Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZpYFG94D4C.exe

Overview

General Information

Sample name:ZpYFG94D4C.exe
renamed because original name is a hash value
Original sample name:da2fcae0d75bf3aba109c8d4010ae5db5add095496db883c257deaf78e9bfd0e.exe
Analysis ID:1589044
MD5:68ea88ab97c52f5c4ce75ce445f9aead
SHA1:02735913dab48e3702ac3b3fd0072ae2e7cb5c63
SHA256:da2fcae0d75bf3aba109c8d4010ae5db5add095496db883c257deaf78e9bfd0e
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • ZpYFG94D4C.exe (PID: 1776 cmdline: "C:\Users\user\Desktop\ZpYFG94D4C.exe" MD5: 68EA88AB97C52F5C4CE75CE445F9AEAD)
    • powershell.exe (PID: 1476 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 4288 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • RegSvcs.exe (PID: 1220 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY/sendMessage?chat_id=5600682828", "Token": "7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY", "Chat_id": "5600682828", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
    • 0x143a0:$a1: get_encryptedPassword
    • 0x14684:$a2: get_encryptedUsername
    • 0x141ac:$a3: get_timePasswordChanged
    • 0x142a7:$a4: get_passwordField
    • 0x143b6:$a5: set_encryptedPassword
    • 0x15a0d:$a7: get_logins
    • 0x15970:$a10: KeyLoggerEventArgs
    • 0x155db:$a11: KeyLoggerEventArgsEventHandler
    00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
    • 0x1939c:$x1: $%SMTPDV$
    • 0x17d80:$x2: $#TheHashHere%&
    • 0x19344:$x3: %FTPDV$
    • 0x17d20:$x4: $%TelegramDv$
    • 0x155db:$x5: KeyLoggerEventArgs
    • 0x15970:$x5: KeyLoggerEventArgs
    • 0x19368:$m2: Clipboard Logs ID
    • 0x195a6:$m2: Screenshot Logs ID
    • 0x196b6:$m2: keystroke Logs ID
    • 0x19990:$m3: SnakePW
    • 0x1957e:$m4: \SnakeKeylogger\
    00000005.00000002.4533694105.0000000002E0A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000005.00000002.4533694105.0000000002C41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 10 entries
        SourceRuleDescriptionAuthorStrings
        0.2.ZpYFG94D4C.exe.34debb8.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0.2.ZpYFG94D4C.exe.34debb8.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x127a0:$a1: get_encryptedPassword
          • 0x12a84:$a2: get_encryptedUsername
          • 0x125ac:$a3: get_timePasswordChanged
          • 0x126a7:$a4: get_passwordField
          • 0x127b6:$a5: set_encryptedPassword
          • 0x13e0d:$a7: get_logins
          • 0x13d70:$a10: KeyLoggerEventArgs
          • 0x139db:$a11: KeyLoggerEventArgsEventHandler
          0.2.ZpYFG94D4C.exe.34debb8.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1a162:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x19394:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x197c7:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1a806:$a5: \Kometa\User Data\Default\Login Data
          0.2.ZpYFG94D4C.exe.34debb8.1.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
          • 0x1336d:$s1: UnHook
          • 0x13374:$s2: SetHook
          • 0x1337c:$s3: CallNextHook
          • 0x13389:$s4: _hook
          0.2.ZpYFG94D4C.exe.34debb8.1.unpackMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
          • 0x1779c:$x1: $%SMTPDV$
          • 0x16180:$x2: $#TheHashHere%&
          • 0x17744:$x3: %FTPDV$
          • 0x16120:$x4: $%TelegramDv$
          • 0x139db:$x5: KeyLoggerEventArgs
          • 0x13d70:$x5: KeyLoggerEventArgs
          • 0x17768:$m2: Clipboard Logs ID
          • 0x179a6:$m2: Screenshot Logs ID
          • 0x17ab6:$m2: keystroke Logs ID
          • 0x17d90:$m3: SnakePW
          • 0x1797e:$m4: \SnakeKeylogger\
          Click to see the 21 entries

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZpYFG94D4C.exe", ParentImage: C:\Users\user\Desktop\ZpYFG94D4C.exe, ParentProcessId: 1776, ParentProcessName: ZpYFG94D4C.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", ProcessId: 1476, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZpYFG94D4C.exe", ParentImage: C:\Users\user\Desktop\ZpYFG94D4C.exe, ParentProcessId: 1776, ParentProcessName: ZpYFG94D4C.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", ProcessId: 1476, ProcessName: powershell.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZpYFG94D4C.exe", ParentImage: C:\Users\user\Desktop\ZpYFG94D4C.exe, ParentProcessId: 1776, ParentProcessName: ZpYFG94D4C.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe", ProcessId: 1476, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T08:49:23.227704+010028033053Unknown Traffic192.168.2.549710104.21.48.1443TCP
          2025-01-11T08:49:24.484340+010028033053Unknown Traffic192.168.2.549712104.21.48.1443TCP
          2025-01-11T08:49:28.308503+010028033053Unknown Traffic192.168.2.549720104.21.48.1443TCP
          2025-01-11T08:49:30.945954+010028033053Unknown Traffic192.168.2.549731104.21.48.1443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T08:49:21.568884+010028032742Potentially Bad Traffic192.168.2.549707193.122.6.16880TCP
          2025-01-11T08:49:22.662615+010028032742Potentially Bad Traffic192.168.2.549707193.122.6.16880TCP
          2025-01-11T08:49:23.928248+010028032742Potentially Bad Traffic192.168.2.549711193.122.6.16880TCP
          2025-01-11T08:49:25.193880+010028032742Potentially Bad Traffic192.168.2.549714193.122.6.16880TCP
          2025-01-11T08:49:26.475233+010028032742Potentially Bad Traffic192.168.2.549717193.122.6.16880TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: ZpYFG94D4C.exeAvira: detected
          Source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY/sendMessage?chat_id=5600682828", "Token": "7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY", "Chat_id": "5600682828", "Version": "5.1"}
          Source: ZpYFG94D4C.exeVirustotal: Detection: 70%Perma Link
          Source: ZpYFG94D4C.exeReversingLabs: Detection: 50%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: ZpYFG94D4C.exeJoe Sandbox ML: detected

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: ZpYFG94D4C.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49708 version: TLS 1.0
          Source: ZpYFG94D4C.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: kKRg.pdbSHA256 source: ZpYFG94D4C.exe
          Source: Binary string: kKRg.pdb source: ZpYFG94D4C.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 010DF1F6h5_2_010DF00F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 010DFB80h5_2_010DF00F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_010DE528
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_010DEB5B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_010DED3C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05241A38h5_2_05241620
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05241471h5_2_052411C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 052402F1h5_2_05240040
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05241011h5_2_05240D60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524F009h5_2_0524ED60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524C041h5_2_0524BD98
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524DEA9h5_2_0524DC00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05240751h5_2_052404A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524E759h5_2_0524E4B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524B791h5_2_0524B4E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524DA51h5_2_0524D7A8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05241A38h5_2_05241617
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524F8B9h5_2_0524F610
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524C8F1h5_2_0524C648
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524D1A1h5_2_0524CEF8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05240BB1h5_2_05240900
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524EBB1h5_2_0524E908
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05241A38h5_2_05241966
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524BBE9h5_2_0524B940
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524F461h5_2_0524F1B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524C499h5_2_0524C1F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524E301h5_2_0524E058
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524D5F9h5_2_0524D350
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524FD11h5_2_0524FA68
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0524CD49h5_2_0524CAA0

          Networking

          barindex
          Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPE
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
          Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49711 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49717 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49714 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49731 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49712 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49720 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49710 -> 104.21.48.1:443
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49708 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: RegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: RegSvcs.exe, 00000005.00000002.4533694105.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: RegSvcs.exe, 00000005.00000002.4533694105.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: ZpYFG94D4C.exe, 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: RegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D1C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
          Source: ZpYFG94D4C.exe, 00000000.00000002.2123242490.0000000002431000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: RegSvcs.exe, 00000005.00000002.4533694105.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: ZpYFG94D4C.exe, 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: RegSvcs.exe, 00000005.00000002.4533694105.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

          System Summary

          barindex
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: ZpYFG94D4C.exe PID: 1776, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: ZpYFG94D4C.exe PID: 1776, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: RegSvcs.exe PID: 1220, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: RegSvcs.exe PID: 1220, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_0228D3A40_2_0228D3A4
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_04AE66980_2_04AE6698
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_04AE66880_2_04AE6688
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_04AE00400_2_04AE0040
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_04AEEF280_2_04AEEF28
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_04AEEF380_2_04AEEF38
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_04AE10900_2_04AE1090
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076BF1600_2_076BF160
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076B59000_2_076B5900
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076BA6180_2_076BA618
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076B93680_2_076B9368
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076B8F400_2_076B8F40
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076BAFC80_2_076BAFC8
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076B8B080_2_076B8B08
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076B58F00_2_076B58F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D61085_2_010D6108
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DC1905_2_010DC190
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DF00F5_2_010DF00F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DC4795_2_010DC479
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DB4F75_2_010DB4F7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DC7595_2_010DC759
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D68805_2_010D6880
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DBBD35_2_010DBBD3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DCA315_2_010DCA31
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D4ADD5_2_010D4ADD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DBEB35_2_010DBEB3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DE51F5_2_010DE51F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010DE5285_2_010DE528
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05247D905_2_05247D90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052484605_2_05248460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052411C05_2_052411C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052438705_2_05243870
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052400405_2_05240040
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05240D605_2_05240D60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524ED605_2_0524ED60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524ED505_2_0524ED50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05240D595_2_05240D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524BD885_2_0524BD88
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05247D8B5_2_05247D8B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524BD985_2_0524BD98
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524DC005_2_0524DC00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052404A05_2_052404A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524E4A05_2_0524E4A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524E4B05_2_0524E4B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052404915_2_05240491
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524B4E85_2_0524B4E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524B4D75_2_0524B4D7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524D7A85_2_0524D7A8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524D7985_2_0524D798
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524C6385_2_0524C638
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524F6005_2_0524F600
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524F6105_2_0524F610
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524C6485_2_0524C648
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524CEEA5_2_0524CEEA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524CEF85_2_0524CEF8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524B9305_2_0524B930
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052409005_2_05240900
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524E9085_2_0524E908
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524B9405_2_0524B940
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524F1A95_2_0524F1A9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524F1B85_2_0524F1B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052411B85_2_052411B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524C1E05_2_0524C1E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524C1F05_2_0524C1F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052400335_2_05240033
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052438675_2_05243867
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524E0495_2_0524E049
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524E0585_2_0524E058
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052408F05_2_052408F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524E8F85_2_0524E8F8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524D3405_2_0524D340
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524D3505_2_0524D350
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052473E35_2_052473E3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_052473E85_2_052473E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524DBF15_2_0524DBF1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524FA685_2_0524FA68
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524FA595_2_0524FA59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524CAA05_2_0524CAA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0524CA905_2_0524CA90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0582C3A85_2_0582C3A8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_058292DC5_2_058292DC
          Source: ZpYFG94D4C.exe, 00000000.00000002.2120733638.000000000055E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exe, 00000000.00000000.2056010769.0000000000144000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekKRg.exe6 vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exe, 00000000.00000002.2135830080.0000000006A60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exe, 00000000.00000002.2133369782.0000000005680000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exe, 00000000.00000002.2133518187.0000000005722000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exe, 00000000.00000002.2123242490.0000000002441000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exe, 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exe, 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exe, 00000000.00000002.2123242490.0000000002431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exeBinary or memory string: OriginalFilenamekKRg.exe6 vs ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: ZpYFG94D4C.exe PID: 1776, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: ZpYFG94D4C.exe PID: 1776, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: RegSvcs.exe PID: 1220, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: RegSvcs.exe PID: 1220, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: ZpYFG94D4C.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@2/2
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZpYFG94D4C.exe.logJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3524:120:WilError_03
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_02byoap2.4nc.ps1Jump to behavior
          Source: ZpYFG94D4C.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: ZpYFG94D4C.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: RegSvcs.exe, 00000005.00000002.4533694105.0000000002E93000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4535341505.0000000003CCB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002E85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002EBA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: ZpYFG94D4C.exeVirustotal: Detection: 70%
          Source: ZpYFG94D4C.exeReversingLabs: Detection: 50%
          Source: unknownProcess created: C:\Users\user\Desktop\ZpYFG94D4C.exe "C:\Users\user\Desktop\ZpYFG94D4C.exe"
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: ZpYFG94D4C.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: ZpYFG94D4C.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: ZpYFG94D4C.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: kKRg.pdbSHA256 source: ZpYFG94D4C.exe
          Source: Binary string: kKRg.pdb source: ZpYFG94D4C.exe
          Source: ZpYFG94D4C.exeStatic PE information: 0xE3E8BFA0 [Fri Mar 2 13:44:00 2091 UTC]
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_056A8548 push eax; iretd 0_2_056A8549
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_056A7E58 pushad ; retf 0_2_056A7E59
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeCode function: 0_2_076BD3C8 push E8FFFFFEh; iretd 0_2_076BD3CD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D87F3 push eax; retn 0002h5_2_010D8BBA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D9904 pushad ; retn 0002h5_2_010D9B3A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D9170 push edi; retn 0002h5_2_010D9172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D9050 push ebp; retn 0002h5_2_010D9052
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D9070 push esi; retn 0002h5_2_010D9072
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D8BC8 push ecx; retn 0002h5_2_010D8D72
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_010D9A63 pushad ; retn 0002h5_2_010D9B3A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05242E6B push esp; iretd 5_2_05242E79
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05242AC8 push esp; retf 5_2_05242AC9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0582B801 push CC066047h; retf 5_2_0582B80D
          Source: ZpYFG94D4C.exeStatic PE information: section name: .text entropy: 7.6859437604573095

