:32.519125938 CET6520053192.168.2.71.1.1.1
                                                      Jan 10, 2025 21:46:32.527332067 CET53652001.1.1.1192.168.2.7
                                                      Jan 10, 2025 21:46:33.674303055 CET5202453192.168.2.71.1.1.1
                                                      Jan 10, 2025 21:46:33.681689978 CET53520241.1.1.1192.168.2.7
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 10, 2025 21:46:32.519125938 CET192.168.2.71.1.1.10xb353Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:33.674303055 CET192.168.2.71.1.1.10xf238Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 10, 2025 21:46:32.527332067 CET1.1.1.1192.168.2.70xb353No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                      Jan 10, 2025 21:46:32.527332067 CET1.1.1.1192.168.2.70xb353No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:32.527332067 CET1.1.1.1192.168.2.70xb353No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:32.527332067 CET1.1.1.1192.168.2.70xb353No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:32.527332067 CET1.1.1.1192.168.2.70xb353No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:32.527332067 CET1.1.1.1192.168.2.70xb353No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:33.681689978 CET1.1.1.1192.168.2.70xf238No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:33.681689978 CET1.1.1.1192.168.2.70xf238No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:33.681689978 CET1.1.1.1192.168.2.70xf238No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:33.681689978 CET1.1.1.1192.168.2.70xf238No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:33.681689978 CET1.1.1.1192.168.2.70xf238No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:33.681689978 CET1.1.1.1192.168.2.70xf238No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 21:46:33.681689978 CET1.1.1.1192.168.2.70xf238No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                      • reallyfreegeoip.org
                                                      • checkip.dyndns.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.749701132.226.8.169806152C:\Users\user\Desktop\FylY1FW6fl.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 21:46:32.572132111 CET151OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Connection: Keep-Alive
                                                      Jan 10, 2025 21:46:33.380412102 CET273INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 20:46:33 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                      Jan 10, 2025 21:46:33.385458946 CET127OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Jan 10, 2025 21:46:33.662003994 CET273INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 20:46:33 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.749703104.21.32.14436152C:\Users\user\Desktop\FylY1FW6fl.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-10 20:46:34 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                      Host: reallyfreegeoip.org
                                                      Connection: Keep-Alive
                                                      2025-01-10 20:46:34 UTC859INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 20:46:34 GMT
                                                      Content-Type: text/xml
                                                      Content-Length: 362
                                                      Connection: close
                                                      Age: 1856783
                                                      Cache-Control: max-age=31536000
                                                      cf-cache-status: HIT
                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=riQatBmpxY7IR%2FAXw%2BbvDbG1EYu3X4pPzq7Imd%2BMlgA3Z1zdZhU71WDBlmz2oVKkmE47Nzwqmnhkf4LxLbgs3kfDB1BcWonZVPFQ8B72QAdqWNw6zlbbY%2FidoRX2Ny8D%2BvlQsSUt"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fff84683ef61875-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1927&min_rtt=1577&rtt_var=1292&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=666362&cwnd=153&unsent_bytes=0&cid=b1174a6a2ad8f093&ts=193&x=0"
                                                      2025-01-10 20:46:34 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:15:46:29
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\FylY1FW6fl.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\FylY1FW6fl.exe"
                                                      Imagebase:0xda0000
                                                      File size:684'032 bytes
                                                      MD5 hash:B1EBCD89D248F11A6BBEE488BDECFC07
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1244205988.0000000004099000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1244205988.0000000004903000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:15:46:30
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FylY1FW6fl.exe"
                                                      Imagebase:0xa60000
                                                      File size:433'152 bytes
                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:15:46:30
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\FylY1FW6fl.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\FylY1FW6fl.exe"
                                                      Imagebase:0x7c0000
                                                      File size:684'032 bytes
                                                      MD5 hash:B1EBCD89D248F11A6BBEE488BDECFC07
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.2472600878.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2475218687.0000000002BF3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:5
                                                      Start time:15:46:30
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff75da10000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:15:46:32
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                      Imagebase:0x7ff7fb730000
                                                      File size:496'640 bytes
                                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                      Has elevated privileges:true
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:10.1%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:98
                                                        Total number of Limit Nodes:7
                                                        execution_graph 23784 55bd1d8 23785 55bd21e GetCurrentProcess 23784->23785 23787 55bd269 23785->23787 23788 55bd270 GetCurrentThread 23785->23788 23787->23788 23789 55bd2ad GetCurrentProcess 23788->23789 23790 55bd2a6 23788->23790 23791 55bd2e3 23789->23791 23790->23789 23792 55bd30b GetCurrentThreadId 23791->23792 23793 55bd33c 23792->23793 23861 55b4668 23862 55b4672 23861->23862 23866 55b4758 23861->23866 23871 55b3e1c 23862->23871 23864 55b468d 23867 55b4765 23866->23867 23877 55b4858 23867->23877 23881 55b4868 23867->23881 23872 55b3e27 23871->23872 23889 55b5c60 23872->23889 23874 55b6f9a 23893 55b5c70 23874->23893 23876 55b6fac 23876->23864 23879 55b4868 23877->23879 23878 55b496c 23878->23878 23879->23878 23885 55b449c 23879->23885 23882 55b488f 23881->23882 23883 55b496c 23882->23883 23884 55b449c CreateActCtxA 23882->23884 23884->23883 23886 55b58f8 CreateActCtxA 23885->23886 23888 55b59bb 23886->23888 23888->23888 23890 55b5c6b 23889->23890 23891 55b5c70 2 API calls 23890->23891 23892 55b7050 23891->23892 23892->23874 23894 55b5c7b 23893->23894 23897 55b5cc8 23894->23897 23896 55b7175 23896->23876 23898 55b5cd3 23897->23898 23899 55b5cf8 2 API calls 23898->23899 23900 55b725a 23899->23900 23900->23896 23901 55bd828 DuplicateHandle 23902 55bd8be 23901->23902 23794 55b71f0 23795 55b71f3 23794->23795 23796 55b7256 23794->23796 23801 55b5cf8 23795->23801 23798 55b725a 23796->23798 23799 55b5cf8 2 API calls 23796->23799 23805 55b7297 23796->23805 23799->23798 23802 55b5d03 23801->23802 23809 55b5d28 23802->23809 23804 55b734d 23804->23798 23806 55b729b 23805->23806 23807 55b5d28 2 API calls 23806->23807 23808 55b734d 23807->23808 23808->23798 23811 55b5d33 23809->23811 23810 55b8689 23810->23804 23812 55b864b 23811->23812 23815 55bacf3 23811->23815 23812->23810 23821 55bcde0 23812->23821 23816 55bacfa 23815->23816 23818 55bac9e 23815->23818 23826 55bad18 23816->23826 23829 55bad28 23816->23829 23817 55bad06 23817->23812 23818->23812 23822 55bce11 23821->23822 23823 55bce35 23822->23823 23843 55bd0b1 23822->23843 23847 55bd0c0 23822->23847 23823->23810 23832 55bb20b 23826->23832 23827 55bad37 23827->23817 23830 55bad37 23829->23830 23831 55bb20b 2 API calls 23829->23831 23830->23817 23831->23830 23833 55bb239 23832->23833 23834 55bb25c 23832->23834 23833->23834 23835 55bb254 23833->23835 23839 55bb4b0 23833->23839 23834->23827 23835->23834 23836 55bb460 GetModuleHandleW 23835->23836 23837 55bb48d 23836->23837 23837->23827 23840 55bb461 GetModuleHandleW 23839->23840 23842 55bb4ba 23839->23842 23841 55bb48d 23840->23841 23841->23835 23842->23835 23845 55bd0cd 23843->23845 23844 55bd107 23844->23823 23845->23844 23851 55bb140 23845->23851 23849 55bd0cd 23847->23849 23848 55bb140 2 API calls 23850 55bd107 23848->23850 23849->23848 23849->23850 23850->23823 23852 55bb14b 23851->23852 23854 55bde20 23852->23854 23857 55bd46c 23852->23857 23855 55b5d28 2 API calls 23854->23855 23856 55bde8f 23855->23856 23856->23844 23858 55bd477 23857->23858 23859 55b5d28 2 API calls 23858->23859 23860 55bde8f 23859->23860 23860->23854 23903 78fb470 23904 78fb4b8 VirtualProtect 23903->23904 23905 78fb4f2 23904->23905

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 44 78f633a-78f6346 46 78f6398-78f63c0 44->46 47 78f6348-78f634a 44->47 49 78f6419-78f647d 46->49 50 78f63c2-78f6418 46->50 47->46 54 78f647f 49->54 55 78f6484-78f64c0 49->55 50->49 54->55 122 78f64c2 call 78f6a0f 55->122 123 78f64c2 call 78f6a10 55->123 57 78f64c8 58 78f64cf-78f64eb 57->58 59 78f64ed 58->59 60 78f64f4-78f64f5 58->60 59->57 59->60 61 78f664f-78f6661 59->61 62 78f682f-78f6846 59->62 63 78f66ed-78f66f1 59->63 64 78f674d-78f6759 59->64 65 78f684b-78f6852 59->65 66 78f668b-78f66a2 59->66 67 78f662a-78f664a 59->67 68 78f66a7-78f66bc 59->68 69 78f6527-78f6539 59->69 70 78f6666-78f6686 59->70 71 78f65c6-78f65d8 59->71 72 78f6805-78f6811 59->72 73 78f66c1-78f66ce 59->73 74 78f6600-78f660c 59->74 75 78f671d-78f6721 59->75 76 78f65dd-78f65fb 59->76 77 78f653b-78f6544 59->77 78 78f67db-78f67e1 59->78 79 78f64fa-78f64fe 59->79 80 78f66d3-78f66e8 59->80 81 78f6570-78f6588 59->81 60->65 61->58 62->58 82 78f6704-78f670b 63->82 83 78f66f3-78f6702 63->83 90 78f675b 64->90 91 78f6760-78f6776 64->91 66->58 67->58 68->58 69->58 70->58 71->58 84 78f6818-78f682a 72->84 85 78f6813 72->85 73->58 92 78f660e 74->92 93 78f6613-78f6625 74->93 88 78f6734-78f673b 75->88 89 78f6723-78f6732 75->89 76->58 96 78f6557-78f655e 77->96 97 78f6546-78f6555 77->97 124 78f67e3 call 78f6dc1 78->124 125 78f67e3 call 78f6dd0 78->125 94 78f6511-78f6518 79->94 95 78f6500-78f650f 79->95 80->58 86 78f658f-78f65a5 81->86 87 78f658a 81->87 100 78f6712-78f6718 82->100 83->100 84->58 85->84 110 78f65ac-78f65c1 86->110 111 78f65a7 86->111 87->86 101 78f6742-78f6748 88->101 89->101 90->91 112 78f677d-78f6793 91->112 113 78f6778 91->113 92->93 93->58 104 78f651f-78f6525 94->104 95->104 98 78f6565-78f656b 96->98 97->98 98->58 99 78f67e9-78f6800 99->58 100->58 101->58 104->58 110->58 111->110 116 78f679a-78f67b0 112->116 117 78f6795 112->117 113->112 119 78f67b7-78f67d6 116->119 120 78f67b2 116->120 117->116 119->58 120->119 122->57 123->57 124->99 125->99
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ry$ry
                                                        • API String ID: 0-883804406
                                                        • Opcode ID: 5c5488115f39bb4647ffb5a32fa66403bdd3fd117da7228f28a02499fde845f1
                                                        • Instruction ID: b8acd4ef6814fd9c8626403c43c29c001d30e24294f8e90d472868a619ef08d0
                                                        • Opcode Fuzzy Hash: 5c5488115f39bb4647ffb5a32fa66403bdd3fd117da7228f28a02499fde845f1
                                                        • Instruction Fuzzy Hash: 2BF1BEB5E1420ADFCB04DFA9D4814AEFBB2FF99310B20865AD505EB244E735A946CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 126 78f6391-78f6394 127 78f63f6-78f6418 126->127 128 78f6396-78f63c0 126->128 130 78f6419-78f647d 127->130 128->130 133 78f63c2-78f63f5 128->133 134 78f647f 130->134 135 78f6484-78f64c0 130->135 133->127 134->135 205 78f64c2 call 78f6a0f 135->205 206 78f64c2 call 78f6a10 135->206 138 78f64c8 139 78f64cf-78f64eb 138->139 140 78f64ed 139->140 141 78f64f4-78f64f5 139->141 140->138 140->141 142 78f664f-78f6661 140->142 143 78f682f-78f6846 140->143 144 78f66ed-78f66f1 140->144 145 78f674d-78f6759 140->145 146 78f684b-78f6852 140->146 147 78f668b-78f66a2 140->147 148 78f662a-78f664a 140->148 149 78f66a7-78f66bc 140->149 150 78f6527-78f6539 140->150 151 78f6666-78f6686 140->151 152 78f65c6-78f65d8 140->152 153 78f6805-78f6811 140->153 154 78f66c1-78f66ce 140->154 155 78f6600-78f660c 140->155 156 78f671d-78f6721 140->156 157 78f65dd-78f65fb 140->157 158 78f653b-78f6544 140->158 159 78f67db-78f67e1 140->159 160 78f64fa-78f64fe 140->160 161 78f66d3-78f66e8 140->161 162 78f6570-78f6588 140->162 141->146 142->139 143->139 163 78f6704-78f670b 144->163 164 78f66f3-78f6702 144->164 171 78f675b 145->171 172 78f6760-78f6776 145->172 147->139 148->139 149->139 150->139 151->139 152->139 165 78f6818-78f682a 153->165 166 78f6813 153->166 154->139 173 78f660e 155->173 174 78f6613-78f6625 155->174 169 78f6734-78f673b 156->169 170 78f6723-78f6732 156->170 157->139 177 78f6557-78f655e 158->177 178 78f6546-78f6555 158->178 203 78f67e3 call 78f6dc1 159->203 204 78f67e3 call 78f6dd0 159->204 175 78f6511-78f6518 160->175 176 78f6500-78f650f 160->176 161->139 167 78f658f-78f65a5 162->167 168 78f658a 162->168 181 78f6712-78f6718 163->181 164->181 165->139 166->165 191 78f65ac-78f65c1 167->191 192 78f65a7 167->192 168->167 182 78f6742-78f6748 169->182 170->182 171->172 193 78f677d-78f6793 172->193 194 78f6778 172->194 173->174 174->139 185 78f651f-78f6525 175->185 176->185 179 78f6565-78f656b 177->179 178->179 179->139 180 78f67e9-78f6800 180->139 181->139 182->139 185->139 191->139 192->191 197 78f679a-78f67b0 193->197 198 78f6795 193->198 194->193 200 78f67b7-78f67d6 197->200 201 78f67b2 197->201 198->197 200->139 201->200 203->180 204->180 205->138 206->138