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: ZpYFG94D4C.exe PID: 1776, type: MEMORYSTR
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: 970000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: 2430000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: 4430000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: 76C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: 6C30000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: 86C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: 96C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599324Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598984Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598875Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598765Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598656Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598547Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598437Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598328Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598094Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597984Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597875Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597766Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597437Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596890Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596453Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596231Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596125Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596016Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595906Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595797Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595687Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595578Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595469Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595358Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595250Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595139Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595029Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594921Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594794Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594611Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594484Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6162Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3548Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7545Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2310Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exe TID: 6188Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1084Thread sleep time: -5534023222112862s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599324Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598984Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598875Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598765Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598656Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598547Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598437Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598328Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598094Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597984Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597875Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597766Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597437Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596890Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596453Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596231Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596125Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596016Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595906Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595797Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595687Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595578Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595469Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595358Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595250Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595139Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595029Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594921Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594794Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594611Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594484Jump to behavior
          Source: ZpYFG94D4C.exe, 00000000.00000002.2120733638.00000000005C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}$<
          Source: RegSvcs.exe, 00000005.00000002.4532179532.0000000000C98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_05247D90 LdrInitializeThunk,5_2_05247D90
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe"
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 424000Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: BD1008Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeQueries volume information: C:\Users\user\Desktop\ZpYFG94D4C.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ZpYFG94D4C.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4533694105.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4533694105.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ZpYFG94D4C.exe PID: 1776, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1220, type: MEMORYSTR
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34debb8.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34fedd8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34fedd8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.ZpYFG94D4C.exe.34debb8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4533694105.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4533694105.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ZpYFG94D4C.exe PID: 1776, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1220, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          311
          Process Injection
          1
          Masquerading
          1
          OS Credential Dumping
          1
          Security Software Discovery
          Remote Services1
          Email Collection
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          11
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Data from Local System
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
          Obfuscated Files or Information
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
          Software Packing
          Cached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Timestomp
          DCSync13
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589044 Sample: ZpYFG94D4C.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 24 reallyfreegeoip.org 2->24 26 checkip.dyndns.org 2->26 28 checkip.dyndns.com 2->28 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus / Scanner detection for submitted sample 2->38 42 7 other signatures 2->42 8 ZpYFG94D4C.exe 4 2->8         started        signatures3 40 Tries to detect the country of the analysis system (by using the IP) 24->40 process4 file5 22 C:\Users\user\AppData\...\ZpYFG94D4C.exe.log, ASCII 8->22 dropped 44 Writes to foreign memory regions 8->44 46 Allocates memory in foreign processes 8->46 48 Adds a directory exclusion to Windows Defender 8->48 50 Injects a PE file into a foreign processes 8->50 12 RegSvcs.exe 15 2 8->12         started        16 powershell.exe 23 8->16         started        signatures6 process7 dnsIp8 30 checkip.dyndns.com 193.122.6.168, 49707, 49711, 49714 ORACLE-BMC-31898US United States 12->30 32 reallyfreegeoip.org 104.21.48.1, 443, 49708, 49710 CLOUDFLARENETUS United States 12->32 52 Tries to steal Mail credentials (via file / registry access) 12->52 54 Tries to harvest and steal browser information (history, passwords, etc) 12->54 56 Loading BitLocker PowerShell Module 16->56 18 WmiPrvSE.exe 16->18         started        20 conhost.exe 16->20         started        signatures9 process10