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ry$ry
                                                        • API String ID: 0-883804406
                                                        • Opcode ID: 7134ea2693703fbe10eb6c2ef83e1c5f7129639356cbae1c4006be45f84e1811
                                                        • Instruction ID: a987e60de8e4246716eeb4345c105321370a7e667976502deed983434f8e321f
                                                        • Opcode Fuzzy Hash: 7134ea2693703fbe10eb6c2ef83e1c5f7129639356cbae1c4006be45f84e1811
                                                        • Instruction Fuzzy Hash: FEE1BEB5E1420ADFCB04DFA9D4814AEFBB2FF99310F20865AD505EB244E735A946CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 207 78f6371-78f6388 208 78f63ec-78f647d 207->208 209 78f638a-78f638e 207->209 213 78f647f 208->213 214 78f6484-78f64c0 208->214 209->208 213->214 283 78f64c2 call 78f6a0f 214->283 284 78f64c2 call 78f6a10 214->284 216 78f64c8 217 78f64cf-78f64eb 216->217 218 78f64ed 217->218 219 78f64f4-78f64f5 217->219 218->216 218->219 220 78f664f-78f6661 218->220 221 78f682f-78f6846 218->221 222 78f66ed-78f66f1 218->222 223 78f674d-78f6759 218->223 224 78f684b-78f6852 218->224 225 78f668b-78f66a2 218->225 226 78f662a-78f664a 218->226 227 78f66a7-78f66bc 218->227 228 78f6527-78f6539 218->228 229 78f6666-78f6686 218->229 230 78f65c6-78f65d8 218->230 231 78f6805-78f6811 218->231 232 78f66c1-78f66ce 218->232 233 78f6600-78f660c 218->233 234 78f671d-78f6721 218->234 235 78f65dd-78f65fb 218->235 236 78f653b-78f6544 218->236 237 78f67db-78f67e1 218->237 238 78f64fa-78f64fe 218->238 239 78f66d3-78f66e8 218->239 240 78f6570-78f6588 218->240 219->224 220->217 221->217 241 78f6704-78f670b 222->241 242 78f66f3-78f6702 222->242 249 78f675b 223->249 250 78f6760-78f6776 223->250 225->217 226->217 227->217 228->217 229->217 230->217 243 78f6818-78f682a 231->243 244 78f6813 231->244 232->217 251 78f660e 233->251 252 78f6613-78f6625 233->252 247 78f6734-78f673b 234->247 248 78f6723-78f6732 234->248 235->217 255 78f6557-78f655e 236->255 256 78f6546-78f6555 236->256 281 78f67e3 call 78f6dc1 237->281 282 78f67e3 call 78f6dd0 237->282 253 78f6511-78f6518 238->253 254 78f6500-78f650f 238->254 239->217 245 78f658f-78f65a5 240->245 246 78f658a 240->246 259 78f6712-78f6718 241->259 242->259 243->217 244->243 269 78f65ac-78f65c1 245->269 270 78f65a7 245->270 246->245 260 78f6742-78f6748 247->260 248->260 249->250 271 78f677d-78f6793 250->271 272 78f6778 250->272 251->252 252->217 263 78f651f-78f6525 253->263 254->263 257 78f6565-78f656b 255->257 256->257 257->217 258 78f67e9-78f6800 258->217 259->217 260->217 263->217 269->217 270->269 275 78f679a-78f67b0 271->275 276 78f6795 271->276 272->271 278 78f67b7-78f67d6 275->278 279 78f67b2 275->279 276->275 278->217 279->278 281->258 282->258 283->216 284->216
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ry$ry
                                                        • API String ID: 0-883804406
                                                        • Opcode ID: ef9ada4a8f577eafeb4d4893e5f30ba8df79cccc60756e6b5c7fcd49fb76d4b5
                                                        • Instruction ID: 2d981c439d5b365546547a445ff01b3be03bc71d09ca3cc067035d7cdd6f8ffb
                                                        • Opcode Fuzzy Hash: ef9ada4a8f577eafeb4d4893e5f30ba8df79cccc60756e6b5c7fcd49fb76d4b5
                                                        • Instruction Fuzzy Hash: A3E17AB4E1420ADFCB04DFA9D4859AEFBB2FF99300F108659D605EB244E734A946CF94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 285 78f6458-78f647d 286 78f647f 285->286 287 78f6484-78f64c0 285->287 286->287 356 78f64c2 call 78f6a0f 287->356 357 78f64c2 call 78f6a10 287->357 289 78f64c8 290 78f64cf-78f64eb 289->290 291 78f64ed 290->291 292 78f64f4-78f64f5 290->292 291->289 291->292 293 78f664f-78f6661 291->293 294 78f682f-78f6846 291->294 295 78f66ed-78f66f1 291->295 296 78f674d-78f6759 291->296 297 78f684b-78f6852 291->297 298 78f668b-78f66a2 291->298 299 78f662a-78f664a 291->299 300 78f66a7-78f66bc 291->300 301 78f6527-78f6539 291->301 302 78f6666-78f6686 291->302 303 78f65c6-78f65d8 291->303 304 78f6805-78f6811 291->304 305 78f66c1-78f66ce 291->305 306 78f6600-78f660c 291->306 307 78f671d-78f6721 291->307 308 78f65dd-78f65fb 291->308 309 78f653b-78f6544 291->309 310 78f67db-78f67e1 291->310 311 78f64fa-78f64fe 291->311 312 78f66d3-78f66e8 291->312 313 78f6570-78f6588 291->313 292->297 293->290 294->290 314 78f6704-78f670b 295->314 315 78f66f3-78f6702 295->315 322 78f675b 296->322 323 78f6760-78f6776 296->323 298->290 299->290 300->290 301->290 302->290 303->290 316 78f6818-78f682a 304->316 317 78f6813 304->317 305->290 324 78f660e 306->324 325 78f6613-78f6625 306->325 320 78f6734-78f673b 307->320 321 78f6723-78f6732 307->321 308->290 328 78f6557-78f655e 309->328 329 78f6546-78f6555 309->329 354 78f67e3 call 78f6dc1 310->354 355 78f67e3 call 78f6dd0 310->355 326 78f6511-78f6518 311->326 327 78f6500-78f650f 311->327 312->290 318 78f658f-78f65a5 313->318 319 78f658a 313->319 332 78f6712-78f6718 314->332 315->332 316->290 317->316 342 78f65ac-78f65c1 318->342 343 78f65a7 318->343 319->318 333 78f6742-78f6748 320->333 321->333 322->323 344 78f677d-78f6793 323->344 345 78f6778 323->345 324->325 325->290 336 78f651f-78f6525 326->336 327->336 330 78f6565-78f656b 328->330 329->330 330->290 331 78f67e9-78f6800 331->290 332->290 333->290 336->290 342->290 343->342 348 78f679a-78f67b0 344->348 349 78f6795 344->349 345->344 351 78f67b7-78f67d6 348->351 352 78f67b2 348->352 349->348 351->290 352->351 354->331 355->331 356->289 357->289
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ry$ry
                                                        • API String ID: 0-883804406
                                                        • Opcode ID: 60cb2bb6895491035b8ef319e4ca9b5e6a1961dcc099d8e50f475a4f1a8a19bf
                                                        • Instruction ID: 0208df01bd0cc3bc928cf3532b185b4e40d59b4e266a3613608a2b033e185384
                                                        • Opcode Fuzzy Hash: 60cb2bb6895491035b8ef319e4ca9b5e6a1961dcc099d8e50f475a4f1a8a19bf
                                                        • Instruction Fuzzy Hash: E2C126B0E1421ADFCB04DFA9C4858AEFBB2FF99300B108659D615EB354D734AA42CF94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 358 78fd280-78fd2a5 359 78fd2ac-78fd2dd 358->359 360 78fd2a7 358->360 361 78fd2de 359->361 360->359 362 78fd2e5-78fd301 361->362 363 78fd30a-78fd30b 362->363 364 78fd303 362->364 377 78fd577-78fd580 363->377 364->361 364->363 365 78fd3af-78fd3b2 364->365 366 78fd36c-78fd393 364->366 367 78fd48b-78fd4b2 364->367 368 78fd44b-78fd45e 364->368 369 78fd52a-78fd53c 364->369 370 78fd463-78fd478 364->370 371 78fd541-78fd558 364->371 372 78fd3e0-78fd3f7 364->372 373 78fd47d-78fd486 364->373 374 78fd55d-78fd572 364->374 375 78fd3fc-78fd40f 364->375 376 78fd398-78fd3aa 364->376 364->377 378 78fd4b7-78fd4ca 364->378 379 78fd4f6-78fd50e 364->379 380 78fd414-78fd418 364->380 381 78fd354-78fd367 364->381 382 78fd513-78fd525 364->382 383 78fd310-78fd341 364->383 395 78fd3b5 call 78fb5ac 365->395 396 78fd3b5 call 78fd6c1 365->396 366->362 367->362 368->362 369->362 370->362 371->362 372->362 373->362 374->362 375->362 376->362 384 78fd4dd-78fd4e4 378->384 385 78fd4cc-78fd4db 378->385 379->362 386 78fd42b-78fd432 380->386 387 78fd41a-78fd429 380->387 381->362 382->362 397 78fd344 call 78fd8e0 383->397 398 78fd344 call 78fd8f0 383->398 392 78fd4eb-78fd4f1 384->392 385->392 388 78fd439-78fd446 386->388 387->388 388->362 392->362 393 78fd3bb-78fd3db 393->362 394 78fd34a-78fd352 394->362 395->393 396->393 397->394 398->394
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: TuA$UC;"
                                                        • API String ID: 0-2071649361
                                                        • Opcode ID: 7f9be8c15de10f73de91125ba948704fb82453975a9590e241e0880d11e67a78
                                                        • Instruction ID: 7a1dcd1fbffb8673dae05970a59b6c1a1d7b72e7dd1115b7b96fcdada4556537
                                                        • Opcode Fuzzy Hash: 7f9be8c15de10f73de91125ba948704fb82453975a9590e241e0880d11e67a78
                                                        • Instruction Fuzzy Hash: 00911AB5E2520DDFCB08CFE5D89059EFBB2EF99310F10942AE619AB264D7309542CF54

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 399 78fd270-78fd2a5 400 78fd2ac-78fd2dd 399->400 401 78fd2a7 399->401 402 78fd2de 400->402 401->400 403 78fd2e5-78fd301 402->403 404 78fd30a-78fd30b 403->404 405 78fd303 403->405 418 78fd577-78fd580 404->418 405->402 405->404 406 78fd3af-78fd3b2 405->406 407 78fd36c-78fd393 405->407 408 78fd48b-78fd4b2 405->408 409 78fd44b-78fd45e 405->409 410 78fd52a-78fd53c 405->410 411 78fd463-78fd478 405->411 412 78fd541-78fd558 405->412 413 78fd3e0-78fd3f7 405->413 414 78fd47d-78fd486 405->414 415 78fd55d-78fd572 405->415 416 78fd3fc-78fd40f 405->416 417 78fd398-78fd3aa 405->417 405->418 419 78fd4b7-78fd4ca 405->419 420 78fd4f6-78fd50e 405->420 421 78fd414-78fd418 405->421 422 78fd354-78fd367 405->422 423 78fd513-78fd525 405->423 424 78fd310-78fd341 405->424 438 78fd3b5 call 78fb5ac 406->438 439 78fd3b5 call 78fd6c1 406->439 407->403 408->403 409->403 410->403 411->403 412->403 413->403 414->403 415->403 416->403 417->403 425 78fd4dd-78fd4e4 419->425 426 78fd4cc-78fd4db 419->426 420->403 427 78fd42b-78fd432 421->427 428 78fd41a-78fd429 421->428 422->403 423->403 436 78fd344 call 78fd8e0 424->436 437 78fd344 call 78fd8f0 424->437 433 78fd4eb-78fd4f1 425->433 426->433 429 78fd439-78fd446 427->429 428->429 429->403 433->403 434 78fd3bb-78fd3db 434->403 435 78fd34a-78fd352 435->403 436->435 437->435 438->434 439->434
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: TuA$UC;"
                                                        • API String ID: 0-2071649361
                                                        • Opcode ID: 61f5f55945494eda1fdf8df69cae9165ae006ca5b5dce37b0f2d2db839fc2132
                                                        • Instruction ID: 90f3b4e33789661ca83a6fc85ebd31aac0b30045ed9c7b287dff2c78213b3c00
                                                        • Opcode Fuzzy Hash: 61f5f55945494eda1fdf8df69cae9165ae006ca5b5dce37b0f2d2db839fc2132
                                                        • Instruction Fuzzy Hash: DC912AB1E2520DDFCB08CFA5D99059EFBB2EF89310F10942AE619E7264D730A941CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: z^I
                                                        • API String ID: 0-307258731
                                                        • Opcode ID: c5f9adcc997697b687f5463cbacaef7b6486a92f1c7dd9d47f352f5e017becd6
                                                        • Instruction ID: 7d12689c66c3ab29a65572ffcf5de34b134ef2db631ae9744c6ee6795ef3be74
                                                        • Opcode Fuzzy Hash: c5f9adcc997697b687f5463cbacaef7b6486a92f1c7dd9d47f352f5e017becd6
                                                        • Instruction Fuzzy Hash: 5AB135B5E1425ACFCB04CFA9D880ADEFBB2FF89310F24902AD459AB214D7349946CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: z^I
                                                        • API String ID: 0-307258731
                                                        • Opcode ID: d1b9449f50b047a4b3d0ce547869fbf35bb65c8b53d1bd0448f43e69af428cf4
                                                        • Instruction ID: 980a13f8dfd99171ca13f84caaaa147cbf93fca5e2094182efcc3d644fce233a
                                                        • Opcode Fuzzy Hash: d1b9449f50b047a4b3d0ce547869fbf35bb65c8b53d1bd0448f43e69af428cf4
                                                        • Instruction Fuzzy Hash: 77A134B4E142598FCB04CFE9C884ADEFBB2FF89310F20952AD419AB258D7349946CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: z^I
                                                        • API String ID: 0-307258731
                                                        • Opcode ID: 6f3e82f04bacaf66021efc987ed84d20afc48ca4539de1d23766aded092c6d50
                                                        • Instruction ID: ac8ae0898b61543d1fe657c4a3b5a7462fcdb528994653ff3389e5b3f4667893
                                                        • Opcode Fuzzy Hash: 6f3e82f04bacaf66021efc987ed84d20afc48ca4539de1d23766aded092c6d50
                                                        • Instruction Fuzzy Hash: D791D3B4E142198FCB08CFEAC584A9EFBB2FF89314F24942AD519BB264D7349905CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: z^I
                                                        • API String ID: 0-307258731
                                                        • Opcode ID: 520728190fab8c180d4360dae3b017211aa99a050ca91afb48fe1e64da7ad6c6
                                                        • Instruction ID: 5d5f088cc18e777a3daab45d7c820e2fde7c7fabf19c979215ee788f8bc1f40d
                                                        • Opcode Fuzzy Hash: 520728190fab8c180d4360dae3b017211aa99a050ca91afb48fe1e64da7ad6c6
                                                        • Instruction Fuzzy Hash: 4391D3B4E142198FDB08CFE9C584A9EFBB2FF89304F24942AD519BB268D7349905CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 5=6
                                                        • API String ID: 0-2897083178
                                                        • Opcode ID: 6c0864e4bd905e54646010e843d656275cec391b50f1b2c5d520d6825ab3d26e
                                                        • Instruction ID: 3ebd36c604b8037d177367a99723a0da60f444f91d780d9348660ce55f1156ef
                                                        • Opcode Fuzzy Hash: 6c0864e4bd905e54646010e843d656275cec391b50f1b2c5d520d6825ab3d26e
                                                        • Instruction Fuzzy Hash: E4714AB4E1520E9FCB04DFA6D8414AEFFB6FF89221F10E92AD115E7254DB349A018F64
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 5=6