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ZpYFG94D4C.exe71%VirustotalBrowse
          ZpYFG94D4C.exe50%ReversingLabsByteCode-MSIL.Trojan.Remcos
          ZpYFG94D4C.exe100%AviraHEUR/AGEN.1309499
          ZpYFG94D4C.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          reallyfreegeoip.org
          104.21.48.1
          truefalse
            high
            checkip.dyndns.com
            193.122.6.168
            truefalse
              high
              checkip.dyndns.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/false
                  high
                  https://reallyfreegeoip.org/xml/8.46.123.189false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgRegSvcs.exe, 00000005.00000002.4533694105.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://checkip.dyndns.orgRegSvcs.exe, 00000005.00000002.4533694105.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.comRegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameZpYFG94D4C.exe, 00000000.00000002.2123242490.0000000002431000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002C41000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qZpYFG94D4C.exe, 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              https://reallyfreegeoip.org/xml/8.46.123.189$RegSvcs.exe, 00000005.00000002.4533694105.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgRegSvcs.exe, 00000005.00000002.4533694105.0000000002DED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D1C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DA5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002DFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D97000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/ZpYFG94D4C.exe, 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.4533694105.0000000002D04000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    104.21.48.1
                                    reallyfreegeoip.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    193.122.6.168
                                    checkip.dyndns.comUnited States
                                    31898ORACLE-BMC-31898USfalse
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1589044
                                    Start date and time:2025-01-11 08:48:20 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 7m 58s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:9
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:ZpYFG94D4C.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:da2fcae0d75bf3aba109c8d4010ae5db5add095496db883c257deaf78e9bfd0e.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@7/6@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 209
                                    • Number of non-executed functions: 34
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 2.23.242.162, 13.107.246.45, 20.12.23.50
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    02:49:17API Interceptor1x Sleep call for process: ZpYFG94D4C.exe modified
                                    02:49:20API Interceptor13x Sleep call for process: powershell.exe modified
                                    02:49:21API Interceptor10437835x Sleep call for process: RegSvcs.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    104.21.48.1ydJaT4b5N8.exeGet hashmaliciousFormBookBrowse
                                    • www.vilakodsiy.sbs/vq3j/
                                    NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                    • www.axis138ae.shop/j2vs/
                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                    • twirpx.org/administrator/index.php
                                    SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                    • www.antipromil.site/7ykh/
                                    193.122.6.168ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    prgNb8YFEA.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    fpIGwanLZi.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    h1HIe1rt4D.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    checkip.dyndns.comh8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                    • 193.122.130.0
                                    x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                    • 132.226.247.73
                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.8.169
                                    b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                    • 193.122.6.168
                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 193.122.6.168
                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.247.73
                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 193.122.130.0
                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.6.168
                                    reallyfreegeoip.orgh8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.32.1
                                    x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.112.1
                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.80.1
                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.80.1
                                    b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.80.1
                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.16.1
                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.96.1
                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.32.1
                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.64.1
                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.32.1
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ORACLE-BMC-31898USh8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                    • 193.122.130.0
                                    x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                    • 193.122.6.168
                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 193.122.6.168
                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 193.122.130.0
                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.6.168
                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                    • 158.101.44.242
                                    3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                    • 158.101.44.242
                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 158.101.44.242
                                    CLOUDFLARENETUSExodus.txt.lnkGet hashmaliciousStormKittyBrowse
                                    • 104.16.185.241
                                    dhPWt112uC.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.13.205
                                    h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.32.1
                                    z6tNjJC614.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.42.77
                                    b0cQukXPAl.exeGet hashmaliciousLummaCBrowse
                                    • 104.21.56.70
                                    x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.112.1
                                    lrw6UNGsUC.exeGet hashmaliciousXWormBrowse
                                    • 104.20.4.235
                                    Q7QR4k52HL.exeGet hashmaliciousLummaCBrowse
                                    • 104.21.48.1
                                    rACq8Eaix6.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.88.139
                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.80.1
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    54328bd36c14bd82ddaa0c04b25ed9adh8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.48.1
                                    x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.48.1
                                    c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.48.1
                                    b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.48.1
                                    ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.48.1
                                    grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.48.1
                                    14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.48.1
                                    Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.48.1
                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    No context
                                    Process:C:\Users\user\Desktop\ZpYFG94D4C.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.34331486778365
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):2232
                                    Entropy (8bit):5.379633281639906
                                    Encrypted:false
                                    SSDEEP:48:BWSU4xympjgs4RIoU99tK8NPZHUl7u1iMuge//ZUUyus:BLHxvCsIfA2KRHmOugms
                                    MD5:F963BF860AC549B35B83A9A4160F2928
                                    SHA1:4FB6DB1E141DFA0BE1D5895BFD644CAF177E7B07
                                    SHA-256:EBDC85F6CA03C3CB48B3425BB59E875BE7B981980A84C38467D695B8FA5076AC
                                    SHA-512:B20468971BCCE8A62C8CCDE8A3F561837969015DA660DCCAD09940D2B79C7D6B50B21876635725D105FA628F55246EB2036BFCA2EE1D5076450D9DA26F48E9E8
                                    Malicious:false
                                    Reputation:low
                                    Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.6766693419918415
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:ZpYFG94D4C.exe
                                    File size:594'432 bytes
                                    MD5:68ea88ab97c52f5c4ce75ce445f9aead
                                    SHA1:02735913dab48e3702ac3b3fd0072ae2e7cb5c63
                                    SHA256:da2fcae0d75bf3aba109c8d4010ae5db5add095496db883c257deaf78e9bfd0e
                                    SHA512:f809c2b1a6cc926c8f45d1f43a60a016f3818aefd5446ae538c025b0cfb2f3125da9cb34aec3a1be2c15c906f8a1d12e7ee0023c3ce69b9a6047a87be07dee5d
                                    SSDEEP:12288:+Dtt6a4K/a/G4rgdwKVOT2dB2mPTVJSyPzu5usx+XtYYI:+BAaBaG4HKr76yPzux
                                    TLSH:A5C401A86756EA02C68693B91F31F27417BC1EDEBA01D3065FD9ADEBB832F054C44253
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............F&... ...@....@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x492646
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xE3E8BFA0 [Fri Mar 2 13:44:00 2091 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x925f20x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x5a4.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x960000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x9098c0x70.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x9064c0x908001a453be5615a1b742b8121e4261b2a8aFalse0.898199272815744data7.6859437604573095IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x940000x5a40x600c235d534be92c8b90e764bae20546246False0.419921875data4.070296370693007IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x960000xc0x2004343f37f646438b2d9e50b2977a73d62False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x940900x314data0.4352791878172589
                                    RT_MANIFEST0x943b40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-11T08:49:21.568884+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707193.122.6.16880TCP
                                    2025-01-11T08:49:22.662615+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707193.122.6.16880TCP
                                    2025-01-11T08:49:23.227704+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549710104.21.48.1443TCP
                                    2025-01-11T08:49:23.928248+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549711193.122.6.16880TCP
                                    2025-01-11T08:49:24.484340+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549712104.21.48.1443TCP
                                    2025-01-11T08:49:25.193880+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549714193.122.6.16880TCP
                                    2025-01-11T08:49:26.475233+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549717193.122.6.16880TCP
                                    2025-01-11T08:49:28.308503+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549720104.21.48.1443TCP
                                    2025-01-11T08:49:30.945954+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549731104.21.48.1443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 11, 2025 08:49:20.629398108 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:20.634385109 CET8049707193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:20.634464979 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:20.634785891 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:20.639653921 CET8049707193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:21.314513922 CET8049707193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:21.323427916 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:21.328324080 CET8049707193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:21.513994932 CET8049707193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:21.568883896 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:21.651002884 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:21.651056051 CET44349708104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:21.651114941 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:21.661489010 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:21.661510944 CET44349708104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.147712946 CET44349708104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.147806883 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.152260065 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.152277946 CET44349708104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.152733088 CET44349708104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.193883896 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.248409986 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.295331955 CET44349708104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.359493971 CET44349708104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.359555006 CET44349708104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.359606028 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.392215967 CET49708443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.399987936 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:22.404968023 CET8049707193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:22.607388973 CET8049707193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:22.611233950 CET49710443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.611265898 CET44349710104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.611342907 CET49710443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.611675978 CET49710443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:22.611694098 CET44349710104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:22.662615061 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:23.074688911 CET44349710104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:23.076914072 CET49710443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:23.076958895 CET44349710104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:23.227788925 CET44349710104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:23.227953911 CET44349710104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:23.228055000 CET49710443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:23.229037046 CET49710443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:23.234431982 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:23.236040115 CET4971180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:23.239440918 CET8049707193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:23.239501953 CET4970780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:23.240828037 CET8049711193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:23.241003036 CET4971180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:23.241260052 CET4971180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:23.246023893 CET8049711193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:23.886759043 CET8049711193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:23.888044119 CET49712443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:23.888081074 CET44349712104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:23.888242006 CET49712443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:23.888526917 CET49712443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:23.888540030 CET44349712104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:23.928247929 CET4971180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:24.346013069 CET44349712104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:24.348221064 CET49712443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:24.348244905 CET44349712104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:24.484380960 CET44349712104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:24.484469891 CET44349712104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:24.484527111 CET49712443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:24.485110044 CET49712443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:24.493560076 CET4971180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:24.495446920 CET4971480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:24.498622894 CET8049711193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:24.498842955 CET4971180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:24.500354052 CET8049714193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:24.500422001 CET4971480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:24.500507116 CET4971480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:24.505341053 CET8049714193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:25.148161888 CET8049714193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:25.149585962 CET49715443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:25.149636030 CET44349715104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:25.149696112 CET49715443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:25.149945021 CET49715443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:25.149961948 CET44349715104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:25.193880081 CET4971480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:25.628279924 CET44349715104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:25.630059958 CET49715443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:25.630101919 CET44349715104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:25.781809092 CET44349715104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:25.781908035 CET44349715104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:25.781954050 CET49715443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:25.782390118 CET49715443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:25.785592079 CET4971480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:25.786675930 CET4971780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:25.790895939 CET8049714193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:25.790982962 CET4971480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:25.791589022 CET8049717193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:25.791671991 CET4971780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:25.791798115 CET4971780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:25.796813011 CET8049717193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:26.431736946 CET8049717193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:26.433442116 CET49718443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:26.433489084 CET44349718104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:26.433640957 CET49718443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:26.433883905 CET49718443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:26.433901072 CET44349718104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:26.475233078 CET4971780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:26.909276009 CET44349718104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:26.911178112 CET49718443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:26.911199093 CET44349718104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:27.064568996 CET44349718104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:27.064651012 CET44349718104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:27.064748049 CET49718443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:27.067558050 CET49718443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:27.072460890 CET4971980192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:27.077354908 CET8049719193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:27.077426910 CET4971980192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:27.077512026 CET4971980192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:27.082318068 CET8049719193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:27.712371111 CET8049719193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:27.715693951 CET49720443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:27.715724945 CET44349720104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:27.715904951 CET49720443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:27.716316938 CET49720443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:27.716330051 CET44349720104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:27.756417036 CET4971980192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:28.182997942 CET44349720104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:28.185533047 CET49720443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:28.185575962 CET44349720104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:28.308579922 CET44349720104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:28.308728933 CET44349720104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:28.308803082 CET49720443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:28.309298038 CET49720443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:28.313571930 CET4971980192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:28.315115929 CET4972180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:28.318619967 CET8049719193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:28.318691015 CET4971980192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:28.320023060 CET8049721193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:28.320255041 CET4972180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:28.320411921 CET4972180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:28.325294018 CET8049721193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:28.956618071 CET8049721193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:28.958451033 CET49723443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:28.958498001 CET44349723104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:28.958587885 CET49723443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:28.958996058 CET49723443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:28.959009886 CET44349723104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:29.006407976 CET4972180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:29.431433916 CET44349723104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:29.433082104 CET49723443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:29.433109999 CET44349723104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:29.576677084 CET44349723104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:29.576761961 CET44349723104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:29.576847076 CET49723443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:29.577394962 CET49723443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:29.580955029 CET4972180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:29.582046986 CET4972480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:29.586951017 CET8049721193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:29.587449074 CET4972180192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:29.587541103 CET8049724193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:29.592693090 CET4972480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:29.592822075 CET4972480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:29.597666025 CET8049724193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:30.233913898 CET8049724193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:49:30.235639095 CET49731443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:30.235697985 CET44349731104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:30.235905886 CET49731443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:30.236191988 CET49731443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:30.236205101 CET44349731104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:30.287642956 CET4972480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:49:30.821158886 CET44349731104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:30.823798895 CET49731443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:30.823822021 CET44349731104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:30.945982933 CET44349731104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:30.946070910 CET44349731104.21.48.1192.168.2.5
                                    Jan 11, 2025 08:49:30.946115971 CET49731443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:49:30.946515083 CET49731443192.168.2.5104.21.48.1
                                    Jan 11, 2025 08:50:31.431560993 CET8049717193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:50:31.431710005 CET4971780192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:50:35.228612900 CET8049724193.122.6.168192.168.2.5
                                    Jan 11, 2025 08:50:35.228713036 CET4972480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:51:10.240952969 CET4972480192.168.2.5193.122.6.168
                                    Jan 11, 2025 08:51:10.246238947 CET8049724193.122.6.168192.168.2.5
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 11, 2025 08:49:20.533179045 CET6307353192.168.2.51.1.1.1
                                    Jan 11, 2025 08:49:20.540158987 CET53630731.1.1.1192.168.2.5
                                    Jan 11, 2025 08:49:21.642287016 CET5581353192.168.2.51.1.1.1
                                    Jan 11, 2025 08:49:21.649770021 CET53558131.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 11, 2025 08:49:20.533179045 CET192.168.2.51.1.1.10x771eStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:21.642287016 CET192.168.2.51.1.1.10x2421Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 11, 2025 08:49:20.540158987 CET1.1.1.1192.168.2.50x771eNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 11, 2025 08:49:20.540158987 CET1.1.1.1192.168.2.50x771eNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:20.540158987 CET1.1.1.1192.168.2.50x771eNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:20.540158987 CET1.1.1.1192.168.2.50x771eNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:20.540158987 CET1.1.1.1192.168.2.50x771eNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:20.540158987 CET1.1.1.1192.168.2.50x771eNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:21.649770021 CET1.1.1.1192.168.2.50x2421No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:21.649770021 CET1.1.1.1192.168.2.50x2421No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:21.649770021 CET1.1.1.1192.168.2.50x2421No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:21.649770021 CET1.1.1.1192.168.2.50x2421No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:21.649770021 CET1.1.1.1192.168.2.50x2421No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:21.649770021 CET1.1.1.1192.168.2.50x2421No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 08:49:21.649770021 CET1.1.1.1192.168.2.50x2421No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                    • reallyfreegeoip.org
                                    • checkip.dyndns.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549707193.122.6.168801220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 08:49:20.634785891 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 08:49:21.314513922 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:21 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 08:49:21.323427916 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 08:49:21.513994932 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:21 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 08:49:22.399987936 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 08:49:22.607388973 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:22 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549711193.122.6.168801220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 08:49:23.241260052 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 08:49:23.886759043 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:23 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.549714193.122.6.168801220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 08:49:24.500507116 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 08:49:25.148161888 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:25 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.549717193.122.6.168801220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 08:49:25.791798115 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 08:49:26.431736946 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:26 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.549719193.122.6.168801220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 08:49:27.077512026 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 08:49:27.712371111 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:27 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.549721193.122.6.168801220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 08:49:28.320411921 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 08:49:28.956618071 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:28 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.549724193.122.6.168801220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 08:49:29.592822075 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 08:49:30.233913898 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:30 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549708104.21.48.14431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 07:49:22 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 07:49:22 UTC867INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:22 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1896551
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mTcNv%2B1W9%2BxfMoM4FLSpoqactmYsL4%2FG%2Bs%2BdNTOxd5X4qGrrbD6bNMaURx%2BGKWiQ0hpYwnzagr4GbCuGt%2FJvrLKB%2FlucxO4GGuPurCdZlov8cM2ogbEsCoQADTfrBH7ZG6VRGVJ%2B"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90034f4e6b8043be-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1533&min_rtt=1524&rtt_var=590&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1825000&cwnd=226&unsent_bytes=0&cid=16b1e040b6feda0e&ts=227&x=0"
                                    2025-01-11 07:49:22 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549710104.21.48.14431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 07:49:23 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 07:49:23 UTC863INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:23 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1896552
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dFwz%2FKyB0%2FT5AGx1NhnZV7dklbIMLl1%2FB6gV5gvL0VYGd%2FZYqioV5%2FUdvTvz20%2BuhHUme8NxtuIf0YQKFD7yVqpOg7OrO1itYzSvEaVv7D7TWgg1hZehN9kUbx0Ybta%2FE9XArZ96"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90034f53cae742e9-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1653&min_rtt=1646&rtt_var=633&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1708601&cwnd=240&unsent_bytes=0&cid=19da7d754f86b0e1&ts=157&x=0"
                                    2025-01-11 07:49:23 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.549712104.21.48.14431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 07:49:24 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 07:49:24 UTC857INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:24 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1896553
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7LNHK%2BfABkOSKCc3dM0FR5cRS%2BwPTBBHURaDEVxPZ7WT7xBymF11QgkvZ86JwBc%2FK82hJqxCBEff2QwKFIA7ezZ3zBHioAKxuhCvcxGkQjvfb6xCpOT34tFq8y7HQHMzzBjU%2BHQW"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90034f5bade043be-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1536&min_rtt=1532&rtt_var=584&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1858688&cwnd=226&unsent_bytes=0&cid=a61ee693cbc40913&ts=146&x=0"
                                    2025-01-11 07:49:24 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.549715104.21.48.14431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 07:49:25 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 07:49:25 UTC855INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:25 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1896554
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2EjSekksELR6vJkG5NES5rSicEGmwemHQwUUIhwIx%2BNNmpmGtGjYYUHbuhM2x8nuXd8XTxPaWfzXRfTBoAtNTPUa5tEUFEnvB2g5qWKo%2FOKCt3qNpJaPER0zuvxe8M4S6Bsyl%2BhK"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90034f63cb0c8c15-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1840&min_rtt=1812&rtt_var=699&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1611479&cwnd=238&unsent_bytes=0&cid=5df6aa36090002af&ts=162&x=0"
                                    2025-01-11 07:49:25 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.549718104.21.48.14431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 07:49:26 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 07:49:27 UTC855INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:27 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1896556
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bveUIXN7piFTEVJeY51q1CraBdhuoAJP0XVjyLOuYOixqOVHKfaQLYP%2FuR4ph%2Fevov0a4pN3fPTyyQjjIbbrp8wGEk%2BVqJok2GhN6z6YGkXsdyClmRRwotnNd0sQouN1nLrYdXs1"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90034f6bcac48cda-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1968&min_rtt=1966&rtt_var=741&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1472516&cwnd=243&unsent_bytes=0&cid=c3895de89cf0dd4f&ts=160&x=0"
                                    2025-01-11 07:49:27 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.549720104.21.48.14431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 07:49:28 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 07:49:28 UTC857INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:28 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1896557
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u%2Fj9LzX4zNUDJddodxT44vL83aJB6aVA5s1SmAENK%2BkF6COWfW9tJJLhkVN20ykIpVHpK6vrSL2NK1sW4mkIQa39dLLjnweHYX5Rn6IHeCE2yXHUBDluZY5%2BnYq%2BFc8nF3uzRWhM"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90034f739fae42e9-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1654&min_rtt=1653&rtt_var=623&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1751649&cwnd=240&unsent_bytes=0&cid=029cf1a7a5b87512&ts=133&x=0"
                                    2025-01-11 07:49:28 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.549723104.21.48.14431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 07:49:29 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 07:49:29 UTC853INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:29 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1896558
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YddVcwAyNPlAgqhgANymRuRWITvyxFNTI5PyvDQNfJHJCfUsC1vh0cU%2Bu6ejiWnzSon5yBGR7Eyinl8eFnqXQkmseQEziNOSni%2FN7jPzZPyo9TyeHJGqnNOqY27lSUMM2ob8OTby"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90034f7b7c3cc323-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1492&min_rtt=1483&rtt_var=574&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1877813&cwnd=214&unsent_bytes=0&cid=5fadc6e1a1f267d4&ts=151&x=0"
                                    2025-01-11 07:49:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    7192.168.2.549731104.21.48.14431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 07:49:30 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 07:49:30 UTC857INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 07:49:30 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1896560
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rUJZNZge6NsFqzTzg%2FCZDUAyTsMjfz0HrCpaau1yUi3q%2BYXO%2FsayOvyjFwjvuIj7twh1CtmNtrfqF%2F5jkwAoaszaU0i81zE8TXFcLKdXaNAKiJiVgmeK6hRvxLWWQS0zxpcAzZvD"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90034f8418868c15-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1757&min_rtt=1753&rtt_var=666&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1631284&cwnd=238&unsent_bytes=0&cid=bd4363915e6e6c35&ts=246&x=0"
                                    2025-01-11 07:49:30 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:02:49:12
                                    Start date:11/01/2025
                                    Path:C:\Users\user\Desktop\ZpYFG94D4C.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\ZpYFG94D4C.exe"
                                    Imagebase:0xb0000
                                    File size:594'432 bytes
                                    MD5 hash:68EA88AB97C52F5C4CE75CE445F9AEAD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2124982227.0000000003439000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:02:49:18
                                    Start date:11/01/2025
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ZpYFG94D4C.exe"
                                    Imagebase:0x4a0000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:02:49:18
                                    Start date:11/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:02:49:18
                                    Start date:11/01/2025
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                    Imagebase:0x860000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000002.4532016234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.4533694105.0000000002E0A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.4533694105.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:false