                                                        • API String ID: 0-2897083178
                                                        • Opcode ID: b27ce22e25750924bdbce440472878cd9b37d17a37217d4538e35c35aac6ce63
                                                        • Instruction ID: 19085d1db1ac8d4b8dcb9a333f487eba1aed022bc5441293703c5bb5462b37a5
                                                        • Opcode Fuzzy Hash: b27ce22e25750924bdbce440472878cd9b37d17a37217d4538e35c35aac6ce63
                                                        • Instruction Fuzzy Hash: 53613AB4E1520E9FCB04CFA6D8414AEFFB6FF89221F10A92AD116E7254DB349A018F54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: -2m
                                                        • API String ID: 0-2686427999
                                                        • Opcode ID: 8b02d0c672e74073cad082a449f910485fa0e192888f373f4d04c6d9f8d9e59e
                                                        • Instruction ID: c87fd1f41c7a82ceca993add5b50bd8be76324c7f28e5e21de02bb6aa9e942e7
                                                        • Opcode Fuzzy Hash: 8b02d0c672e74073cad082a449f910485fa0e192888f373f4d04c6d9f8d9e59e
                                                        • Instruction Fuzzy Hash: 25512AB4E142598FDB08CF9AD5806AEFBF2FF89310F24D06AD519F7254D73459408B64
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: -2m
                                                        • API String ID: 0-2686427999
                                                        • Opcode ID: 0825f63f0b835bb0302fb85fc7cec7ad546fb6a2bf44682f63981c70796e88f0
                                                        • Instruction ID: a7dbcd85bfc673ef40d2544be292ca9547540ff4b33e5001971a5f55d7d0d6bc
                                                        • Opcode Fuzzy Hash: 0825f63f0b835bb0302fb85fc7cec7ad546fb6a2bf44682f63981c70796e88f0
                                                        • Instruction Fuzzy Hash: 665148B0E142498BDB08CFAAC5806AEFBF2FF89310F24D06AD519A7254D7348A418B64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 44f1aa93e80df57a2e6b1faa0bdaa300f16a36879f2888be1445d6fd6ff5bf55
                                                        • Instruction ID: 876f104c2cb4bb3f2c8d18cdb4013125e6e8e1b04f9354d16351a414e87290ed
                                                        • Opcode Fuzzy Hash: 44f1aa93e80df57a2e6b1faa0bdaa300f16a36879f2888be1445d6fd6ff5bf55
                                                        • Instruction Fuzzy Hash: 33B1F6B1E1520DDFCB18CFA6D58459EFBB2BF99310F20942AD215EB254DB349A06CF60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8f8564d7a8dae67c306ef71273a7fd849cf6754d87785042f7f5ca1a93511c85
                                                        • Instruction ID: 600a171a2751be5e3d4678c27fef774afa894ba3e67efe81eb46e44d68736567
                                                        • Opcode Fuzzy Hash: 8f8564d7a8dae67c306ef71273a7fd849cf6754d87785042f7f5ca1a93511c85
                                                        • Instruction Fuzzy Hash: 72B117B1E152099FCB18CFA6D58469EFBB2BF99310F20942AD215EB254DB349A02CF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f210fc493617787af8afab22f244c9f1467aa0429b250d0aea890993496897bc
                                                        • Instruction ID: a58d323bf839aabd9e5c5e4d9be726fe6ff80761185b968cfb76ff8f5adf9df2
                                                        • Opcode Fuzzy Hash: f210fc493617787af8afab22f244c9f1467aa0429b250d0aea890993496897bc
                                                        • Instruction Fuzzy Hash: 8B2124B1E016188BDB18CFABD8446DEBBB3BFC9310F14C06AD509A6264DB355A46CF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8d6615f4ec93e622f58876357c9cbac5ab99127b8fa8bfc13aa08c5461aac564
                                                        • Instruction ID: 8dd4e283a90c0480ba47a9177b8d4f0927b36c16f0efc87f509d01ad2dcf343d
                                                        • Opcode Fuzzy Hash: 8d6615f4ec93e622f58876357c9cbac5ab99127b8fa8bfc13aa08c5461aac564
                                                        • Instruction Fuzzy Hash: 7521E7B1E006189BEB18CFABC94578EBFF3AFC9310F14C169D409A6258DB755946CF90

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 055BD256
                                                        • GetCurrentThread.KERNEL32 ref: 055BD293
                                                        • GetCurrentProcess.KERNEL32 ref: 055BD2D0
                                                        • GetCurrentThreadId.KERNEL32 ref: 055BD329
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: e515477c776a949ca147a5bfda934f4b33b9980441f72c8152f9e55ccd563192
                                                        • Instruction ID: 294e2a0cb8684851810c2b3bfc93cffe947f4b8b7a9bca92b32eafda18f11928
                                                        • Opcode Fuzzy Hash: e515477c776a949ca147a5bfda934f4b33b9980441f72c8152f9e55ccd563192
                                                        • Instruction Fuzzy Hash: B55176B09013498FEB14DFAAD549BEEBBF1FF88314F208459E019A72A0DB749845CF65

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 055BD256
                                                        • GetCurrentThread.KERNEL32 ref: 055BD293
                                                        • GetCurrentProcess.KERNEL32 ref: 055BD2D0
                                                        • GetCurrentThreadId.KERNEL32 ref: 055BD329
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: f2280cd868dac0fc9d262063c9cadefce7a5eea8e486f071799ce0e8ef286a99
                                                        • Instruction ID: 6915e15053166afe4b1f4df8eb154bc92b8404d6f8b0e9e80dcb3616af623068
                                                        • Opcode Fuzzy Hash: f2280cd868dac0fc9d262063c9cadefce7a5eea8e486f071799ce0e8ef286a99
                                                        • Instruction Fuzzy Hash: F35155B09003498FEB14DFAAD549BDEBBF1FB88314F208419E019A72A0DB74A945CF65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 440 55bb20b-55bb237 441 55bb239-55bb246 call 55b9d9c 440->441 442 55bb263-55bb267 440->442 447 55bb248 441->447 448 55bb25c 441->448 443 55bb27b-55bb2bc 442->443 444 55bb269-55bb273 442->444 451 55bb2c9-55bb2d7 443->451 452 55bb2be-55bb2c6 443->452 444->443 496 55bb24e call 55bb4c0 447->496 497 55bb24e call 55bb4b0 447->497 448->442 454 55bb2fb-55bb2fd 451->454 455 55bb2d9-55bb2de 451->455 452->451 453 55bb254-55bb256 453->448 458 55bb398-55bb458 453->458 459 55bb300-55bb307 454->459 456 55bb2e9 455->456 457 55bb2e0-55bb2e7 call 55b9da8 455->457 461 55bb2eb-55bb2f9 456->461 457->461 491 55bb45a-55bb45d 458->491 492 55bb460-55bb48b GetModuleHandleW 458->492 462 55bb309-55bb311 459->462 463 55bb314-55bb31b 459->463 461->459 462->463 465 55bb328-55bb331 call 55b9db8 463->465 466 55bb31d-55bb325 463->466 471 55bb33e-55bb343 465->471 472 55bb333-55bb33b 465->472 466->465 474 55bb361-55bb36e 471->474 475 55bb345-55bb34c 471->475 472->471 481 55bb391-55bb397 474->481 482 55bb370-55bb38e 474->482 475->474 476 55bb34e-55bb35e call 55b9dc8 call 55bae14 475->476 476->474 482->481 491->492 493 55bb48d-55bb493 492->493 494 55bb494-55bb4a8 492->494 493->494 496->453 497->453
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 055BB47E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: be67f0ff671d66415cca57f5abb87f0a44cc7c0f623b9dc1a99176cc80ce64a3
                                                        • Instruction ID: c266d44249cfc45c88d8d1f65aaaf13505114f433c7d30fae57515c565794ed5
                                                        • Opcode Fuzzy Hash: be67f0ff671d66415cca57f5abb87f0a44cc7c0f623b9dc1a99176cc80ce64a3
                                                        • Instruction Fuzzy Hash: DA817C70A00B059FE724DF6AD4557AABBF1FF88310F00892ED486D7A50DBB5E845CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 498 55b449c-55b59b9 CreateActCtxA 501 55b59bb-55b59c1 498->501 502 55b59c2-55b5a1c 498->502 501->502 509 55b5a2b-55b5a2f 502->509 510 55b5a1e-55b5a21 502->510 511 55b5a31-55b5a3d 509->511 512 55b5a40 509->512 510->509 511->512 514 55b5a41 512->514 514->514
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 055B59A9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 95b5fa99d104643c4bd0ef951615dc2285e048137186f8d7c01882fbfabeb409
                                                        • Instruction ID: bedb602f87f32a727ee960656050c7c6a85ff2178d2422704854a253e21d3399
                                                        • Opcode Fuzzy Hash: 95b5fa99d104643c4bd0ef951615dc2285e048137186f8d7c01882fbfabeb409
                                                        • Instruction Fuzzy Hash: 1241C2B0C00719CBEB24DFA9C844BCDBBF5BF49304F208169D408AB251EBB56946CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 515 55b58ed-55b58f4 516 55b58fc-55b59b9 CreateActCtxA 515->516 518 55b59bb-55b59c1 516->518 519 55b59c2-55b5a1c 516->519 518->519 526 55b5a2b-55b5a2f 519->526 527 55b5a1e-55b5a21 519->527 528 55b5a31-55b5a3d 526->528 529 55b5a40 526->529 527->526 528->529 531 55b5a41 529->531 531->531
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 055B59A9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 031f5f97bf90603ac881ddc6143a3c75227d90989f511c4f8f5170380511b48c
                                                        • Instruction ID: 40d3c6c867abe7862e82f817385b8118df1c38fb20f242f0dc8e30827fc81bb7
                                                        • Opcode Fuzzy Hash: 031f5f97bf90603ac881ddc6143a3c75227d90989f511c4f8f5170380511b48c
                                                        • Instruction Fuzzy Hash: CA41D2B1C00719CBEB28DFA9C8847CDBBF1BF49304F20815AD409AB251EBB56946CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 532 55bd823 533 55bd828-55bd8bc DuplicateHandle 532->533 534 55bd8be-55bd8c4 533->534 535 55bd8c5-55bd8e2 533->535 534->535
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 055BD8AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 47ffd6411650f21813d3a16d4e13bd0fe7978a936f7b8d74cfefac40f6a1fa08
                                                        • Instruction ID: 6bf77540af46269e56bfd58d7b784b740895536c85c2c1fb821c7868fee46a6d
                                                        • Opcode Fuzzy Hash: 47ffd6411650f21813d3a16d4e13bd0fe7978a936f7b8d74cfefac40f6a1fa08
                                                        • Instruction Fuzzy Hash: 3821E3B5D00248AFDB10CF9AD885ADEBBF9FB48310F14801AE914A7350D375A944CFA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 538 55bd828-55bd8bc DuplicateHandle 539 55bd8be-55bd8c4 538->539 540 55bd8c5-55bd8e2 538->540 539->540
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 055BD8AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: c6d2f607a1951e696e1046e73fb0347c1d3a694cf7a682e565d8134e1e358b1b
                                                        • Instruction ID: 492de5405ab64c6cb24ba735df2e6266547d9c91533d579707948a8e24e32e13
                                                        • Opcode Fuzzy Hash: c6d2f607a1951e696e1046e73fb0347c1d3a694cf7a682e565d8134e1e358b1b
                                                        • Instruction Fuzzy Hash: EA21E4B5D002489FDB10CF9AD884ADEBBF9FB48310F14801AE914A7350D375A944CFA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 562 78fb468-78fb4f0 VirtualProtect 565 78fb4f9-78fb51a 562->565 566 78fb4f2-78fb4f8 562->566 566->565
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 078FB4E3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 0e8ff362e8ec7545dfe05a23dc510428ec78776e41e2647c6acde1369ce0392b
                                                        • Instruction ID: 50cda4cb038deff74daaf5ed8083a237baaa82b284aba5c37a6015c50de67214
                                                        • Opcode Fuzzy Hash: 0e8ff362e8ec7545dfe05a23dc510428ec78776e41e2647c6acde1369ce0392b
                                                        • Instruction Fuzzy Hash: DD2136B5C003499FCB20DF9AC885BDEFBF4EB48320F108429E928A3240D778A545CFA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 543 55bb4b0-55bb4b8 544 55bb4ba-55bb4d6 call 55b9d9c 543->544 545 55bb461-55bb48b GetModuleHandleW 543->545 552 55bb4d8-55bb4e9 call 55bae34 544->552 553 55bb506-55bb50b 544->553 546 55bb48d-55bb493 545->546 547 55bb494-55bb4a8 545->547 546->547 556 55bb4eb-55bb4f4 call 55bae40 552->556 557 55bb4fd-55bb504 call 55bae4c 552->557 560 55bb4f9-55bb4fb 556->560 557->553 560->553
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 055BB47E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 72ac06195d7b10db07408a3704165112315111da02218e0e034845efa39ce5ce
                                                        • Instruction ID: 092a34340e7deac1399bd97f504b491970996a3883049c83ccb3e7499a3273ef
                                                        • Opcode Fuzzy Hash: 72ac06195d7b10db07408a3704165112315111da02218e0e034845efa39ce5ce
                                                        • Instruction Fuzzy Hash: E7118275A002059FE710DF6AE8087EAB7FAFBC4320F14847AD519D3250DAB998058BA1
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 078FB4E3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: cb4643c316a06329c766d347f7ffe8f0893d2cd76a62b62613ea104a66640504
                                                        • Instruction ID: 5f10de0c14dff38a9b894cd3ce9da3f1d8968cc2dbe53013d52830f4c5ba7e67
                                                        • Opcode Fuzzy Hash: cb4643c316a06329c766d347f7ffe8f0893d2cd76a62b62613ea104a66640504
                                                        • Instruction Fuzzy Hash: 742106B5D002499FCB10DF9AC544BDEFBF4EB48320F108429E958A7250D778A544CFA1
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 055BB47E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 3ca0f2e3471d88d2b67416d9823101c29039b7792223c20d3bcafa4cea04b046
                                                        • Instruction ID: 1efd824a24ce19298116a5b0926bb3bcaa771d781ae7aaa440ea4970823fbdee
                                                        • Opcode Fuzzy Hash: 3ca0f2e3471d88d2b67416d9823101c29039b7792223c20d3bcafa4cea04b046
                                                        • Instruction Fuzzy Hash: 9C11D2B5C003498FDB20DF9AC444ADEFBF5FB48224F10841AD429A7610C3B9A545CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1242760262.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_150d000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f789de9c893b7cbf90509769671f65de029ff5eb8657a4e86825ec6ccc02356
                                                        • Instruction ID: 6a40daccd61b9a37ef34c768116f7d1615818c75223aecb88e365a7644a2c7c9
                                                        • Opcode Fuzzy Hash: 1f789de9c893b7cbf90509769671f65de029ff5eb8657a4e86825ec6ccc02356
                                                        • Instruction Fuzzy Hash: C421B071504240DFDB16DFD4D9C0B2ABFB5FB88328F248569ED090E296C336D456CAA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1242836692.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151d000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 442e184bd829e76db2abb0b0b5f4f0e4cfd374dc3ff6805a6fdaa82a642b3d34
                                                        • Instruction ID: 6884bebb89e499a112abf47bf23bb9418e423a7d1b7a5aa2f9e197919064207d
                                                        • Opcode Fuzzy Hash: 442e184bd829e76db2abb0b0b5f4f0e4cfd374dc3ff6805a6fdaa82a642b3d34
                                                        • Instruction Fuzzy Hash: 91210771604300DFEB16DF94D9C8B55BBB5FB84324F20CA6DD8694F25AC33AD446CA61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1242836692.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151d000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 52f50400d096053d8ae5cfaa868e695b98a61dfb9c18841aac6ce33701af5d64
                                                        • Instruction ID: 5635d31aa224ab32a895a66c69e49d21c8e99af2bba3c12b70f2323c1a79cd94
                                                        • Opcode Fuzzy Hash: 52f50400d096053d8ae5cfaa868e695b98a61dfb9c18841aac6ce33701af5d64
                                                        • Instruction Fuzzy Hash: 2321D375604204DFEB16DF54D9C8B16BBB5FB84314F20C96DD8494F24AD33AD847CA62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1242836692.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151d000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 633a973b0392aea5afd143805043def8c787567dd228b4e7d6dda905a1c357e6
                                                        • Instruction ID: dd9e7ddde0cdd142a12787ffe1076cc9c0a60527dac2d72d12c1f876f189ffca
                                                        • Opcode Fuzzy Hash: 633a973b0392aea5afd143805043def8c787567dd228b4e7d6dda905a1c357e6
                                                        • Instruction Fuzzy Hash: 02218E755093808FDB07CF24D994B15BF71FB46214F28C5EAD8498F2A7C33A984ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1242760262.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_150d000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                        • Instruction ID: 7e8c7e255647ac96b4c0747a319657b501abe8029fa81eadc922e705483a1bd3
                                                        • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                        • Instruction Fuzzy Hash: CE119D76504280CFCB16CF94D5C4B1ABF72FB88324F2486A9DC490B696C33AD45ACBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1242836692.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151d000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                        • Instruction ID: cda9c198e29f4b0ee8961ede6d23068f62074231e70b4c8388b0cb37972f38e6
                                                        • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                        • Instruction Fuzzy Hash: 5611BB75504280DFDB06DF58C5C4B59BBB2FB84324F24C6ADD8594F69AC33AD40ACB61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: {#L
                                                        • API String ID: 0-1361971085
                                                        • Opcode ID: a4f4ec2e77da67d6f22b9b06d3aee9820a45995a9b5f098fe60e6b2490069db2
                                                        • Instruction ID: 8c5c63e6fbc2b2aa152d15ac467a6b91a34e34e2170110dc64427f1ba7f2b273
                                                        • Opcode Fuzzy Hash: a4f4ec2e77da67d6f22b9b06d3aee9820a45995a9b5f098fe60e6b2490069db2
                                                        • Instruction Fuzzy Hash: 46D101B0E1461DDBCB18CFAAC98059EFBF6BF99340F14D52AD419EB268D73099428F50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: {#L
                                                        • API String ID: 0-1361971085
                                                        • Opcode ID: 9997b020d0c6a8bede4ea4dffb971e382e56e464c4c7db5a0c35680ceea64d06
                                                        • Instruction ID: 9e7eaa60be03abdb46c0ef2e5b7435af7b57ae80edf9a00168a30999a20beaec
                                                        • Opcode Fuzzy Hash: 9997b020d0c6a8bede4ea4dffb971e382e56e464c4c7db5a0c35680ceea64d06
                                                        • Instruction Fuzzy Hash: 4AD111B0E1461DDBCB08CFAAC98059EFBF6BF89240F14D56AD419EB268D73099428F50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 98R
                                                        • API String ID: 0-576591972
                                                        • Opcode ID: 0a22a1e7205166ff0725931e9722d95115d4572f731c98ed29d9ab564266f709
                                                        • Instruction ID: 19b42c1a7428748dd61872fbaec35b1ad1fe180b0cb47667dc2729dc6ddfa8e7
                                                        • Opcode Fuzzy Hash: 0a22a1e7205166ff0725931e9722d95115d4572f731c98ed29d9ab564266f709
                                                        • Instruction Fuzzy Hash: A07123B5E1120ADFCB04CFA9D4819AEFBB1FB99350F10852AD515EB314D334AA92CF94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 98R
                                                        • API String ID: 0-576591972
                                                        • Opcode ID: d654c840aa9e650b0bf009f62864e84ba0f394e0501c5f9b3c5e9e3b99d04dda
                                                        • Instruction ID: 8b10827d0d52a7a3c9a3a0cab16c8125f9cfff59e3dd33d6a8f650893547ee51
                                                        • Opcode Fuzzy Hash: d654c840aa9e650b0bf009f62864e84ba0f394e0501c5f9b3c5e9e3b99d04dda
                                                        • Instruction Fuzzy Hash: CB6125B5E1020ADFCB04CFA9D4819AEFBB2FB99350F10852AD515EB314D334AA52CF90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: iUfo
                                                        • API String ID: 0-3820436262
                                                        • Opcode ID: 1a14d9d6071b44dd752c50af76b09f24c1f49cd14642f57e6c2fb646a5979c8b
                                                        • Instruction ID: e72778482d0d8362cd9c0430894993ba0bb138dbbe7268561684ceccfe856df8
                                                        • Opcode Fuzzy Hash: 1a14d9d6071b44dd752c50af76b09f24c1f49cd14642f57e6c2fb646a5979c8b
                                                        • Instruction Fuzzy Hash: 445101B5E1121D9BCB08CFEAD8455AEBBB2FF89310F10942AE505FB254EB345A41CB64
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: iUfo
                                                        • API String ID: 0-3820436262
                                                        • Opcode ID: 35626fdf0576e4e3c3799f665bed0dc270ae49ee3b10f1b23e4c9a34d99cee46
                                                        • Instruction ID: d8ac50d542b807a79dac8c0dbff6e62a2731ff184677dfe9745e6e03d7d3888a
                                                        • Opcode Fuzzy Hash: 35626fdf0576e4e3c3799f665bed0dc270ae49ee3b10f1b23e4c9a34d99cee46
                                                        • Instruction Fuzzy Hash: 8A51F1B5E1121D9BCB08CFE9D9456ADBBF2FF89310F10942AE505F7254EB345A018B64
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: w7e^
                                                        • API String ID: 0-1657886525
                                                        • Opcode ID: acf94a3f7b167ab4c3b82c02568562053fdb5720e6f23eef84e911382b9271cd
                                                        • Instruction ID: 7ccfe31dd0209b23a45b2baf7149f5ab059180bddac0c199079c26ced8d80c7d
                                                        • Opcode Fuzzy Hash: acf94a3f7b167ab4c3b82c02568562053fdb5720e6f23eef84e911382b9271cd
                                                        • Instruction Fuzzy Hash: A55134B4D1520EDFCB44CFAAC8415EEBBB2FB99200F24956AC516F7244D3389B058F68
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: w7e^
                                                        • API String ID: 0-1657886525
                                                        • Opcode ID: f69719e7f0b66af4b4d7dd472029e6b486c51d00634df6a3efc8fc4fe24e921d
                                                        • Instruction ID: 3eb9711a30a6e5dc0b3ee8a010b3140321967e13f24bec601c594015c2323e92
                                                        • Opcode Fuzzy Hash: f69719e7f0b66af4b4d7dd472029e6b486c51d00634df6a3efc8fc4fe24e921d
                                                        • Instruction Fuzzy Hash: C94135B4D1521DDBCF44CFAAC8406EEFBB1FB8A200F14A52AC516BB254D3385646CF68
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: w7e^
                                                        • API String ID: 0-1657886525
                                                        • Opcode ID: e4c915655cc44b6147375529f8e3ec72ec744134cc2dcf9757f2a141f259e4f1
                                                        • Instruction ID: 0787370886a040f09c6334ebae0499e7111a46b51bb3cbb3abf4dd30f660b1ff
                                                        • Opcode Fuzzy Hash: e4c915655cc44b6147375529f8e3ec72ec744134cc2dcf9757f2a141f259e4f1
                                                        • Instruction Fuzzy Hash: 6C4154B0D1520EDBCB48CFAAC8412EEFBB1FB89200F14A52AC102B7254D73856468F68
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0ni
                                                        • API String ID: 0-1488673370
                                                        • Opcode ID: 53d9bc3eb8b31bf3af20209fe311d2bea8b43218c386ca7f3a45ef187f5415f5
                                                        • Instruction ID: 35646a755e5fca7342d82cdcc8e8798cad1d9f87353d1fc7c2720fac2cd9b9be
                                                        • Opcode Fuzzy Hash: 53d9bc3eb8b31bf3af20209fe311d2bea8b43218c386ca7f3a45ef187f5415f5
                                                        • Instruction Fuzzy Hash: 9B516BB1E146188BDB68DF6B8D4579EFBF3AFC8200F14C1BA950CA6214DB301A858F51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0ni
                                                        • API String ID: 0-1488673370
                                                        • Opcode ID: 15a3e1fda8cd0423afb7ec4540baeb202a40ceb4c2c86c0efa0561c049061f1c
                                                        • Instruction ID: 7c5b84665cb23d9b5f83468112c87c8efea50b0e0f8093971f89655122ca79af
                                                        • Opcode Fuzzy Hash: 15a3e1fda8cd0423afb7ec4540baeb202a40ceb4c2c86c0efa0561c049061f1c
                                                        • Instruction Fuzzy Hash: C6412AB1E156188BEB58DF6B8D4579AFBF3AFC8200F14C1BA950CA6264DB301A858F51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1247728749.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_55b0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 483f279f81edde03b740908afeea23f95be281275f32a54743e04666dd20afba
                                                        • Instruction ID: 4c06a086c52732ab9e8ce0ff3d7f18bbcd32608213ea7ec97a654f830225b82b
                                                        • Opcode Fuzzy Hash: 483f279f81edde03b740908afeea23f95be281275f32a54743e04666dd20afba
                                                        • Instruction Fuzzy Hash: E5A18436F0020A9FDF15DFB4C9485EEB7B2FF85300B1585AAE805AB261DB71E955CB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 474fa28651ed00f19cf20a88bedb2fbc71d601b9d1b4021c4a1d77981ced90a8
                                                        • Instruction ID: e8b07f245e67c6f122133ca896b9636200178ffd800be5da2025a20ff81dc37a
                                                        • Opcode Fuzzy Hash: 474fa28651ed00f19cf20a88bedb2fbc71d601b9d1b4021c4a1d77981ced90a8
                                                        • Instruction Fuzzy Hash: 779100B0A1421ADFDB04CFA9C98499EFBF2FF99314F649569D505EB220D330AA41CF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: deed60ce3c79b6c0a89ea7227172b01ea3c9bcf42461c7c99953c00bfe7cb279
                                                        • Instruction ID: 038a3ca8ad136fa8649cc22bfc776b5f60370bca943f532c89121e32274482d7
                                                        • Opcode Fuzzy Hash: deed60ce3c79b6c0a89ea7227172b01ea3c9bcf42461c7c99953c00bfe7cb279
                                                        • Instruction Fuzzy Hash: 1C8102B4A2421ADFDB04CF99C98499EFBF2FF99314F648569D505EB220D330AA41CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4991d31f7ef727e7d2bfe5e94776b2e606ba8e5278701cbddc3fafe42bbc018f
                                                        • Instruction ID: 4a02ea51722fdfa03eeec24d38fde9dac04bc948240b8a0075735b06a2b0b3a1
                                                        • Opcode Fuzzy Hash: 4991d31f7ef727e7d2bfe5e94776b2e606ba8e5278701cbddc3fafe42bbc018f
                                                        • Instruction Fuzzy Hash: 7A8129B4E10219CBDB54DF69C580AAEFBB6FF89300F2481AAD508A7255D734AE41CF61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be2b4bad9cd33d17914b3a6166dd4afd5c0c0c9d0e48b28454f2ca1dfcf54e92
                                                        • Instruction ID: c3e32820fd79e2544d4aa8a73f5f78f90a46d1aca2f78499a37d3547f7b166bc
                                                        • Opcode Fuzzy Hash: be2b4bad9cd33d17914b3a6166dd4afd5c0c0c9d0e48b28454f2ca1dfcf54e92
                                                        • Instruction Fuzzy Hash: F47119B4E256098FCB04CFA9C981ADEFBF2FF99210F24942AD505F7364D3349A418B64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e7d09b9276c7859c5e7da28ec4ebae9cd3f7fbd3dde0480e4899804b1135a9c6