                                    Target ID:6
                                    Start time:02:49:21
                                    Start date:11/01/2025
                                    Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                    Imagebase:0x7ff6ef0c0000
                                    File size:496'640 bytes
                                    MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                    Has elevated privileges:true
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:9.8%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:202
                                      Total number of Limit Nodes:14
                                      execution_graph 50422 2284668 50423 228467a 50422->50423 50424 2284686 50423->50424 50426 2284778 50423->50426 50427 228479d 50426->50427 50431 2284878 50427->50431 50435 2284888 50427->50435 50433 22848af 50431->50433 50432 228498c 50432->50432 50433->50432 50439 22844b4 50433->50439 50437 22848af 50435->50437 50436 228498c 50436->50436 50437->50436 50438 22844b4 CreateActCtxA 50437->50438 50438->50436 50440 2285918 CreateActCtxA 50439->50440 50442 22859db 50440->50442 50486 228d478 50487 228d4be 50486->50487 50491 228d658 50487->50491 50494 228d647 50487->50494 50488 228d5ab 50492 228d686 50491->50492 50497 228b7d0 50491->50497 50492->50488 50495 228b7d0 DuplicateHandle 50494->50495 50496 228d686 50495->50496 50496->50488 50498 228d6c0 DuplicateHandle 50497->50498 50499 228d756 50498->50499 50499->50492 50521 76bc15a 50522 76bc251 50521->50522 50523 76bc164 50521->50523 50527 76bce28 50523->50527 50541 76bce8e 50523->50541 50556 76bce18 50523->50556 50528 76bce42 50527->50528 50540 76bce4a 50528->50540 50570 76bd67b 50528->50570 50578 76bd495 50528->50578 50582 76bd516 50528->50582 50589 76bd837 50528->50589 50593 76bd980 50528->50593 50597 76bd5b2 50528->50597 50602 76bd5fd 50528->50602 50607 76bd41e 50528->50607 50612 76bd688 50528->50612 50617 76bdb79 50528->50617 50622 76bd29b 50528->50622 50540->50522 50542 76bce1c 50541->50542 50543 76bce91 50541->50543 50544 76bd67b 4 API calls 50542->50544 50545 76bd29b 2 API calls 50542->50545 50546 76bdb79 2 API calls 50542->50546 50547 76bd688 2 API calls 50542->50547 50548 76bd41e 2 API calls 50542->50548 50549 76bd5fd 2 API calls 50542->50549 50550 76bd5b2 2 API calls 50542->50550 50551 76bd980 2 API calls 50542->50551 50552 76bd837 2 API calls 50542->50552 50553 76bd516 4 API calls 50542->50553 50554 76bd495 2 API calls 50542->50554 50555 76bce4a 50542->50555 50543->50522 50544->50555 50545->50555 50546->50555 50547->50555 50548->50555 50549->50555 50550->50555 50551->50555 50552->50555 50553->50555 50554->50555 50555->50522 50557 76bce1c 50556->50557 50558 76bd67b 4 API calls 50557->50558 50559 76bd29b 2 API calls 50557->50559 50560 76bdb79 2 API calls 50557->50560 50561 76bd688 2 API calls 50557->50561 50562 76bd41e 2 API calls 50557->50562 50563 76bd5fd 2 API calls 50557->50563 50564 76bd5b2 2 API calls 50557->50564 50565 76bd980 2 API calls 50557->50565 50566 76bd837 2 API calls 50557->50566 50567 76bd516 4 API calls 50557->50567 50568 76bd495 2 API calls 50557->50568 50569 76bce4a 50557->50569 50558->50569 50559->50569 50560->50569 50561->50569 50562->50569 50563->50569 50564->50569 50565->50569 50566->50569 50567->50569 50568->50569 50569->50522 50571 76bdacd 50570->50571 50627 76bb808 50571->50627 50631 76bb800 50571->50631 50572 76bdaeb 50635 76bb8c8 50572->50635 50639 76bb8c1 50572->50639 50573 76bdc43 50643 76baee9 50578->50643 50647 76baef0 50578->50647 50579 76bd3d1 50579->50540 50651 76bb9b8 50582->50651 50655 76bb9b2 50582->50655 50583 76bd53c 50584 76bd65d 50583->50584 50659 76be018 50583->50659 50664 76be007 50583->50664 50584->50540 50591 76bb8c8 WriteProcessMemory 50589->50591 50592 76bb8c1 WriteProcessMemory 50589->50592 50590 76bd70c 50590->50540 50591->50590 50592->50590 50595 76bb8c8 WriteProcessMemory 50593->50595 50596 76bb8c1 WriteProcessMemory 50593->50596 50594 76bd9a4 50595->50594 50596->50594 50598 76bd7fc 50597->50598 50600 76baee9 Wow64SetThreadContext 50598->50600 50601 76baef0 Wow64SetThreadContext 50598->50601 50599 76bd817 50600->50599 50601->50599 50603 76bd578 50602->50603 50604 76bd65d 50603->50604 50605 76be018 2 API calls 50603->50605 50606 76be007 2 API calls 50603->50606 50604->50540 50605->50603 50606->50603 50608 76bd438 50607->50608 50608->50540 50609 76bd65d 50608->50609 50610 76be018 2 API calls 50608->50610 50611 76be007 2 API calls 50608->50611 50609->50540 50610->50608 50611->50608 50613 76bd578 50612->50613 50614 76bd65d 50613->50614 50615 76be018 2 API calls 50613->50615 50616 76be007 2 API calls 50613->50616 50614->50540 50615->50613 50616->50613 50618 76bdb7f 50617->50618 50620 76bb8c8 WriteProcessMemory 50618->50620 50621 76bb8c1 WriteProcessMemory 50618->50621 50619 76bdc43 50620->50619 50621->50619 50623 76bd2bd 50622->50623 50677 76bbb50 50623->50677 50681 76bbb44 50623->50681 50628 76bb848 VirtualAllocEx 50627->50628 50630 76bb885 50628->50630 50630->50572 50632 76bb808 VirtualAllocEx 50631->50632 50634 76bb885 50632->50634 50634->50572 50636 76bb910 WriteProcessMemory 50635->50636 50638 76bb967 50636->50638 50638->50573 50640 76bb8c8 WriteProcessMemory 50639->50640 50642 76bb967 50640->50642 50642->50573 50644 76baef0 Wow64SetThreadContext 50643->50644 50646 76baf7d 50644->50646 50646->50579 50648 76baf35 Wow64SetThreadContext 50647->50648 50650 76baf7d 50648->50650 50650->50579 50652 76bba03 ReadProcessMemory 50651->50652 50654 76bba47 50652->50654 50654->50583 50656 76bba03 ReadProcessMemory 50655->50656 50658 76bba47 50656->50658 50658->50583 50660 76be02d 50659->50660 50669 76bad88 50660->50669 50673 76bae40 50660->50673 50661 76be040 50661->50583 50665 76be02d 50664->50665 50667 76bad88 ResumeThread 50665->50667 50668 76bae40 ResumeThread 50665->50668 50666 76be040 50666->50583 50667->50666 50668->50666 50670 76bad92 ResumeThread 50669->50670 50672 76baeb1 50670->50672 50672->50661 50674 76bae80 ResumeThread 50673->50674 50676 76baeb1 50674->50676 50676->50661 50678 76bbbd9 CreateProcessA 50677->50678 50680 76bbd9b 50678->50680 50680->50680 50682 76bbaf8 50681->50682 50683 76bbb4e CreateProcessA 50681->50683 50682->50540 50685 76bbd9b 50683->50685 50685->50685 50514 76be088 50515 76be213 50514->50515 50516 76be0ae 50514->50516 50516->50515 50518 76bb4a8 50516->50518 50519 76be308 PostMessageW 50518->50519 50520 76be374 50519->50520 50520->50516 50500 228acf0 50504 228ade8 50500->50504 50509 228add8 50500->50509 50501 228acff 50505 228ae1c 50504->50505 50506 228adf9 50504->50506 50505->50501 50506->50505 50507 228b020 GetModuleHandleW 50506->50507 50508 228b04d 50507->50508 50508->50501 50510 228adf9 50509->50510 50511 228ae1c 50509->50511 50510->50511 50512 228b020 GetModuleHandleW 50510->50512 50511->50501 50513 228b04d 50512->50513 50513->50501 50443 92d01c 50444 92d034 50443->50444 50445 92d08e 50444->50445 50448 4ae2818 50444->50448 50453 4ae2809 50444->50453 50449 4ae2845 50448->50449 50450 4ae2877 50449->50450 50458 4ae2da8 50449->50458 50463 4ae2d85 50449->50463 50454 4ae2845 50453->50454 50455 4ae2877 50454->50455 50456 4ae2da8 2 API calls 50454->50456 50457 4ae2d85 2 API calls 50454->50457 50456->50455 50457->50455 50459 4ae2dbc 50458->50459 50468 4ae2e60 50459->50468 50471 4ae2e50 50459->50471 50460 4ae2e48 50460->50450 50465 4ae2dbc 50463->50465 50464 4ae2e48 50464->50450 50466 4ae2e60 2 API calls 50465->50466 50467 4ae2e50 2 API calls 50465->50467 50466->50464 50467->50464 50469 4ae2e71 50468->50469 50474 4ae4021 50468->50474 50469->50460 50472 4ae2e71 50471->50472 50473 4ae4021 2 API calls 50471->50473 50472->50460 50473->50472 50478 4ae4040 50474->50478 50482 4ae4050 50474->50482 50475 4ae403a 50475->50469 50479 4ae4092 50478->50479 50481 4ae4099 50478->50481 50480 4ae40ea CallWindowProcW 50479->50480 50479->50481 50480->50481 50481->50475 50483 4ae4092 50482->50483 50485 4ae4099 50482->50485 50484 4ae40ea CallWindowProcW 50483->50484 50483->50485 50484->50485 50485->50475
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2132764573.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4ae0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 18375d3bf5ea5c97066e7d990d9adaeabeaaf31a2db740d65472ee1c6d671e00
                                      • Instruction ID: 1082e419b08be7850d1959760909a0cc3710606c143a667fc3df0e779f098fe0
                                      • Opcode Fuzzy Hash: 18375d3bf5ea5c97066e7d990d9adaeabeaaf31a2db740d65472ee1c6d671e00
                                      • Instruction Fuzzy Hash: D832E834E10219CFDB14DFA9C884AADB7B2FF99304F5085A9D419AB365DB30AD85CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2132764573.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4ae0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5c828dcda6db65715814f94beb43f2dd1a29addd6099012e0f6c6233024f0a2c
                                      • Instruction ID: fd8f08dbd502dbb11c91cf77e5eabfbffaf79bcf46de0b62eac349930e0effd1
                                      • Opcode Fuzzy Hash: 5c828dcda6db65715814f94beb43f2dd1a29addd6099012e0f6c6233024f0a2c
                                      • Instruction Fuzzy Hash: C022E834E10219CFDB14DFA5C884AADB7B2FF9A304F5085AAD419AB365DB30AD85CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c3c69569e72074862671fbfdc3de78ced5ce9e4fda25a005c025d82bf03a013d
                                      • Instruction ID: 2cc792da8ce02283a5e368010bcad3bd5aa44908d7ef5ab6261485cd85604c0b
                                      • Opcode Fuzzy Hash: c3c69569e72074862671fbfdc3de78ced5ce9e4fda25a005c025d82bf03a013d
                                      • Instruction Fuzzy Hash: 4D02D0B1A013058FDB29EB75C850BEEBBF6AF8A300F14446AD046DB3A1CB35D985CB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 15c7eb964ebba28298232ba085bfcaf829ad3cf8c86aab18d396a3de3ebf4529
                                      • Instruction ID: 2526999dd91a77a92b46014bc768a852df44197ca616c1990c5f0270dcb0cfff
                                      • Opcode Fuzzy Hash: 15c7eb964ebba28298232ba085bfcaf829ad3cf8c86aab18d396a3de3ebf4529
                                      • Instruction Fuzzy Hash: 572107B0D016188BEB18CFABC8453DEBBF7AFC9310F14C06AD40AA6254DB7509868F91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 169581302b25ce366e912d5ae60c97f9fd452f683db761bf9653fa837f39cc28
                                      • Instruction ID: 74e1e1f8faafea9d380b9f79d82013fbb64cedc4cf9cb9164f47631772b5190d
                                      • Opcode Fuzzy Hash: 169581302b25ce366e912d5ae60c97f9fd452f683db761bf9653fa837f39cc28
                                      • Instruction Fuzzy Hash: 7621B7B0D016188BEB28CFABC9453DEFAF7AFC9300F14C56AD51A66254DB7409868F90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 294 56a0940-56a096a 295 56a096c 294->295 296 56a0973-56a0977 294->296 295->296 297 56a0979-56a097d 296->297 298 56a098e-56a09a9 296->298 299 56a0c4e-56a0c59 297->299 300 56a0983-56a098b 297->300 306 56a09ab 298->306 307 56a09b4-56a09b8 298->307 305 56a0c60-56a0cc4 299->305 300->298 328 56a0ccb-56a0d2f 305->328 306->307 308 56a09ba-56a09c0 307->308 309 56a09c3-56a09e7 307->309 308->309 316 56a09ed-56a09f2 309->316 317 56a0b82-56a0b9d 309->317 401 56a09f5 call 56a0e18 316->401 402 56a09f5 call 56a0e07 316->402 323 56a0c3f-56a0c46 317->323 319 56a09fb-56a09ff 319->305 322 56a0a05-56a0a09 319->322 322->305 324 56a0a0f-56a0a19 322->324 324->328 329 56a0a1f-56a0a23 324->329 361 56a0d36-56a0d9a 328->361 329->317 331 56a0a29-56a0a2d 329->331 333 56a0a2f-56a0a36 331->333 334 56a0a3c-56a0a40 331->334 333->317 333->334 335 56a0da1-56a0dc3 334->335 336 56a0a46-56a0a56 334->336 341 56a0e00 335->341 342 56a0dc5-56a0dd1 335->342 343 56a0a58-56a0a5e 336->343 344 56a0a86-56a0a8c 336->344 347 56a0e02-56a0e05 341->347 342->341 356 56a0dd3-56a0ddc 342->356 348 56a0a62-56a0a6e 343->348 349 56a0a60 343->349 345 56a0a8e 344->345 346 56a0a90-56a0a9c 344->346 351 56a0a9e-56a0abc 345->351 346->351 350 56a0a70-56a0a80 348->350 349->350 350->344 350->361 351->317 362 56a0ac2-56a0ac4 351->362 356->341 364 56a0dde-56a0dec 356->364 361->335 365 56a0adf-56a0ae3 362->365 366 56a0ac6-56a0ad1 362->366 364->341 372 56a0dee-56a0dfc 364->372 365->317 367 56a0ae9-56a0af3 365->367 398 56a0ad4 call 56a10a8 366->398 399 56a0ad4 call 56a0f83 366->399 400 56a0ad4 call 56a0f90 366->400 367->317 376 56a0af9-56a0aff 367->376 369 56a0ada 369->323 372->341 381 56a0dfe 372->381 378 56a0c49 376->378 379 56a0b05-56a0b08 376->379 378->299 379->335 382 56a0b0e-56a0b2b 379->382 381->347 388 56a0b69-56a0b7d 382->388 389 56a0b2d-56a0b48 382->389 388->323 395 56a0b4a-56a0b4e 389->395 396 56a0b50-56a0b64 389->396 395->317 395->396 396->323 398->369 399->369 400->369 401->319 402->319
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o]q$(o]q$,aq$,aq$Haq$d8bq
                                      • API String ID: 0-380147655
                                      • Opcode ID: a23871d092ed47986e8f6a7dff2c8be17b15c79b1fbc9039c5f9f304d22d82a6
                                      • Instruction ID: 00d5736f8a535cf63e9a72267d06ee4a987f7d316c7cd034103ea0533c77c7c5
                                      • Opcode Fuzzy Hash: a23871d092ed47986e8f6a7dff2c8be17b15c79b1fbc9039c5f9f304d22d82a6
                                      • Instruction Fuzzy Hash: 57C16B35B001199FDB14AFA8D858AAE7BF6FF88320F148469E906973A5DB34DC41CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 403 56aec60-56aec7f 404 56aeca1-56aeca8 403->404 405 56aecb3-56aecf6 404->405 410 56aecfc-56aed10 405->410 411 56aedc3-56aedd6 405->411 410->411 412 56aed16-56aed21 410->412 412->411 413 56aed27-56aed37 412->413 413->411 415 56aed3d-56aed4c 413->415 416 56aec81-56aec84 415->416 417 56aec8d-56aec9f 416->417 418 56aec86 416->418 417->416 418->404 418->417 419 56aed93-56aed97 418->419 420 56aed51-56aed57 418->420 421 56aedb8 419->421 422 56aed99-56aeda2 419->422 424 56aed5b-56aed67 420->424 425 56aed59 420->425 429 56aedbb-56aedc2 421->429 426 56aeda9-56aedac 422->426 427 56aeda4-56aeda7 422->427 428 56aed69-56aed78 424->428 425->428 430 56aedb6 426->430 427->430 433 56aed7a-56aed80 428->433 434 56aed90 428->434 430->429 435 56aed82 433->435 436 56aed84-56aed86 433->436 434->419 435->434 436->434
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8aq$8aq$$]q$$]q$$]q$$]q
                                      • API String ID: 0-424724130
                                      • Opcode ID: 7840567aab685f03bf60b81f099d2b26783f85d1d7a8b02ddf88cd525b8a14d3
                                      • Instruction ID: 1a5851b857e80a13d2ae0ece239734c9c6a50908cf3d301ee8c149f37bfb9fa0
                                      • Opcode Fuzzy Hash: 7840567aab685f03bf60b81f099d2b26783f85d1d7a8b02ddf88cd525b8a14d3
                                      • Instruction Fuzzy Hash: 5341C531B04245CFDB14EB68C805A7E7BB6FB89304F14446AE116EB381D7769D42CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 437 56a4248-56a425f 439 56a42c2-56a42d0 437->439 440 56a4261-56a4270 437->440 443 56a42d2-56a42dd call 56a22f0 439->443 444 56a42e3-56a42e5 439->444 440->439 445 56a4272-56a427e call 56a3554 440->445 443->444 451 56a43a2-56a441a 443->451 542 56a42e7 call 56a423b 444->542 543 56a42e7 call 56a4248 444->543 452 56a4292-56a42ae 445->452 453 56a4280-56a428c call 56a3564 445->453 450 56a42ed-56a42fc 459 56a42fe-56a430f call 56a3574 450->459 460 56a4314-56a4317 450->460 480 56a441c-56a4422 451->480 481 56a4423-56a442d 451->481 466 56a435d-56a439b 452->466 467 56a42b4-56a42b8 452->467 453->452 461 56a4318-56a4356 453->461 459->460 461->466 466->451 467->439 485 56a4669-56a4695 481->485 486 56a4433-56a444c call 56a359c * 2 481->486 493 56a469c-56a46ed 485->493 486->493 494 56a4452-56a4474 486->494 501 56a4476-56a4484 call 56a3574 494->501 502 56a4485-56a4494 494->502 507 56a44b9-56a44da 502->507 508 56a4496-56a44b3 502->508 516 56a452a-56a4552 507->516 517 56a44dc-56a44ed 507->517 508->507 540 56a4555 call 56a4923 516->540 541 56a4555 call 56a4930 516->541 520 56a44ef-56a4507 call 56a35ac 517->520 521 56a451c-56a4520 517->521 528 56a4509-56a450a 520->528 529 56a450c-56a451a 520->529 521->516 524 56a4558-56a457d 531 56a457f-56a4594 524->531 532 56a45c3 524->532 528->529 529->520 529->521 531->532 535 56a4596-56a45b9 531->535 532->485 535->532 539 56a45bb 535->539 539->532 540->524 541->524 542->450 543->450
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq$Haq$Haq$Haq$Haq
                                      • API String ID: 0-1792267638
                                      • Opcode ID: 253e18ec67c558bd7d27dc6576363d414396762b0629ad0c9e47eda90b044960
                                      • Instruction ID: 10e42a376c222b401088c0d1a96beed682f11ad605e404c19380f703d0d2b5e3
                                      • Opcode Fuzzy Hash: 253e18ec67c558bd7d27dc6576363d414396762b0629ad0c9e47eda90b044960
                                      • Instruction Fuzzy Hash: F7C15835B002048FDB14EBB9C9549AEBBF6BF89301B1448A8D402AB794DF75ED41CF61

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 544 56ae108-56ae128 545 56ae161-56ae179 544->545 547 56ae184-56ae186 545->547 548 56ae18b-56ae195 547->548 549 56ae188 547->549 550 56ae19e-56ae1a1 548->550 551 56ae197-56ae19c 548->551 549->548 552 56ae1a4-56ae1b6 550->552 551->552 554 56ae12a-56ae12d 552->554 555 56ae12f 554->555 556 56ae136-56ae14d 554->556 555->545 555->556 557 56ae28a-56ae290 555->557 558 56ae1bb-56ae1c0 555->558 559 56ae26c-56ae277 555->559 560 56ae2a2-56ae2a6 555->560 561 56ae223-56ae229 555->561 562 56ae260-56ae267 555->562 563 56ae256-56ae25b 555->563 564 56ae1c5-56ae1e2 555->564 577 56ae153-56ae15f 556->577 578 56ae2c7-56ae2d2 556->578 568 56ae292 557->568 569 56ae294 557->569 558->554 566 56ae279 559->566 567 56ae283-56ae288 559->567 572 56ae2a8-56ae2b1 560->572 573 56ae2bc 560->573 570 56ae22b-56ae22d 561->570 571 56ae22f-56ae23b 561->571 562->554 563->554 584 56ae1fa-56ae21e 564->584 585 56ae1e4-56ae1ea 564->585 580 56ae27e 566->580 567->580 581 56ae296-56ae29f 568->581 569->581 582 56ae23d-56ae24c 570->582 571->582 574 56ae2b8 572->574 575 56ae2b3-56ae2b6 572->575 579 56ae2bf-56ae2c6 573->579 583 56ae2ba 574->583 575->583 577->554 580->554 581->560 582->563 583->579 584->554 587 56ae1ee-56ae1f0 585->587 588 56ae1ec 585->588 587->584 588->584
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q$LR]q$$]q$$]q$$]q
                                      • API String ID: 0-527398971
                                      • Opcode ID: 0e70f3fd51fddae1e2d591dcb3086423dcc7e9374de1c4e73de98dc5f87cac85
                                      • Instruction ID: 241d44ee0e7ad6435d7fa85380b8e87906c0229a3d2d39d62724908f4187a145
                                      • Opcode Fuzzy Hash: 0e70f3fd51fddae1e2d591dcb3086423dcc7e9374de1c4e73de98dc5f87cac85
                                      • Instruction Fuzzy Hash: D941D331B14219DBEB248EA9CC41B7EB6FABB45700F10446AE506EB281E6B59C42CF51