                                                        • Instruction ID: a8d46c75ae25e821d141b16f3c1ae96062711a26bd3ebbd75a9b30920dee6d68
                                                        • Opcode Fuzzy Hash: e7d09b9276c7859c5e7da28ec4ebae9cd3f7fbd3dde0480e4899804b1135a9c6
                                                        • Instruction Fuzzy Hash: F971D6B4E25609CFCB04CFA9C9809DEFBF2FF99210F24942AD515F7264D7349A818B64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3c327e79c463a0c48b396b107bfd5e8e84a4ae5c0740d1aefc3fb73f9e54c835
                                                        • Instruction ID: ce2b17ee4efa47c0a86ea4a791c135c046737c6bb2e41b4a3a260f1b2d748272
                                                        • Opcode Fuzzy Hash: 3c327e79c463a0c48b396b107bfd5e8e84a4ae5c0740d1aefc3fb73f9e54c835
                                                        • Instruction Fuzzy Hash: 68812AB4D10219CBDB54DF69C5806AEFBB6BF89300F24C1A9D408A7355D734AE41CF61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3ac4e8a096aa377dd12f2a53952600c68f541db06e508aa3c78799d5d454c74a
                                                        • Instruction ID: b1fa7789c5fa30999300ff7946f4eceb0d1968d0e1053c0de6e0d07a4d94b21c
                                                        • Opcode Fuzzy Hash: 3ac4e8a096aa377dd12f2a53952600c68f541db06e508aa3c78799d5d454c74a
                                                        • Instruction Fuzzy Hash: FD41D4B0E1520ADBCB44CFAAC5816AEFBF2FF99300F24D56AC505F7214D7349A418BA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 993d8d0a5dd2667d75d88922dd057c03b3182e06499d89057f333eb1fd30a206
                                                        • Instruction ID: f3f51f336ce4856bc875f04057944744efc7f77c943ee320c87b61072c6ded53
                                                        • Opcode Fuzzy Hash: 993d8d0a5dd2667d75d88922dd057c03b3182e06499d89057f333eb1fd30a206
                                                        • Instruction Fuzzy Hash: 024117B0E1520EDFCB44CFA6C5416AEFBF2EB99304F20946A8119F7264E3749B418F94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c8f5d50705d71622ee49e3ae8127340a3b2fe515d89f0b6263354c0cc4e8dedd
                                                        • Instruction ID: 99fb3d8dbdff300312a1bc731f67f4c6b3699d04c9c59927e01e9d4f695eee0a
                                                        • Opcode Fuzzy Hash: c8f5d50705d71622ee49e3ae8127340a3b2fe515d89f0b6263354c0cc4e8dedd
                                                        • Instruction Fuzzy Hash: 674128B1E1560ADFCB04CFA5C5416AEFBB2EF99304F24956AC119E7264E3748B018B94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0b203c9dde0d4b23e8a60721332c6896fa28aed9f6e681109438ea848aaa8fc2
                                                        • Instruction ID: b5a33a3ee0614c9fbc29cfdb03b28ff6c0133c54102d9a03ab4d53860ee6a4d0
                                                        • Opcode Fuzzy Hash: 0b203c9dde0d4b23e8a60721332c6896fa28aed9f6e681109438ea848aaa8fc2
                                                        • Instruction Fuzzy Hash: 4B41F5B4E0420A9FCB48CFAAC4816AEFBF2BF99300F14C42AD515F7254D7349A428F94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 55cc128251ddbf1f7175f679b04614ae30fc0d4e083a2f078e1b204acb2efe4c
                                                        • Instruction ID: c34b47280077eefe649790711cecdc98fb7653932413dadb5ce51703c4421b91
                                                        • Opcode Fuzzy Hash: 55cc128251ddbf1f7175f679b04614ae30fc0d4e083a2f078e1b204acb2efe4c
                                                        • Instruction Fuzzy Hash: BC4136B0E1520ADBCB04CFAAC5819AEFBF2FF99310F24D56AC505E7254D7309A41CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 949f13322801d7bb402d36b4ebf92af63f3527b73a3e195665aeefae29245d1d
                                                        • Instruction ID: 63b76ce32410e761a738dd05d89ae3bb9f9016eee001ae3b2ddebae6e752a7b2
                                                        • Opcode Fuzzy Hash: 949f13322801d7bb402d36b4ebf92af63f3527b73a3e195665aeefae29245d1d
                                                        • Instruction Fuzzy Hash: 8741C1B0E0520ADFCB48CFAAC4856AEFBF2BB99300F14C46AD515F7254D7349A418F94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b9b54a4850ffa7259e96d34139e2810f3bbe813850ccc2072e8ec05a9b4fe783
                                                        • Instruction ID: 0d1f4df7ced0e5b0ddc84ea084af4663f17b9d895a73ebd2407c3fb73ff4769a
                                                        • Opcode Fuzzy Hash: b9b54a4850ffa7259e96d34139e2810f3bbe813850ccc2072e8ec05a9b4fe783
                                                        • Instruction Fuzzy Hash: 3721FCB2E006189BEB18CFABDC4179EFBF3AFC8200F08C076C518A6254EB3415528F51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1249457105.00000000078F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_78f0000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ae6fb2522c157d3922f27036f3d93f77e1115e98f0dad6e3cfd3ac203416bdd0
                                                        • Instruction ID: 62392d6f601409615da18f4ab2cee5585cf9b8747109ca0786fb556b0f37aafd
                                                        • Opcode Fuzzy Hash: ae6fb2522c157d3922f27036f3d93f77e1115e98f0dad6e3cfd3ac203416bdd0
                                                        • Instruction Fuzzy Hash: 9F11BCB1E106189BEB18CFABDC4069EFBF7AFC9200F14C17AC91CA6254EB7406558F55

                                                        Execution Graph

                                                        Execution Coverage:10.1%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:2
                                                        Total number of Limit Nodes:0
                                                        execution_graph 23919 563a4c8 DuplicateHandle 23920 563a55e 23919->23920
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: N
                                                        • API String ID: 0-1130791706
                                                        • Opcode ID: 39be0a4f0b3f2dd4331bd8fb9c13ce153fb607efa24c4390bb452488e37e9f87
                                                        • Instruction ID: 7632ecb4ba2bea7ce65df21eabb1c01002a2bebbabcf8874ac0be49e37626288
                                                        • Opcode Fuzzy Hash: 39be0a4f0b3f2dd4331bd8fb9c13ce153fb607efa24c4390bb452488e37e9f87
                                                        • Instruction Fuzzy Hash: EF73F531C1075A8EDB11EF68C854A99FBB1FF99300F15D69AE44877261EB70AAC4CF81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 796 56360d8-56360f8 797 56360fa 796->797 798 56360ff-5636181 796->798 797->798 800 56361e6-56361fc 798->800 801 5636183-563618c 800->801 802 56361fe-5636248 800->802 803 5636193-56361dc call 5635cc8 801->803 804 563618e 801->804 810 56362b3-56362b4 802->810 811 563624a-563628b 802->811 812 56361e3 803->812 813 56361de 803->813 804->803 814 56362b5-56362e6 810->814 819 56362ad-56362ae 811->819 820 563628d-56362ab 811->820 812->800 813->812 818 56362ed-5636354 814->818 826 5636ca6-5636cdb 818->826 827 563635a-563637b 818->827 821 56362af-56362b1 819->821 820->821 821->814 830 5636c83-5636c9f 827->830 831 5636380-5636389 830->831 832 5636ca5 830->832 833 5636390-56363f6 831->833 834 563638b 831->834 832->826 838 56363f8 833->838 839 56363fd-5636487 833->839 834->833 838->839 845 5636499-56364a0 839->845 846 5636489-5636490 839->846 847 56364a2 845->847 848 56364a7-56364b4 845->848 849 5636492 846->849 850 5636497 846->850 847->848 851 56364b6 848->851 852 56364bb-56364c2 848->852 849->850 850->848 851->852 853 56364c4 852->853 854 56364c9-5636520 852->854 853->854 857 5636522 854->857 858 5636527-563653e 854->858 857->858 859 5636540-5636547 858->859 860 5636549-5636551 858->860 861 5636552-563655c 859->861 860->861 862 5636563-563656c 861->862 863 563655e 861->863 864 5636c53-5636c59 862->864 863->862 865 5636571-563657d 864->865 866 5636c5f-5636c79 864->866 867 5636584-5636589 865->867 868 563657f 865->868 872 5636c80 866->872 873 5636c7b 866->873 869 563658b-5636597 867->869 870 56365cc-56365ce 867->870 868->867 875 5636599 869->875 876 563659e-56365a3 869->876 874 56365d4-56365e8 870->874 872->830 873->872 878 5636c31-5636c3e 874->878 879 56365ee-5636603 874->879 875->876 876->870 877 56365a5-56365b2 876->877 880 56365b4 877->880 881 56365b9-56365ca 877->881 884 5636c3f-5636c49 878->884 882 5636605 879->882 883 563660a-5636690 879->883 880->881 881->874 882->883 891 5636692-56366b8 883->891 892 56366ba 883->892 885 5636c50 884->885 886 5636c4b 884->886 885->864 886->885 893 56366c4-56366e4 891->893 892->893 895 5636863-5636868 893->895 896 56366ea-56366f4 893->896 899 563686a-563688a 895->899 900 56368cc-56368ce 895->900 897 56366f6 896->897 898 56366fb-5636724 896->898 897->898 902 5636726-5636730 898->902 903 563673e-5636740 898->903 913 56368b4 899->913 914 563688c-56368b2 899->914 901 56368d4-56368f4 900->901 905 5636c2b-5636c2c 901->905 906 56368fa-5636904 901->906 908 5636732 902->908 909 5636737-563673d 902->909 904 56367df-56367ee 903->904 915 56367f0 904->915 916 56367f5-56367fa 904->916 912 5636c2d-5636c2f 905->912 910 5636906 906->910 911 563690b-5636934 906->911 908->909 909->903 910->911 920 5636936-5636940 911->920 921 563694e-563695c 911->921 912->884 917 56368be-56368ca 913->917 914->917 915->916 918 5636824-5636826 916->918 919 56367fc-563680c 916->919 917->901 924 563682c-5636840 918->924 922 5636813-5636822 919->922 923 563680e 919->923 925 5636942 920->925 926 5636947-563694d 920->926 927 56369fb-5636a0a 921->927 922->924 923->922 929 5636846-563685e 924->929 930 5636745-5636760 924->930 925->926 926->921 931 5636a11-5636a16 927->931 932 5636a0c 927->932 929->912 933 5636762 930->933 934 5636767-56367d1 930->934 935 5636a40-5636a42 931->935 936 5636a18-5636a28 931->936 932->931 933->934 953 56367d3 934->953 954 56367d8-56367de 934->954 937 5636a48-5636a5c 935->937 938 5636a2a 936->938 939 5636a2f-5636a3e 936->939 940 5636a62-5636acb 937->940 941 5636961-563697c 937->941 938->939 939->937 951 5636ad4-5636c27 940->951 952 5636acd-5636acf 940->952 943 5636983-56369ed 941->943 944 563697e 941->944 958 56369f4-56369fa 943->958 959 56369ef 943->959 944->943 955 5636c28-5636c29 951->955 952->955 953->954 954->904 955->866 958->927 959->958
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f565239a2fcf1519b061e05a85598a195c1367f725a36a52f9279f66190831d5
                                                        • Instruction ID: 9283d1c1a6b3f47a7eae92d1d3367fd8c275cb19f3dc3ef3ac81be05518de45c
                                                        • Opcode Fuzzy Hash: f565239a2fcf1519b061e05a85598a195c1367f725a36a52f9279f66190831d5
                                                        • Instruction Fuzzy Hash: 7D72BC74E052289FDB64DF69C985BE9BBB2BF49300F1481EAD409A7355DB30AE81CF50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1732 2989480-29894a0 1733 29894a2 1732->1733 1734 29894a7-2989538 1732->1734 1733->1734 1738 298988c-29898c0 1734->1738 1739 298953e-298954e 1734->1739 1789 2989551 call 2989a30 1739->1789 1790 2989551 call 2989a40 1739->1790 1791 2989551 call 2989d87 1739->1791 1743 2989557-298958a 1746 298958c 1743->1746 1747 2989591-298959a 1743->1747 1746->1747 1748 298987f-2989885 1747->1748 1749 298988b 1748->1749 1750 298959f-29895ab 1748->1750 1749->1738 1751 29895b3-2989619 1750->1751 1755 298961f-298968d call 2983760 1751->1755 1756 29896d5-2989730 1751->1756 1766 298968f-29896cf 1755->1766 1767 29896d0-29896d3 1755->1767 1768 2989731-2989781 1756->1768 1766->1767 1767->1768 1773 298986a-2989875 1768->1773 1774 2989787-2989869 1768->1774 1776 298987c 1773->1776 1777 2989877 1773->1777 1774->1773 1776->1748 1777->1776 1789->1743 1790->1743 1791->1743
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8b4520f426ab0b000ccbb7d428827069490f99197dfa96b28e966682bbe9b8f3
                                                        • Instruction ID: a8825bdf67343c91716bdc4dff2fdf0c7ba3105d3251fceafb351a52687b3bfc
                                                        • Opcode Fuzzy Hash: 8b4520f426ab0b000ccbb7d428827069490f99197dfa96b28e966682bbe9b8f3
                                                        • Instruction Fuzzy Hash: 39C1A174E01218CFEB14DFA5D954BADBBB2FF88301F1481A9D809A7394DB359A85CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a05fcce780f90402063b5b0919fa23d92b9fdfdf2836dae35b1760e076970a14
                                                        • Instruction ID: d178da65e2a413ef813e31331baf811f35f2210c46afb6b19a4f4bbc97634be6
                                                        • Opcode Fuzzy Hash: a05fcce780f90402063b5b0919fa23d92b9fdfdf2836dae35b1760e076970a14
                                                        • Instruction Fuzzy Hash: 12A11571D106198FDB14EFA9C8847DDFBB1EF89300F14C6AAE448A7260EB709A85CF51
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 195cb340540cdb8c95b70f34dff8fd9f8fcb76b8f712e16582886d8851399e17
                                                        • Instruction ID: 600166aac8d7e3603ee79641fd628d5cae9c0d535c1cb3107ebfd6c8494cfb50
                                                        • Opcode Fuzzy Hash: 195cb340540cdb8c95b70f34dff8fd9f8fcb76b8f712e16582886d8851399e17
                                                        • Instruction Fuzzy Hash: 0EA1F670D00208CFEB14DFA9C958BADBBB1FF89314F248269E409AB391DB759985CF54
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bc46db68bacd06b0c48cadae4231ad44a3c22dbae54701ff0f97c67830fcce8e
                                                        • Instruction ID: 12b2dcfbc9f89dc11dd7036891f1ccc433f46f1967307681f3fd48ef3e02e1bb
                                                        • Opcode Fuzzy Hash: bc46db68bacd06b0c48cadae4231ad44a3c22dbae54701ff0f97c67830fcce8e
                                                        • Instruction Fuzzy Hash: 6AA10770D00208CFEB14DFA9C958BADBBB1FF88314F248269E409AB391DB759985CF54
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7d67cfa79214b9dad10f797d01b3b9436dbdbb2fe4b028b0e0ebf9edd0fb894b
                                                        • Instruction ID: 3bc7b9f627998cccf11b6c46a7f21d8c67326bc33a181905a73dc931889c2082