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 651 56ae0f8-56ae128 653 56ae12a-56ae12d 651->653 654 56ae161 651->654 655 56ae12f 653->655 656 56ae136-56ae14d 653->656 665 56ae16b-56ae179 654->665 655->654 655->656 657 56ae28a-56ae290 655->657 658 56ae1bb-56ae1c0 655->658 659 56ae26c-56ae277 655->659 660 56ae2a2-56ae2a6 655->660 661 56ae223-56ae229 655->661 662 56ae260-56ae267 655->662 663 56ae256-56ae25b 655->663 664 56ae1c5-56ae1e2 655->664 678 56ae153-56ae15f 656->678 679 56ae2c7-56ae2d2 656->679 669 56ae292 657->669 670 56ae294 657->670 658->653 667 56ae279 659->667 668 56ae283-56ae288 659->668 673 56ae2a8-56ae2b1 660->673 674 56ae2bc 660->674 671 56ae22b-56ae22d 661->671 672 56ae22f-56ae23b 661->672 662->653 663->653 686 56ae1fa-56ae21e 664->686 687 56ae1e4-56ae1ea 664->687 682 56ae184-56ae186 665->682 681 56ae27e 667->681 668->681 683 56ae296-56ae29f 669->683 670->683 684 56ae23d-56ae24c 671->684 672->684 675 56ae2b8 673->675 676 56ae2b3-56ae2b6 673->676 680 56ae2bf-56ae2c6 674->680 685 56ae2ba 675->685 676->685 678->653 681->653 688 56ae18b-56ae195 682->688 689 56ae188 682->689 683->660 684->663 685->680 686->653 691 56ae1ee-56ae1f0 687->691 692 56ae1ec 687->692 694 56ae19e-56ae1a1 688->694 695 56ae197-56ae19c 688->695 689->688 691->686 692->686 698 56ae1a4-56ae1b6 694->698 695->698 698->653
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q$$]q$$]q
                                      • API String ID: 0-4258901230
                                      • Opcode ID: 91642b348966b6a62c87554d6c4a968ef6a0bb3df84c59519eb7c9f75fa0d876
                                      • Instruction ID: cf5e1512a99ba96024bd13f557326bb0985cda944c10818c64a8a84b1e887d64
                                      • Opcode Fuzzy Hash: 91642b348966b6a62c87554d6c4a968ef6a0bb3df84c59519eb7c9f75fa0d876
                                      • Instruction Fuzzy Hash: 2241E431B04215DBEB208EA9DC41BBEB7BAFB45700F00447AE516EB2C1E6B69D42CF41