                                                        • Opcode Fuzzy Hash: 7d67cfa79214b9dad10f797d01b3b9436dbdbb2fe4b028b0e0ebf9edd0fb894b
                                                        • Instruction Fuzzy Hash: C691E174D00208CFEB10DFA8D988BACBBB1FF49314F248269E409AB391DB759985CF54
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a195dbbdd9ceebe6f03a090e366ca36515b364c61f9373ec11429512d5452198
                                                        • Instruction ID: d0152b1d53b524fe4c8958f47961ecf7ca3746b1653c11425270f7414f3005a4
                                                        • Opcode Fuzzy Hash: a195dbbdd9ceebe6f03a090e366ca36515b364c61f9373ec11429512d5452198
                                                        • Instruction Fuzzy Hash: 0541D475D01248CBEB18DFAAD8547ADFBF2AF88300F24C12AD815AB358DB345945CF54

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 553 298ad3d-298afaf call 298a428 559 298b18b-298b196 553->559 560 298afb5-298afb7 553->560 561 298b19d-298b1a8 559->561 560->561 562 298afbd-298afc1 560->562 568 298b1af-298b1ba 561->568 562->561 564 298afc7-298afff call 298ab68 562->564 564->568 577 298b005-298b009 564->577 572 298b1c1-298b1cc 568->572 576 298b1d3-298b1ff 572->576 612 298b206-298b232 576->612 578 298b00b-298b00f 577->578 579 298b015-298b019 577->579 578->572 578->579 581 298b01b-298b022 579->581 582 298b024-298b028 579->582 583 298b040-298b044 581->583 582->583 584 298b02a-298b02e 582->584 587 298b04b-298b052 583->587 588 298b046-298b048 583->588 585 298b039 584->585 586 298b030-298b037 584->586 585->583 586->583 590 298b05b-298b05f 587->590 591 298b054 587->591 588->587 596 298b13e-298b141 590->596 597 298b065-298b069 590->597 591->590 592 298b179-298b184 591->592 593 298b0dd-298b0e0 591->593 594 298b0ae-298b0b1 591->594 595 298b110-298b113 591->595 592->559 606 298b0eb-298b10e 593->606 607 298b0e2-298b0e5 593->607 601 298b0bc-298b0db 594->601 602 298b0b3-298b0b6 594->602 599 298b11a-298b139 595->599 600 298b115 595->600 603 298b151-298b174 596->603 604 298b143-298b146 596->604 597->592 605 298b06f-298b072 597->605 626 298b097-298b09b 599->626 600->599 601->626 602->576 602->601 603->626 604->603 609 298b148-298b14b 604->609 610 298b079-298b095 605->610 611 298b074 605->611 606->626 607->606 607->612 609->603 616 298b239-298b292 609->616 610->626 611->610 612->616 636 298b09e call 298b4ef 626->636 637 298b09e call 298b500 626->637 638 298b09e call 298b5a1 626->638 630 298b0a4-298b0ab 636->630 637->630 638->630
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: da667b82bc35a0b2453c703434e92945dd4851e7f1a92d2abbff09347fab43c8
                                                        • Instruction ID: 56077c0200176f25111fd715b16ff6fa2d046acfc6134f74b05941ef7359a382
                                                        • Opcode Fuzzy Hash: da667b82bc35a0b2453c703434e92945dd4851e7f1a92d2abbff09347fab43c8
                                                        • Instruction Fuzzy Hash: 8C610430B046008FDB196F74A86937E7BA6AFC5324F188519E516DB3D1DF388C02C7A5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 639 563a4c0-563a4c5 641 563a4c8-563a55c DuplicateHandle 639->641 642 563a565-563a582 641->642 643 563a55e-563a564 641->643 643->642
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0563A54F
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: e75f9c6f89e0723b447b1f34f48ab86ac7499299a9f35df70102453cf4c77d4b
                                                        • Instruction ID: de5997d959da24d406bcf688f2e254c457254aa532c61ac1e9f040cce783dd0b
                                                        • Opcode Fuzzy Hash: e75f9c6f89e0723b447b1f34f48ab86ac7499299a9f35df70102453cf4c77d4b
                                                        • Instruction Fuzzy Hash: 8021F4B5C002489FDB10CFAAD984ADEBFF4EB48320F14811AE968A7350C375A941CF60

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 646 563a4c8-563a55c DuplicateHandle 647 563a565-563a582 646->647 648 563a55e-563a564 646->648 648->647
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0563A54F
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: a6ed2e263412140a4531f96e2081a662cfcefc8e467918ad1b4a87f0746c89df
                                                        • Instruction ID: cf06e9d37a7a52aa71beebb716ec7e58a6d6736d17b9fd59199a01720ebfd4e7
                                                        • Opcode Fuzzy Hash: a6ed2e263412140a4531f96e2081a662cfcefc8e467918ad1b4a87f0746c89df
                                                        • Instruction Fuzzy Hash: 5C21E3B5D002089FDB10CF9AD985ADEBBF4FB48320F14801AE958A3350D379A940DF60

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 651 298af78-298afaf call 298a428 656 298b18b-298b196 651->656 657 298afb5-298afb7 651->657 658 298b19d-298b1a8 656->658 657->658 659 298afbd-298afc1 657->659 665 298b1af-298b1ba 658->665 659->658 661 298afc7-298afff call 298ab68 659->661 661->665 674 298b005-298b009 661->674 669 298b1c1-298b1cc 665->669 673 298b1d3-298b1ff 669->673 709 298b206-298b232 673->709 675 298b00b-298b00f 674->675 676 298b015-298b019 674->676 675->669 675->676 678 298b01b-298b022 676->678 679 298b024-298b028 676->679 680 298b040-298b044 678->680 679->680 681 298b02a-298b02e 679->681 684 298b04b-298b052 680->684 685 298b046-298b048 680->685 682 298b039 681->682 683 298b030-298b037 681->683 682->680 683->680 687 298b05b-298b05f 684->687 688 298b054 684->688 685->684 693 298b13e-298b141 687->693 694 298b065-298b069 687->694 688->687 689 298b179-298b184 688->689 690 298b0dd-298b0e0 688->690 691 298b0ae-298b0b1 688->691 692 298b110-298b113 688->692 689->656 703 298b0eb-298b10e 690->703 704 298b0e2-298b0e5 690->704 698 298b0bc-298b0db 691->698 699 298b0b3-298b0b6 691->699 696 298b11a-298b139 692->696 697 298b115 692->697 700 298b151-298b174 693->700 701 298b143-298b146 693->701 694->689 702 298b06f-298b072 694->702 723 298b097-298b09b 696->723 697->696 698->723 699->673 699->698 700->723 701->700 706 298b148-298b14b 701->706 707 298b079-298b095 702->707 708 298b074 702->708 703->723 704->703 704->709 706->700 713 298b239-298b292 706->713 707->723 708->707 709->713 733 298b09e call 298b4ef 723->733 734 298b09e call 298b500 723->734 735 298b09e call 298b5a1 723->735 727 298b0a4-298b0ab 733->727 734->727 735->727
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: f21291bfaf3eacb26970d91e4d792c42e7f4d17c1e9eeb4c2611b9737653abdb
                                                        • Instruction ID: 868bcd3b490ce8c2830d6aadd5bfe5d4bd1ab652053aeb7495c18d7ad34b63c6
                                                        • Opcode Fuzzy Hash: f21291bfaf3eacb26970d91e4d792c42e7f4d17c1e9eeb4c2611b9737653abdb
                                                        • Instruction Fuzzy Hash: 1C81F430B006048FDB256F74A86937D7AA6AFC5328F688619E526DB3D0CF358D02C7A5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 736 29819b8-2981a13 740 2981a35-2981a84 736->740 741 2981a15-2981a34 736->741 746 2981a9f 740->746 747 2981a86-2981a8d 740->747 751 2981aa7 746->751 748 2981a8f-2981a94 747->748 749 2981a96-2981a9d 747->749 750 2981aaa-2981abe 748->750 749->750 753 2981ac0-2981ac7 750->753 754 2981ad4-2981adc 750->754 751->750 755 2981ac9-2981acb 753->755 756 2981acd-2981ad2 753->756 758 2981ade-2981ae2 754->758 755->758 756->758 759 2981b42-2981b45 758->759 760 2981ae4-2981af9 758->760 761 2981b8d-2981b93 759->761 762 2981b47-2981b5c 759->762 760->759 768 2981afb-2981afe 760->768 764 2981b99-2981b9b 761->764 765 298268e 761->765 762->761 771 2981b5e-2981b62 762->771 764->765 766 2981ba1-2981ba6 764->766 774 2982693-2982c75 765->774 769 298263c-2982640 766->769 770 2981bac 766->770 772 2981b1d-2981b3b call 29802a8 768->772 773 2981b00-2981b02 768->773 778 2982642-2982645 769->778 779 2982647-298268d 769->779 770->770 775 2981b6a-2981b88 call 29802a8 771->775 776 2981b64-2981b68 771->776 772->759 773->772 777 2981b04-2981b07 773->777 775->761 776->761 776->775 777->759 783 2981b09-2981b1b 777->783 778->774 778->779 783->759 783->772
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a57fa0ba86849a852ba81a57909d9eb28fe2763da548749dc2948d8866f6424b
                                                        • Instruction ID: 3f996bf68c9e194ded1f584b295cc7d29de759d959ef9b5159da6c8da0784c45
                                                        • Opcode Fuzzy Hash: a57fa0ba86849a852ba81a57909d9eb28fe2763da548749dc2948d8866f6424b
                                                        • Instruction Fuzzy Hash: 63425E226192C9DFE7234B7058763E4BFF19E8705172E88DEC6C42B817E12A292FD711

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1498 298b500-298b509 1499 298b50b-298b510 1498->1499 1500 298b512-298b515 1498->1500 1501 298b54a-298b54d 1499->1501 1502 298b51e-298b521 1500->1502 1503 298b517-298b51c 1500->1503 1504 298b52a-298b52d 1502->1504 1505 298b523-298b528 1502->1505 1503->1501 1506 298b52f-298b534 1504->1506 1507 298b536-298b539 1504->1507 1505->1501 1506->1501 1508 298b53b-298b540 1507->1508 1509 298b542-298b545 1507->1509 1508->1501 1510 298b54e-298b5be 1509->1510 1511 298b547 1509->1511 1518 298b5c3-298b5d2 call 298b4a8 1510->1518 1511->1501 1521 298b61b-298b61e 1518->1521 1522 298b5d4-298b5ef 1518->1522 1523 298b620-298b626 1521->1523 1524 298b634-298b640 1521->1524 1522->1521 1532 298b5f1-298b5f5 1522->1532 1523->1518 1525 298b628 1523->1525 1530 298b642-298b663 1524->1530 1531 298b667-298b668 1524->1531 1527 298b62a-298b631 1525->1527 1533 298b66f-298b675 1530->1533 1534 298b665 1530->1534 1531->1533 1535 298b66a-298b66d 1531->1535 1536 298b5fe-298b607 1532->1536 1537 298b5f7-298b5fc 1532->1537 1539 298b689-298b6bd call 298ab68 1533->1539 1540 298b677-298b67a 1533->1540 1534->1531 1535->1533 1538 298b6c0-298b718 1535->1538 1536->1521 1542 298b609-298b612 1536->1542 1537->1527 1547 298b71f-298b79f 1538->1547 1540->1539 1541 298b67c-298b67e 1540->1541 1541->1539 1546 298b680-298b683 1541->1546 1542->1521 1543 298b614-298b619 1542->1543 1543->1527 1546->1539 1546->1547 1566 298b7bf-298b815 1547->1566 1567 298b7a1-298b7a5 1547->1567 1573 298b820-298b829 1566->1573 1574 298b817-298b81e 1566->1574 1605 298b7a8 call 298b869 1567->1605 1606 298b7a8 call 298b89d 1567->1606 1607 298b7a8 call 298b4ef 1567->1607 1608 298b7a8 call 298b500 1567->1608 1609 298b7a8 call 298b5a1 1567->1609 1569 298b7ab-298b7bc 1576 298b82b-298b832 1573->1576 1577 298b834 1573->1577 1575 298b83b-298b844 1574->1575 1578 298b8d8-298b8dc 1575->1578 1579 298b84a-298b867 1575->1579 1576->1575 1577->1575 1610 298b8df call 298b9f8 1578->1610 1611 298b8df call 298b9ea 1578->1611 1580 298b8e5-298b901 1579->1580 1584 298b908-298b962 call 298ab78 1580->1584 1585 298b903-298b906 1580->1585 1586 298b96a-298b973 1584->1586 1585->1584 1585->1586 1587 298b97a-298b9b0 1586->1587 1588 298b975-298b978 1586->1588 1590 298b9df-298b9e5 1587->1590 1600 298b9b2-298b9d7 call 298ab88 1587->1600 1588->1587 1588->1590 1600->1590 1605->1569 1606->1569 1607->1569 1608->1569 1609->1569 1610->1580 1611->1580
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a84550f8b1cf7c03ca6ac41ab93c2d4dd20a8279749b3f6f8538272306b764d2
                                                        • Instruction ID: d98081d5ef39871cf3f3fe6032b2936f4a96fb2e56513171f8be28aace16e887
                                                        • Opcode Fuzzy Hash: a84550f8b1cf7c03ca6ac41ab93c2d4dd20a8279749b3f6f8538272306b764d2
                                                        • Instruction Fuzzy Hash: F7D1C431B042048FDB14EB68C865BAE7BB6AF89324F1C4559E506EB3A1DB35DC42CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2573 298bf80-298bf9b 2574 298c079-298c07e 2573->2574 2575 298bfa1-298bfa5 2573->2575 2575->2574 2576 298bfab-298bfaf 2575->2576 2577 298bfd1-298bfd6 2576->2577 2578 298bfb1-298bfb6 2576->2578 2580 298bfd8-298bfe2 2577->2580 2581 298c03e-298c042 2577->2581 2578->2574 2579 298bfbc-298bfc6 2578->2579 2584 298bfcc 2579->2584 2585 298c081-298c0a6 2579->2585 2586 298bffa-298c009 2580->2586 2587 298bfe4-298bff7 2580->2587 2582 298c069-298c076 2581->2582 2583 298c044-298c048 2581->2583 2582->2574 2588 298c04a-298c04e 2583->2588 2589 298c050-298c056 2583->2589 2584->2582 2596 298c0a8-298c0aa 2585->2596 2597 298c0ac-298c0d2 2585->2597 2594 298c019-298c02f 2586->2594 2595 298c00b-298c016 2586->2595 2588->2582 2589->2585 2590 298c058-298c067 2589->2590 2590->2582 2594->2585 2604 298c031-298c03c 2594->2604 2599 298c0ea-298c0f0 2596->2599 2602 298c0f1-298c13d call 298a428 call 298b298 2597->2602 2603 298c0d4-298c0e4 2597->2603 2612 298c13f-298c143 2602->2612 2613 298c145-298c14e 2602->2613 2603->2599 2604->2582 2612->2613 2614 298c150-298c15f 2612->2614 2616 298c197-298c19e 2613->2616 2614->2616 2618 298c161-298c164 2614->2618 2619 298c167-298c16c 2618->2619 2620 298c18b-298c190 2619->2620 2621 298c16e-298c172 2619->2621 2620->2616 2627 298c175 call 298c1b0 2621->2627 2628 298c175 call 298c1a0 2621->2628 2622 298c17b-298c17e 2624 298c180-298c182 2622->2624 2625 298c186 2622->2625 2624->2619 2626 298c184 2624->2626 2625->2620 2626->2616 2627->2622 2628->2622
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 83f9e6aa04eb3b645c33b144fecfbbdc9cbf5f87cb0aae6e7b9fb28592a8fc9c
                                                        • Instruction ID: 7c191e78c5c5c0375247279aabaf18ed87bc6415dcc43086a0e5ca475a4263a6
                                                        • Opcode Fuzzy Hash: 83f9e6aa04eb3b645c33b144fecfbbdc9cbf5f87cb0aae6e7b9fb28592a8fc9c
                                                        • Instruction Fuzzy Hash: 2B61B676B002059FCB18AFBDD884A6ABBB9EFC9364B18852BE419D7740D731D80187B0
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3563795c4a9c7c1ffae6bb034e6f6d7a8265b9055f9cae91fbe88db8b28e3175
                                                        • Instruction ID: 56c852dd987f4c170aade2b2ad2bbfb2e694e10a58ff12a962d21579291b18b4
                                                        • Opcode Fuzzy Hash: 3563795c4a9c7c1ffae6bb034e6f6d7a8265b9055f9cae91fbe88db8b28e3175
                                                        • Instruction Fuzzy Hash: 66A1BA78E01359CFCF15EFA8E994A9DBBB1FF84301B104529D416AB369DB306916CF81
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 31cb49b25c7a9d245af693855280f0492ce520f8b9a6148420fcfc0a8a1ccb4d
                                                        • Instruction ID: 08f7fd06005b23fff9c557d7f39e9248da129296e40d8913e66633ea2f5a0ba9