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 722 56a0f90-56a0fb0 724 56a1058-56a105e 722->724 725 56a0fb6-56a0fc1 722->725 728 56a108b 724->728 729 56a1060-56a106b 724->729 726 56a109d-56a10da 725->726 727 56a0fc7-56a0fd2 725->727 744 56a1173-56a1188 726->744 745 56a10e0-56a10e6 726->745 730 56a1046-56a104a 727->730 731 56a0fd4-56a0fe2 727->731 732 56a1090-56a1097 728->732 733 56a106d-56a107b 729->733 734 56a1081-56a1084 729->734 735 56a1098 730->735 737 56a104c-56a1052 730->737 731->730 743 56a0fe4-56a0ff4 731->743 733->734 742 56a107d-56a107f 733->742 734->735 736 56a1086-56a1089 734->736 735->726 736->728 736->729 737->724 737->725 742->732 743->730 751 56a0ff6-56a0ff9 743->751 753 56a118a-56a119a 744->753 754 56a11ac-56a11c9 744->754 746 56a10e9-56a10f1 745->746 748 56a11f7-56a1219 746->748 749 56a10f7-56a1101 746->749 766 56a121b-56a1225 748->766 767 56a1227-56a1243 748->767 749->748 752 56a1107-56a110d 749->752 755 56a0ffb-56a1000 751->755 756 56a103c-56a103f 751->756 758 56a111f 752->758 759 56a110f-56a111d 752->759 753->754 770 56a119c-56a11aa 753->770 773 56a11cf 754->773 755->726 757 56a1006-56a100b 755->757 756->735 760 56a1041-56a1044 756->760 757->756 762 56a100d-56a1034 757->762 764 56a1121-56a1123 758->764 759->764 760->730 760->751 762->756 792 56a1036-56a1038 762->792 768 56a1142-56a1164 764->768 769 56a1125-56a1134 764->769 766->767 775 56a1260-56a1274 766->775 785 56a125b-56a125d 767->785 786 56a1245-56a1259 767->786 794 56a116a-56a116d 768->794 795 56a11f2 768->795 769->768 783 56a1136-56a1140 769->783 770->754 780 56a11d1-56a11df 770->780 777 56a11e8-56a11ef 773->777 796 56a127b-56a12c1 775->796 780->777 783->768 786->785 786->796 792->756 794->744 794->746 795->748 802 56a12ca-56a12da 796->802 803 56a12c3-56a12c8 796->803 804 56a12df-56a12e0 802->804 803->804
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4|bq$4|bq
                                      • API String ID: 0-3562454414
                                      • Opcode ID: e59378a8b21b5cd339dd40e212aed2aaafa52ad139a1f8b1aaa7b5e592300294
                                      • Instruction ID: f6b59b9acbdb02e3b737819566a4daf31fb60eef31e112fb1b3037cd201a5bda
                                      • Opcode Fuzzy Hash: e59378a8b21b5cd339dd40e212aed2aaafa52ad139a1f8b1aaa7b5e592300294
                                      • Instruction Fuzzy Hash: B1B14C76A041159FCB14DF68C894AAEBBB2FF49710F158469E806DB361DB35EC42CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 807 56a5eac-56a5ebe 808 56a5ec0-56a5ec4 807->808 809 56a5ec5-56a5f22 call 56a5560 807->809 808->809 815 56a5f88-56a5fb4 809->815 816 56a5f24-56a5f26 809->816 817 56a5fbb-56a5fc3 815->817 816->817 818 56a5f2c-56a5f38 816->818 823 56a5fca-56a6105 817->823 818->823 824 56a5f3e-56a5f87 call 56a556c 818->824 841 56a610b-56a6119 823->841 842 56a611b-56a6121 841->842 843 56a6122-56a6168 841->843 842->843 848 56a616a-56a616d 843->848 849 56a6175 843->849 848->849 850 56a6176 849->850 850->850
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq$Haq
                                      • API String ID: 0-4016896955
                                      • Opcode ID: cc0825c2c927e72d225ed3508f60ee080c7f31614aeb71a0fddbcd9aaf0deaa7
                                      • Instruction ID: 7cb3d4581e880cccd2fd9d3f457f0696db3080bc20e7f8e315444ea7e87d7e26
                                      • Opcode Fuzzy Hash: cc0825c2c927e72d225ed3508f60ee080c7f31614aeb71a0fddbcd9aaf0deaa7
                                      • Instruction Fuzzy Hash: 5E814A71E003199FDB14DFA9C8946AEBBB2BF89300F14856AE409AB355DB349D06CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 851 56a0910-56a096a 855 56a096c 851->855 856 56a0973-56a0977 851->856 855->856 857 56a0979-56a097d 856->857 858 56a098e-56a09a9 856->858 859 56a0c4e-56a0c59 857->859 860 56a0983-56a098b 857->860 866 56a09ab 858->866 867 56a09b4-56a09b8 858->867 865 56a0c60-56a0cc4 859->865 860->858 888 56a0ccb-56a0d2f 865->888 866->867 868 56a09ba-56a09c0 867->868 869 56a09c3-56a09e7 867->869 868->869 876 56a09ed-56a09f2 869->876 877 56a0b82-56a0b9d 869->877 958 56a09f5 call 56a0e18 876->958 959 56a09f5 call 56a0e07 876->959 883 56a0c3f-56a0c46 877->883 879 56a09fb-56a09ff 879->865 882 56a0a05-56a0a09 879->882 882->865 884 56a0a0f-56a0a19 882->884 884->888 889 56a0a1f-56a0a23 884->889 921 56a0d36-56a0d9a 888->921 889->877 891 56a0a29-56a0a2d 889->891 893 56a0a2f-56a0a36 891->893 894 56a0a3c-56a0a40 891->894 893->877 893->894 895 56a0da1-56a0dc3 894->895 896 56a0a46-56a0a56 894->896 901 56a0e00 895->901 902 56a0dc5-56a0dd1 895->902 903 56a0a58-56a0a5e 896->903 904 56a0a86-56a0a8c 896->904 907 56a0e02-56a0e05 901->907 902->901 916 56a0dd3-56a0ddc 902->916 908 56a0a62-56a0a6e 903->908 909 56a0a60 903->909 905 56a0a8e 904->905 906 56a0a90-56a0a9c 904->906 911 56a0a9e-56a0abc 905->911 906->911 910 56a0a70-56a0a80 908->910 909->910 910->904 910->921 911->877 922 56a0ac2-56a0ac4 911->922 916->901 924 56a0dde-56a0dec 916->924 921->895 925 56a0adf-56a0ae3 922->925 926 56a0ac6-56a0ad1 922->926 924->901 932 56a0dee-56a0dfc 924->932 925->877 927 56a0ae9-56a0af3 925->927 960 56a0ad4 call 56a10a8 926->960 961 56a0ad4 call 56a0f83 926->961 962 56a0ad4 call 56a0f90 926->962 927->877 936 56a0af9-56a0aff 927->936 929 56a0ada 929->883 932->901 941 56a0dfe 932->941 938 56a0c49 936->938 939 56a0b05-56a0b08 936->939 938->859 939->895 942 56a0b0e-56a0b2b 939->942 941->907 948 56a0b69-56a0b7d 942->948 949 56a0b2d-56a0b48 942->949 948->883 955 56a0b4a-56a0b4e 949->955 956 56a0b50-56a0b64 949->956 955->877 955->956 956->883 958->879 959->879 960->929 961->929 962->929
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o]q$,aq
                                      • API String ID: 0-2797082531
                                      • Opcode ID: af0cc4ac3e0c65ae525927e19a375d929008ce9865763709fc2f6e4fbed2e6f5
                                      • Instruction ID: 970e01c114494a9060f1abf9d3ff3722dc9b4380cbb5f7dd01e16cb2d5f37f2e
                                      • Opcode Fuzzy Hash: af0cc4ac3e0c65ae525927e19a375d929008ce9865763709fc2f6e4fbed2e6f5
                                      • Instruction Fuzzy Hash: 7B514D35A01219DFDB24DF68D888AAEBBF1FF48324F148069E806A7761D7349D45CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 963 76bbb44-76bbb4c 964 76bbaf8-76bbb0a 963->964 965 76bbb4e-76bbbe5 963->965 969 76bbb0c-76bbb12 964->969 970 76bbb13-76bbb38 964->970 971 76bbc1e-76bbc3e 965->971 972 76bbbe7-76bbbf1 965->972 969->970 980 76bbc40-76bbc4a 971->980 981 76bbc77-76bbca6 971->981 972->971 974 76bbbf3-76bbbf5 972->974 977 76bbc18-76bbc1b 974->977 978 76bbbf7-76bbc01 974->978 977->971 982 76bbc03 978->982 983 76bbc05-76bbc14 978->983 980->981 984 76bbc4c-76bbc4e 980->984 991 76bbca8-76bbcb2 981->991 992 76bbcdf-76bbd99 CreateProcessA 981->992 982->983 983->983 985 76bbc16 983->985 986 76bbc71-76bbc74 984->986 987 76bbc50-76bbc5a 984->987 985->977 986->981 989 76bbc5e-76bbc6d 987->989 990 76bbc5c 987->990 989->989 993 76bbc6f 989->993 990->989 991->992 994 76bbcb4-76bbcb6 991->994 1003 76bbd9b-76bbda1 992->1003 1004 76bbda2-76bbe28 992->1004 993->986 995 76bbcd9-76bbcdc 994->995 996 76bbcb8-76bbcc2 994->996 995->992 998 76bbcc6-76bbcd5 996->998 999 76bbcc4 996->999 998->998 1000 76bbcd7 998->1000 999->998 1000->995 1003->1004 1014 76bbe2a-76bbe2e 1004->1014 1015 76bbe38-76bbe3c 1004->1015 1014->1015 1016 76bbe30 1014->1016 1017 76bbe3e-76bbe42 1015->1017 1018 76bbe4c-76bbe50 1015->1018 1016->1015 1017->1018 1019 76bbe44 1017->1019 1020 76bbe52-76bbe56 1018->1020 1021 76bbe60-76bbe64 1018->1021 1019->1018 1020->1021 1022 76bbe58 1020->1022 1023 76bbe76-76bbe7d 1021->1023 1024 76bbe66-76bbe6c 1021->1024 1022->1021 1025 76bbe7f-76bbe8e 1023->1025 1026 76bbe94 1023->1026 1024->1023 1025->1026 1028 76bbe95 1026->1028 1028->1028
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 076BBD86
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: c4ebd877e6c4a7d1dcb3d38b0be15f79c7419d630cb180263003949129d8cc4d
                                      • Instruction ID: 4848cf4c37dda00be9259457fd6c0284f40e57e6d46e68cbee3f780af99772bb
                                      • Opcode Fuzzy Hash: c4ebd877e6c4a7d1dcb3d38b0be15f79c7419d630cb180263003949129d8cc4d
                                      • Instruction Fuzzy Hash: 85A16BB1D0021ACFDB24DFA9C8417EEBBF2BF49314F148569D80AA7250DB749985CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1029 76bbb50-76bbbe5 1031 76bbc1e-76bbc3e 1029->1031 1032 76bbbe7-76bbbf1 1029->1032 1037 76bbc40-76bbc4a 1031->1037 1038 76bbc77-76bbca6 1031->1038 1032->1031 1033 76bbbf3-76bbbf5 1032->1033 1035 76bbc18-76bbc1b 1033->1035 1036 76bbbf7-76bbc01 1033->1036 1035->1031 1039 76bbc03 1036->1039 1040 76bbc05-76bbc14 1036->1040 1037->1038 1041 76bbc4c-76bbc4e 1037->1041 1048 76bbca8-76bbcb2 1038->1048 1049 76bbcdf-76bbd99 CreateProcessA 1038->1049 1039->1040 1040->1040 1042 76bbc16 1040->1042 1043 76bbc71-76bbc74 1041->1043 1044 76bbc50-76bbc5a 1041->1044 1042->1035 1043->1038 1046 76bbc5e-76bbc6d 1044->1046 1047 76bbc5c 1044->1047 1046->1046 1050 76bbc6f 1046->1050 1047->1046 1048->1049 1051 76bbcb4-76bbcb6 1048->1051 1060 76bbd9b-76bbda1 1049->1060 1061 76bbda2-76bbe28 1049->1061 1050->1043 1052 76bbcd9-76bbcdc 1051->1052 1053 76bbcb8-76bbcc2 1051->1053 1052->1049 1055 76bbcc6-76bbcd5 1053->1055 1056 76bbcc4 1053->1056 1055->1055 1057 76bbcd7 1055->1057 1056->1055 1057->1052 1060->1061 1071 76bbe2a-76bbe2e 1061->1071 1072 76bbe38-76bbe3c 1061->1072 1071->1072 1073 76bbe30 1071->1073 1074 76bbe3e-76bbe42 1072->1074 1075 76bbe4c-76bbe50 1072->1075 1073->1072 1074->1075 1076 76bbe44 1074->1076 1077 76bbe52-76bbe56 1075->1077 1078 76bbe60-76bbe64 1075->1078 1076->1075 1077->1078 1079 76bbe58 1077->1079 1080 76bbe76-76bbe7d 1078->1080 1081 76bbe66-76bbe6c 1078->1081 1079->1078 1082 76bbe7f-76bbe8e 1080->1082 1083 76bbe94 1080->1083 1081->1080 1082->1083 1085 76bbe95 1083->1085 1085->1085
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 076BBD86