                                                        • Opcode Fuzzy Hash: 31cb49b25c7a9d245af693855280f0492ce520f8b9a6148420fcfc0a8a1ccb4d
                                                        • Instruction Fuzzy Hash: AAA1BA78E01319CFDF15EFA8E994A9DBBB1FF88301B104529D416AB359DB306916CF81
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cdc4a0a6f83dd4a98c43daaee31197646ccc2a7150f57ef8be95fc39040dcb01
                                                        • Instruction ID: fdaf226b850d1a74cfd171295dbb419f5519b698c868cb4b44bbceacbbcd2667
                                                        • Opcode Fuzzy Hash: cdc4a0a6f83dd4a98c43daaee31197646ccc2a7150f57ef8be95fc39040dcb01
                                                        • Instruction Fuzzy Hash: 4A41D331B002049FCB18ABB8DC6566E7FBAEFC9204F58447AE509D7391DE349D02CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f59fc1626ac6f6c3ccf56277737327ad730388b0f706c774a4d95b0d269f2cc6
                                                        • Instruction ID: ed85f8cd217c620848c44b77980f4dea3daffb42b74a3d5b96f0bc351bf5f47e
                                                        • Opcode Fuzzy Hash: f59fc1626ac6f6c3ccf56277737327ad730388b0f706c774a4d95b0d269f2cc6
                                                        • Instruction Fuzzy Hash: 6451C574E00208DFDB58DFA9D884A9EBBF2BF89310F149569E815BB364DB309846CF10
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e636411d6f39891f507fa3082fa092b12df1c571d1c53b85d496f9bca6601a68
                                                        • Instruction ID: ff71c601c5c08b35772ab675dca4debd3a632eb8db48d31d7c4a057e752bee26
                                                        • Opcode Fuzzy Hash: e636411d6f39891f507fa3082fa092b12df1c571d1c53b85d496f9bca6601a68
                                                        • Instruction Fuzzy Hash: 4131C375F043A48BEF2867659C9437A6AAABFC4205F1C443BED07D7380EB74C845C2A1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fdd9b81dfec3407f35897b160f47500e647c9885c96ddf2bd50407667228363b
                                                        • Instruction ID: af3e9239ad6db8e42330dac308f0687a0bb5577b603ca0da685799bc4524d043
                                                        • Opcode Fuzzy Hash: fdd9b81dfec3407f35897b160f47500e647c9885c96ddf2bd50407667228363b
                                                        • Instruction Fuzzy Hash: 1F41B374E01208DFDB08EFAAD484A9DBBB2BF89300F249529E415BB364DB349846CF14
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0b4aa6a90b4dc7cabec753ae01a49881832938bd1da3c22dd44377d4f3289250
                                                        • Instruction ID: 79c6ab9c6bfedcdc732cfef50fe7df8642240cb9dbb2b282a71a701c4f4e38a2
                                                        • Opcode Fuzzy Hash: 0b4aa6a90b4dc7cabec753ae01a49881832938bd1da3c22dd44377d4f3289250
                                                        • Instruction Fuzzy Hash: C031A93583328A8FD6402B21B5FE2BABEA4FF4F733B46AD04F14AC05958F3445848E64
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d82ec8b487203e78f9f2bacacd249d85bae12244bd93f5c1154182e1562fe723
                                                        • Instruction ID: b09d0a0b9dbef2c4d04949ff9d943e04b7c84bfe18138d08e190bdae23c555e3
                                                        • Opcode Fuzzy Hash: d82ec8b487203e78f9f2bacacd249d85bae12244bd93f5c1154182e1562fe723
                                                        • Instruction Fuzzy Hash: 8C313B35B002088FDB15EFA8C490E9DBBB6BF88224F595045E501EF361CB71EC86CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4664daac4bd9d9373b64a786ad6977594190277c2ece16f0b07a7efc09d1da2d
                                                        • Instruction ID: 725634d2bf6929a864d20e3de24d8a1f0306e6cd0b6cb22b1aff137995430d4f
                                                        • Opcode Fuzzy Hash: 4664daac4bd9d9373b64a786ad6977594190277c2ece16f0b07a7efc09d1da2d
                                                        • Instruction Fuzzy Hash: 17313A35B002088FDB55EFA8C490E9DBBB6AF88324F595054E501EF361CB71EC86CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3b9c67ddbfd2ab55f3fcf58409af804830e2a769efafe27cc84b01667c97cd1a
                                                        • Instruction ID: 0ab6a91b334f4527c22bc13456e4e6cea5f922be8e917045ff4dcc24d0c20a43
                                                        • Opcode Fuzzy Hash: 3b9c67ddbfd2ab55f3fcf58409af804830e2a769efafe27cc84b01667c97cd1a
                                                        • Instruction Fuzzy Hash: 7C2173357042059FD714EF69C865B6EBBB6FF88214F288069E506C7361DA359D12CB90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a497be31bbedfa5c1699b3b817310b782c5698fbd3684a6c137f764b8e0c427b
                                                        • Instruction ID: cae7edd6d162ac6a6d2162df17fbb16b75d0fa2a6645710225cacbd97385aa31
                                                        • Opcode Fuzzy Hash: a497be31bbedfa5c1699b3b817310b782c5698fbd3684a6c137f764b8e0c427b
                                                        • Instruction Fuzzy Hash: 8E21A435A002049FCF14EF28D440AAE7BB5EB89360F54C519D81E9B344DB31EE06CBD1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2473840127.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_f1d000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 19652e49d2db20ea77f631e4a55785f34aef3546cc738af648db559f1c435bc8
                                                        • Instruction ID: 6f3a6987cff74c2880828c2d65c4527b896cf622ae89f9aafc6b4654c8ffb8ea
                                                        • Opcode Fuzzy Hash: 19652e49d2db20ea77f631e4a55785f34aef3546cc738af648db559f1c435bc8
                                                        • Instruction Fuzzy Hash: C9210775A04304DFDB14DF14D9C0B56BB75FB88324F24C66DD84A4B29AC336D887DA62
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2473840127.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_f1d000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8bfb889c319474fee29665f896e22a122a1dc89ed3d45a3ff590502d58918fc9
                                                        • Instruction ID: 056c7b32f85ec11a0f467ed006686487cad23fb0d862a5091b3c5c9c329db9ce
                                                        • Opcode Fuzzy Hash: 8bfb889c319474fee29665f896e22a122a1dc89ed3d45a3ff590502d58918fc9
                                                        • Instruction Fuzzy Hash: 13215E7150D3C09FC707CB24D990711BF71AB46224F29C5DBD8898F2A7C23A984ADB62
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8321c442ecbf6e1bb6a6a7307c07f3eaeb27bf483ce4133879e0111c989786e4
                                                        • Instruction ID: 887f3676213d5e5c92a29a99d7bf60c03786f8faa1c74398e821bb6c17394b85
                                                        • Opcode Fuzzy Hash: 8321c442ecbf6e1bb6a6a7307c07f3eaeb27bf483ce4133879e0111c989786e4
                                                        • Instruction Fuzzy Hash: 9B219D74E052089FDB05EFB9C8106AEBBB6EF85308F14C5B994056B285CB745A4ADF41
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6b5f4aebb49f5b0d782e6c41f2fd8950b458486e26926c9f9258486bfa7b6b3f
                                                        • Instruction ID: 6c98916eae1f41a428b9a8efdf9691a28ce12d1d6191d120bc72114c6d88ccf4
                                                        • Opcode Fuzzy Hash: 6b5f4aebb49f5b0d782e6c41f2fd8950b458486e26926c9f9258486bfa7b6b3f
                                                        • Instruction Fuzzy Hash: 8921E670D052498FCB05EFA8D9955EEBFB4FF4A200F04456AD406B7251EB305955CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 436289edd3db6ec7d8e6143c57a673a775e297de429799e990771f54157b03b0
                                                        • Instruction ID: fbf5788b4e668d5f7947daf1142d1938fef1dca403fbaa8d3f6a6b9533d70b43
                                                        • Opcode Fuzzy Hash: 436289edd3db6ec7d8e6143c57a673a775e297de429799e990771f54157b03b0
                                                        • Instruction Fuzzy Hash: 97116A36700604CFD714EB69E9A4F16B7EAEF88725B188479E14ACB364CB71EC01CB50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f52a4dc4909e3d734d1fbf92678ae558d530ed60c2e6a6432dd4abe97a4ffd2
                                                        • Instruction ID: 231e0e59eb7f08672bcc7a780cda397be596c89992b85da97c2c8f8eb81bd46f
                                                        • Opcode Fuzzy Hash: 1f52a4dc4909e3d734d1fbf92678ae558d530ed60c2e6a6432dd4abe97a4ffd2
                                                        • Instruction Fuzzy Hash: F7019A32B053550BDB28AAB98C6462F7ADBAF88265319443ED906C7354EE24C80286A1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eedcc097661e54fae1af4abd457cac50c0602f278f02dadb8aaeeafcee5e8303
                                                        • Instruction ID: 6d3ec33aa37cc255571aa6ba52edb4f027d2ae910ca3d571caa1ed47778e41c5
                                                        • Opcode Fuzzy Hash: eedcc097661e54fae1af4abd457cac50c0602f278f02dadb8aaeeafcee5e8303
                                                        • Instruction Fuzzy Hash: 1A11DF31A092458FDB35AA7580505E8BB75EF56205B08C6FAD8858B256DB35881ECB41
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b37a06b614a9d2fb9cc4dd888c7044fa838f5f1abfa710007ae782fe71318780
                                                        • Instruction ID: f05c08ffec0ec35e189c419a2b1916ad2fa4418167a4d4a46b68409061cbecee
                                                        • Opcode Fuzzy Hash: b37a06b614a9d2fb9cc4dd888c7044fa838f5f1abfa710007ae782fe71318780
                                                        • Instruction Fuzzy Hash: D3115B317002008FD724AB29D968B56B7EAEF89729F18846DE149CB364CB71E845CB50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 32f2085eeb09c4fe584f4a82aaed68cf7964d5d53f239a2d42d7b6565a9d492d
                                                        • Instruction ID: 2733cc16de486b041f6079672b906f092f755f2d994c8f5b2934d5b4df4f11f0
                                                        • Opcode Fuzzy Hash: 32f2085eeb09c4fe584f4a82aaed68cf7964d5d53f239a2d42d7b6565a9d492d
                                                        • Instruction Fuzzy Hash: C6011D32F053554BDB28ABBA985463EBADFAFC8665314453ED906C7354FE70C8028791
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5c12805545254c2652ff08dbd097167128e24bdcd654e980ce7b8e3b877fd92c
                                                        • Instruction ID: dff509514e441055e01c83c3156c1ac8d7d27b81c5fbdadc2a9e883bc4c33293
                                                        • Opcode Fuzzy Hash: 5c12805545254c2652ff08dbd097167128e24bdcd654e980ce7b8e3b877fd92c
                                                        • Instruction Fuzzy Hash: 45014075E112099FCB14AF69E8596AE7FB5EF88320B40442AF91693280DF348D11CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 58f11d78a9e3a015012d3065e470d62aa3a8905bb38c1b03d18a82c0d5cecb69
                                                        • Instruction ID: b56f305c0c98a5f744f5a80642ca30c970e5e6cfb7768fdf085174ccce283c26
                                                        • Opcode Fuzzy Hash: 58f11d78a9e3a015012d3065e470d62aa3a8905bb38c1b03d18a82c0d5cecb69
                                                        • Instruction Fuzzy Hash: 32014475E111199FCB14DF68E8585AE7FB5FF88320B45413AF955D3280DB304910DFA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: beeabc6b3e35c4966200078bed889130fc4b43e7b25997f5cdaa332edc8a695a
                                                        • Instruction ID: 8b1c89a7462233928bf03029ac5722fb115684ecb50aa09ebaea38d0a4ffe9db
                                                        • Opcode Fuzzy Hash: beeabc6b3e35c4966200078bed889130fc4b43e7b25997f5cdaa332edc8a695a
                                                        • Instruction Fuzzy Hash: BFF0FC32B143145BC7182674A81D66E7FDADFC9621B18442AF606C7391DF35CC42D7A4
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a7c35f8fc056977bf7a711df359a420c5d92c984cb769eb0981b538b34b4f010
                                                        • Instruction ID: 09a6bac6b51b1c73a3d78719c6774a3ec57cc1f2a2d3c36a086b33791ec5c708
                                                        • Opcode Fuzzy Hash: a7c35f8fc056977bf7a711df359a420c5d92c984cb769eb0981b538b34b4f010
                                                        • Instruction Fuzzy Hash: 03F0A732B045115BC7196669F45496EB7AEDFC5735718007BE509D7350CF31DC028BA0
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7b3d76ddf8d798af19151cf1aaf194e65bee85b3e715aec55d65bdf015ab2393
                                                        • Instruction ID: 07d103ab7e569baa20844b4d66b21aa6647c0fb856f1c0d05f5fb452ad59417a
                                                        • Opcode Fuzzy Hash: 7b3d76ddf8d798af19151cf1aaf194e65bee85b3e715aec55d65bdf015ab2393
                                                        • Instruction Fuzzy Hash: 48F0BB75D00208AF8750DFA9D84099FFBF9FF88250744453AE545D3201E770A505CBE5
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0abe15bf3039b494d536743808190ef3df9bbf42a45d4ec0d31ba822fcd2be47
                                                        • Instruction ID: 843f42db119d77c2bda190115b552372d7826732ca2880238e51e2dd75bb6608
                                                        • Opcode Fuzzy Hash: 0abe15bf3039b494d536743808190ef3df9bbf42a45d4ec0d31ba822fcd2be47
                                                        • Instruction Fuzzy Hash: C4F08271E002089F8B60EFA9984099FBBF6FB88250B44453BE509D3201E770A915CBE1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cc2a2db4fdfb600ac4acb6a81604a0090c151b477f4f512db194480b865af7fc
                                                        • Instruction ID: 276d5838555c2dc68a722896d1b35bf80059f79635bb863c60908bd525c2c3b1
                                                        • Opcode Fuzzy Hash: cc2a2db4fdfb600ac4acb6a81604a0090c151b477f4f512db194480b865af7fc
                                                        • Instruction Fuzzy Hash: 08E0C071015B4ACBD3102B24ECAD7BA7A66EF8B717F89AC10A00980061CB745050AA94
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3d55cbe6e9ea52218b70f3a1ab4d6946d0c8e1c2171db746c0281842fea88ba2
                                                        • Instruction ID: 9fb79e9eb38590ea1b6973adb88568082f72c15e372f8f8fe1ca4a57126d39d3
                                                        • Opcode Fuzzy Hash: 3d55cbe6e9ea52218b70f3a1ab4d6946d0c8e1c2171db746c0281842fea88ba2
                                                        • Instruction Fuzzy Hash: A1E09A71021B0ACBD2002B64A8AC2BA7A66EB8BB1BB86AC00A00E80070CF704444AA94
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 833aff9d9cca8523a0714eef8bb763aebe01799823df647ab4ad570046ff3c5a
                                                        • Instruction ID: e97012a769054c09d47909eb6565e7b3a24666610fa07b7f86ec2bd87ee4ac5d
                                                        • Opcode Fuzzy Hash: 833aff9d9cca8523a0714eef8bb763aebe01799823df647ab4ad570046ff3c5a
                                                        • Instruction Fuzzy Hash: BAE02639E523258BCB02ABB59C000EDBB34AE862227588653C16437190EF30529FC7A0
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6777215c55487ee9e85b823c77d97d21e0d04c6dbdc1f17be4a5deb2aee9d8be
                                                        • Instruction ID: 37566068d83185f0e4326393310b650fe23c4ddc421d9b9b98e4168d4d22c869
                                                        • Opcode Fuzzy Hash: 6777215c55487ee9e85b823c77d97d21e0d04c6dbdc1f17be4a5deb2aee9d8be
                                                        • Instruction Fuzzy Hash: 7AD05B31D2032A57CB10E7A5DC048DFFB38EED6321B904626D52437144FB706659C6E1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2474966096.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_2980000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 454fb8d224b16c6a2f0fdfd17df47aacf43bda7b949a330e78dc276bd610d485
                                                        • Instruction ID: be72c9971c9eab947e8945d86c91fac2be687bb70c78d780ed1dfae127fd817f
                                                        • Opcode Fuzzy Hash: 454fb8d224b16c6a2f0fdfd17df47aacf43bda7b949a330e78dc276bd610d485
                                                        • Instruction Fuzzy Hash: 74B092A395538402EFAA0220893A3767B90AB62208F4908AD8843C0188E61880008250
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .5r
                                                        • API String ID: 0-750816051
                                                        • Opcode ID: 1c40586e76dce1b6b63ecbefd45ef9d647ac816ba96865e90f9c5c803f2fdc11
                                                        • Instruction ID: d592665c20c1da0ef998c891b786acaf92307ae222aeeafd79990624c8c813fd
                                                        • Opcode Fuzzy Hash: 1c40586e76dce1b6b63ecbefd45ef9d647ac816ba96865e90f9c5c803f2fdc11
                                                        • Instruction Fuzzy Hash: 70529A74E01228CFDB64DF69C984B9DBBB2BB89301F1085EAD40AA7354DB319E81DF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7e8da8d610e735b01934101404cdc3e794913af55fc4044f6a602159076468ad
                                                        • Instruction ID: 59478a7bb987f5dd459916cdd2a7f7b89d26670b7eb9175c8953cb011eb5dd9d
                                                        • Opcode Fuzzy Hash: 7e8da8d610e735b01934101404cdc3e794913af55fc4044f6a602159076468ad
                                                        • Instruction Fuzzy Hash: 1FC1A174E01218CFDB14DFA5D994B9DBBB2BF89300F1081A9D409AB395DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4b3366eee136867c9386d78309122bfa74db7bd64e5758301b58380f0e66b402
                                                        • Instruction ID: 6641547a5eb793d10519299d9ec743cdc0313261bb54d25bd1417bddda7e5d2b
                                                        • Opcode Fuzzy Hash: 4b3366eee136867c9386d78309122bfa74db7bd64e5758301b58380f0e66b402
                                                        • Instruction Fuzzy Hash: 8BC1AF74E01218CFDB14DFA5D994B9DBBB2BF89300F2085A9D409AB394DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e24c3184f056fb26bd04c3d8bc77fcec72b3fcc1b33a862d072bac144add896
                                                        • Instruction ID: 10721337a9de98eb4f6af26f294c309424260bfb28e43385bb8ae99c2ce3dc12
                                                        • Opcode Fuzzy Hash: 0e24c3184f056fb26bd04c3d8bc77fcec72b3fcc1b33a862d072bac144add896
                                                        • Instruction Fuzzy Hash: B2C1BF74E01218CFDB14DFA5D994B9DBBB2BF89300F2081A9D409AB394DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 706b9f3857786bb8a57fb68353c91f884843b37cedea49dc47acd56af7b5b0f4
                                                        • Instruction ID: 29fc96640171f136bbc26be8ea1551caaafb4eb3beb5583999633f667cf87805
                                                        • Opcode Fuzzy Hash: 706b9f3857786bb8a57fb68353c91f884843b37cedea49dc47acd56af7b5b0f4
                                                        • Instruction Fuzzy Hash: 79C1BF74E01218CFDB14DFA5D994B9DBBB2BF89300F2081A9D409AB394DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6b87949a6ff095cc29e3592e8c6ff5a50386cfa96326272eb3f4e3ceefa09ccf
                                                        • Instruction ID: 0a6e14e82a114194d9f8719dddd8a854ae04edbc5f5e405f43802561f8876d56
                                                        • Opcode Fuzzy Hash: 6b87949a6ff095cc29e3592e8c6ff5a50386cfa96326272eb3f4e3ceefa09ccf
                                                        • Instruction Fuzzy Hash: A0C1A074E01218CFDB14DFA5D994B9DBBB2BF89301F2081A9D409AB395DB359E82CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ad859f99aad0504c57a8f17c057f88f44185d00feba0eb1f117f095f779396f9
                                                        • Instruction ID: 3aa96ed3768b67b52f99184ab0142b3a465cbf16dbfca8c5d089c7555f104607
                                                        • Opcode Fuzzy Hash: ad859f99aad0504c57a8f17c057f88f44185d00feba0eb1f117f095f779396f9
                                                        • Instruction Fuzzy Hash: 2FC1AF74E01218CFDB14DFA9D994B9DBBB2BF89300F2081A9D409AB355DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 62a359a19b23f46735fafda6fee4bf719e00ad7226be5e196d35a8cf027bf61d
                                                        • Instruction ID: 0d40d0ce06f47e1a2437412c2bf1f5e3670803654841a6982fa59cf7548f65e8
                                                        • Opcode Fuzzy Hash: 62a359a19b23f46735fafda6fee4bf719e00ad7226be5e196d35a8cf027bf61d
                                                        • Instruction Fuzzy Hash: DEC19F74E11218CFDB14DFA5D994B9DBBB2BF89300F2081A9D409AB355DB359E82CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 591affda2dca27597cfab2447d2e05f8b8e5fabc3eaf6b90a3f59d27f964637f
                                                        • Instruction ID: 0e54e225cce2f518c478ee7f4dd31961ccb64a45f54af39a253662ab646688a7
                                                        • Opcode Fuzzy Hash: 591affda2dca27597cfab2447d2e05f8b8e5fabc3eaf6b90a3f59d27f964637f
                                                        • Instruction Fuzzy Hash: BAC1A074E01218CFDB24DFA5D994B9DBBB2BF89300F2081A9D409AB355DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3eeaeda52a2fdf0457834d3aecde17d4feb0f78b3a96a37dea61cfd1240467eb
                                                        • Instruction ID: 43ec47e1948d0d78d9478f8d4f8882226d0d661d19e9efd508ecdf5578e6bafb
                                                        • Opcode Fuzzy Hash: 3eeaeda52a2fdf0457834d3aecde17d4feb0f78b3a96a37dea61cfd1240467eb
                                                        • Instruction Fuzzy Hash: 56C1AE74E01218CFDB24DFA5D994B9DBBB2BF89301F2081A9D409AB355DB359E82CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c6143da82f4922f8838cb7319e2ebc1554173d556b61e9066466a6c65ee14f9b
                                                        • Instruction ID: 090b853946d8a8c69f9b1af9d597656be9a9599b43e9186ac00ae5e086f0f84a
                                                        • Opcode Fuzzy Hash: c6143da82f4922f8838cb7319e2ebc1554173d556b61e9066466a6c65ee14f9b
                                                        • Instruction Fuzzy Hash: 08C1A074E01218CFDB14DFA5D994B9DBBB2BF89300F2081A9D809AB355DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5d92d1157ad44e00830a1c59728dc4bebb815b378b0e787c42f240ccf8a171a2
                                                        • Instruction ID: 5ccb363056d0d987cb60fff1c24a1f718b678d3a233b8097bc3b15ba49763e7b
                                                        • Opcode Fuzzy Hash: 5d92d1157ad44e00830a1c59728dc4bebb815b378b0e787c42f240ccf8a171a2
                                                        • Instruction Fuzzy Hash: 87C1AF74E11218CFDB14DFA5D994B9DBBB2BF89300F2081A9D409AB354DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c28b9e684235298c67e90413685effdac587ccf88f8e027aef1701dd4e15fa01
                                                        • Instruction ID: 641830721aa88114e5d0339f47632f22dac1ab635dbf0dff1371cddffa368131
                                                        • Opcode Fuzzy Hash: c28b9e684235298c67e90413685effdac587ccf88f8e027aef1701dd4e15fa01
                                                        • Instruction Fuzzy Hash: F3C1A174E01218CFDB24DFA5D994B9DBBB2BF89300F2081A9D409AB355DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8b99c88624067a3b9b68396ce667663df38e9f904919b56fc5cf7c32ba219304
                                                        • Instruction ID: 195d228c78ae0ca90f2e533554a4c09046f6c687e903fbbdca26437d30e3c136
                                                        • Opcode Fuzzy Hash: 8b99c88624067a3b9b68396ce667663df38e9f904919b56fc5cf7c32ba219304
                                                        • Instruction Fuzzy Hash: E5C1A174E11218CFDB24DFA5D994B9DBBB2BF89300F2081A9D409AB354DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d2be79f4f81125af44694a842e5e6116077ac37be5dd6bfb65d2ccdf2a6564ee
                                                        • Instruction ID: 0faa7af1422a23a844f7578833a68488503a14be1a29e2e2c38576dd54a7edb8
                                                        • Opcode Fuzzy Hash: d2be79f4f81125af44694a842e5e6116077ac37be5dd6bfb65d2ccdf2a6564ee
                                                        • Instruction Fuzzy Hash: B5C1AE74E01218CFDB14DFA5D994B9DBBB2BF89300F2085A9D409AB394DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d3060070dfd7696c3da2c2b1561e46d140a5ac97653e909165100982a276caf7
                                                        • Instruction ID: e2c5fd1ae77e55e40677ff0c2bdcbd9b606d4f6bad12dcce580e47ea97629ef4
                                                        • Opcode Fuzzy Hash: d3060070dfd7696c3da2c2b1561e46d140a5ac97653e909165100982a276caf7
                                                        • Instruction Fuzzy Hash: CFC1A074E01218CFDB14DFA5D994B9DBBB2BF89300F2081A9D809AB355DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5aefcbf23990c2646195c9688ec7721635d0165da1f0018f47de71b3e7c20ffa
                                                        • Instruction ID: 7f97d1332d39ef65f6eeebec80392d0abe077d7e91f787849944d5c7c9a8ca68
                                                        • Opcode Fuzzy Hash: 5aefcbf23990c2646195c9688ec7721635d0165da1f0018f47de71b3e7c20ffa
                                                        • Instruction Fuzzy Hash: 8AC1A074E01218CFDB24DFA5D994B9DBBB2BF89300F1081A9D409AB355DB359E82CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6507940cad45430114042ac2de2d7013bac735b5d980e0eb485354a29a613b0a
                                                        • Instruction ID: cb7deddd03aa74d0503934baaeddbcb224664d17c32ef100c9bd491f7d5f6bd9
                                                        • Opcode Fuzzy Hash: 6507940cad45430114042ac2de2d7013bac735b5d980e0eb485354a29a613b0a
                                                        • Instruction Fuzzy Hash: 81C1AF74E01218CFDB14DFA5D994B9DBBB2BF89301F2081A9D409AB394DB359E82CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e962e6de027c9467138723802dd8219f3c7255d76d6510ccb35ec7233361585
                                                        • Instruction ID: 31e3bcd3776f6f868c8c3afd551b3a7e2e6b57a42f63af05b8a6b652930d063c
                                                        • Opcode Fuzzy Hash: 1e962e6de027c9467138723802dd8219f3c7255d76d6510ccb35ec7233361585
                                                        • Instruction Fuzzy Hash: C2C19F74E01218CFDB24DFA5D994B9DBBB2BF89300F2081A9D409AB355DB359E86CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: da2c7df174b93d167098df8937ff2681942bcb58fe0c4cd782e895d0fcdc38c4
                                                        • Instruction ID: 93517d6d0d73fcadc0b0151e85b64390f6578d4635b3ad6fbea1d5aa856349da
                                                        • Opcode Fuzzy Hash: da2c7df174b93d167098df8937ff2681942bcb58fe0c4cd782e895d0fcdc38c4
                                                        • Instruction Fuzzy Hash: 1EA17D74A01228CFDB65DF24C994BA9BBB2BF49301F5085EAD44EA7350DB319E81CF51
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 599083f5306afcc05b247f944a3329b65ef76189613bafeb66b78c055f5f7934
                                                        • Instruction ID: 75b54c3b051bd2584f918a3c908a2345a8166c980d081b9a59b7040ae8021f41
                                                        • Opcode Fuzzy Hash: 599083f5306afcc05b247f944a3329b65ef76189613bafeb66b78c055f5f7934
                                                        • Instruction Fuzzy Hash: E8518374A01228CFCB65DF24C854BA9BBB2FF4A301F5099EAD40AA7350DB319E81CF50
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.2477724745.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5630000_FylY1FW6fl.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fbd9973891e4ea0dec1299dc61f4ad29932d1a4083c57896b9c64dea3c92cee0
                                                        • Instruction ID: aa26ed1f7be13631fd3ea7f556cb6353064866fb320961a54da986f438ca2250
                                                        • Opcode Fuzzy Hash: fbd9973891e4ea0dec1299dc61f4ad29932d1a4083c57896b9c64dea3c92cee0
                                                        • Instruction Fuzzy Hash: C8016271851208EFD700AF70E86D3EDBB70FB5A707F559965A40AA3290D7784685EF80