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: e451d16f92d0cec54d3588560df7660181a790579b8eeeb543c3ba1c221c4ec7
                                      • Instruction ID: e494076a27070be0e505d8eaa935cd105c8df75dee9c5c6afcb2189dccbca06f
                                      • Opcode Fuzzy Hash: e451d16f92d0cec54d3588560df7660181a790579b8eeeb543c3ba1c221c4ec7
                                      • Instruction Fuzzy Hash: 44914CB1D0021ACFDB24DFA9C8817EDBBB2BF49314F148569D80AA7250DB749985CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1086 228ade8-228adf7 1087 228adf9-228ae06 call 2289414 1086->1087 1088 228ae23-228ae27 1086->1088 1093 228ae08 1087->1093 1094 228ae1c 1087->1094 1090 228ae29-228ae33 1088->1090 1091 228ae3b-228ae7c 1088->1091 1090->1091 1097 228ae89-228ae97 1091->1097 1098 228ae7e-228ae86 1091->1098 1142 228ae0e call 228b070 1093->1142 1143 228ae0e call 228b080 1093->1143 1094->1088 1099 228ae99-228ae9e 1097->1099 1100 228aebb-228aebd 1097->1100 1098->1097 1102 228aea9 1099->1102 1103 228aea0-228aea7 call 228a150 1099->1103 1105 228aec0-228aec7 1100->1105 1101 228ae14-228ae16 1101->1094 1104 228af58-228b018 1101->1104 1107 228aeab-228aeb9 1102->1107 1103->1107 1137 228b01a-228b01d 1104->1137 1138 228b020-228b04b GetModuleHandleW 1104->1138 1108 228aec9-228aed1 1105->1108 1109 228aed4-228aedb 1105->1109 1107->1105 1108->1109 1111 228aee8-228aef1 call 228a160 1109->1111 1112 228aedd-228aee5 1109->1112 1117 228aefe-228af03 1111->1117 1118 228aef3-228aefb 1111->1118 1112->1111 1119 228af21-228af2e 1117->1119 1120 228af05-228af0c 1117->1120 1118->1117 1127 228af30-228af4e 1119->1127 1128 228af51-228af57 1119->1128 1120->1119 1122 228af0e-228af1e call 228a170 call 228a180 1120->1122 1122->1119 1127->1128 1137->1138 1139 228b04d-228b053 1138->1139 1140 228b054-228b068 1138->1140 1139->1140 1142->1101 1143->1101
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0228B03E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122866054.0000000002280000.00000040.00000800.00020000.00000000.sdmp, Offset: 02280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2280000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 0d12cc47255ac1239865a02a66aa007da34fc517e0a1c9e65df85a3eaa9b08e6
                                      • Instruction ID: 9d91e4f8adae718f0ade9527e0b0065b20763b5800d18702c24f20d9f9e4b80d
                                      • Opcode Fuzzy Hash: 0d12cc47255ac1239865a02a66aa007da34fc517e0a1c9e65df85a3eaa9b08e6
                                      • Instruction Fuzzy Hash: 45714670A11B068FD724EFA9D04475ABBF1FF88304F00892EE48AD7A94DB75E955CB90
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 022859C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122866054.0000000002280000.00000040.00000800.00020000.00000000.sdmp, Offset: 02280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2280000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 4923b4bd6bdaf3cb0c615378612f2ff574643d756a57e56cbb01e988665d71fb
                                      • Instruction ID: 18d3a5579ef5b65f4045a4f4100a5cf4d691a3de32798a75b01f141b97acfbad
                                      • Opcode Fuzzy Hash: 4923b4bd6bdaf3cb0c615378612f2ff574643d756a57e56cbb01e988665d71fb
                                      • Instruction Fuzzy Hash: CB41E2B0C1061DCBDB24DFA9C884ADEBBF5BF48304F60805AD408AB255DBB5A949CF91
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 022859C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122866054.0000000002280000.00000040.00000800.00020000.00000000.sdmp, Offset: 02280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2280000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: d2bd1c8b58f58d7b048fc2d7c21c5be3fe7a82afe89ba3bf87ec2ce86f08b2b7
                                      • Instruction ID: 89d17b67eeb56b6a92cc394b1c0b9d597061d021f977a7b9a88419aee241cadf
                                      • Opcode Fuzzy Hash: d2bd1c8b58f58d7b048fc2d7c21c5be3fe7a82afe89ba3bf87ec2ce86f08b2b7
                                      • Instruction Fuzzy Hash: 7C4101B1C10719CFDB24DFA9C884ACEBBF5BF49304F60805AD408AB255DB75694ACF91
                                      APIs
                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 04AE4111
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2132764573.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4ae0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: CallProcWindow
                                      • String ID:
                                      • API String ID: 2714655100-0
                                      • Opcode ID: 76ca5988c5589bfc4bb1b6920b2a4d7be6d87e9fa5faa1bcfb35d1c2534935f8
                                      • Instruction ID: 9afaf8c4247445d77316613429e981ed8190b6b109ed85d21945342491d7bcca
                                      • Opcode Fuzzy Hash: 76ca5988c5589bfc4bb1b6920b2a4d7be6d87e9fa5faa1bcfb35d1c2534935f8
                                      • Instruction Fuzzy Hash: A3411AB4900305DFDB14DF9AC848AAABBF9FB8C314F25C459D529A7321D375A841CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122866054.0000000002280000.00000040.00000800.00020000.00000000.sdmp, Offset: 02280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2280000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b7f79c9a63acdcea2335d53c1447c98996743ac31542f121e7e10f792d69f6c4
                                      • Instruction ID: f4e8a91179dff97857240d0a22c3372385eb00e9c03ed24efd40c2d5c41595e3
                                      • Opcode Fuzzy Hash: b7f79c9a63acdcea2335d53c1447c98996743ac31542f121e7e10f792d69f6c4
                                      • Instruction Fuzzy Hash: 9F31E3B1805649CFDB11DFE8C8847EDBBF1EF06304F954149C405AB299C779A94ACB41
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 076BB958
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 297094b33e5cc4fd14d57a10122248e5ef8e474d6605604c7b8b41a8b3855841
                                      • Instruction ID: 53778e8ec70705b7ea9592727b0c99f7b2dc70f8b597c9ac90d8f7d614d7037e
                                      • Opcode Fuzzy Hash: 297094b33e5cc4fd14d57a10122248e5ef8e474d6605604c7b8b41a8b3855841
                                      • Instruction Fuzzy Hash: 5D2148B5D003099FCB10DFA9C885BDEBBF5FF49314F108429E919A7240C7789945CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9416fe6d87e5f161aa486b08bf6807134d62da9549ce02d16c8a1f8eb6843986
                                      • Instruction ID: ba51ce2955ace02abaad3d5750a0e3f5b922a00ab605d8544c362455ffce9101
                                      • Opcode Fuzzy Hash: 9416fe6d87e5f161aa486b08bf6807134d62da9549ce02d16c8a1f8eb6843986
                                      • Instruction Fuzzy Hash: CA21AFB1C003498FCB20DFA9C8496DFBFF9EF4A314F14841AD456A7251C7359885CBA2
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 076BB958
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 4e09fed4b6460603ddc9c292524867d92a2ff06b003b5b32a17abe5912971181
                                      • Instruction ID: 3b3cc9baaaa3e607c78e8b769374f3cb75153e11fdb32863fd80ec3404d68145
                                      • Opcode Fuzzy Hash: 4e09fed4b6460603ddc9c292524867d92a2ff06b003b5b32a17abe5912971181
                                      • Instruction Fuzzy Hash: F22139B5D003099FCB10DFA9C885BEEBBF5FF49310F10842AE919A7240C7789945CBA5
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 076BAF6E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: fb277287dfc8ce607585ef7c67bf78244ce6df4b75fef42aaf2e1793fd03de08
                                      • Instruction ID: ac3fc0103fc91134f84459bb6c52701701ab2e9733910a4808072b963c9fe4e9
                                      • Opcode Fuzzy Hash: fb277287dfc8ce607585ef7c67bf78244ce6df4b75fef42aaf2e1793fd03de08
                                      • Instruction Fuzzy Hash: BB213CB1D003099FDB10DFAAC4457EEBBF4EF49314F14842AD419A7241C778A545CFA1
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0228D686,?,?,?,?,?), ref: 0228D747
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122866054.0000000002280000.00000040.00000800.00020000.00000000.sdmp, Offset: 02280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2280000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: d2be5546437cf51042f8e9423fb63b71f129040880c20393fd2f9a4c29b39dc6
                                      • Instruction ID: 0d9838b7482e6b975ca43e31a983964eb24c2ec0297ff08c2a73ce1d3410c4b8
                                      • Opcode Fuzzy Hash: d2be5546437cf51042f8e9423fb63b71f129040880c20393fd2f9a4c29b39dc6
                                      • Instruction Fuzzy Hash: 482103B5D112099FDB10DFAAD584AEEBBF8EB48310F14841AE918A3350C374A944CFA5
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 076BBA38
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: b4067d42febf064da54a2e7aa91d1117db8027d08d133edd75ef0e6018abb5b8
                                      • Instruction ID: d9bcc6fe544112da44e70b07d697b6a162d58d4b6a094f9057322d4298e26e45
                                      • Opcode Fuzzy Hash: b4067d42febf064da54a2e7aa91d1117db8027d08d133edd75ef0e6018abb5b8
                                      • Instruction Fuzzy Hash: 112116B1D002599FCB10DFA9C845AEEBFF5FF88314F14882EE519A7240C7399545DBA1
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0228D686,?,?,?,?,?), ref: 0228D747
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122866054.0000000002280000.00000040.00000800.00020000.00000000.sdmp, Offset: 02280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2280000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 631bbb4f09dddaa133f3ab4f81a8da7d5231c74ca9ba07a3dbdf9db905d765dd
                                      • Instruction ID: f50b6c8d3faf34cc60c077b49ed386f7fbe55a94154329ba6688f186b48c50f1
                                      • Opcode Fuzzy Hash: 631bbb4f09dddaa133f3ab4f81a8da7d5231c74ca9ba07a3dbdf9db905d765dd
                                      • Instruction Fuzzy Hash: A221E4B5D013499FDB10CFAAD584ADEBBF8EB48324F14842AE918B3350C374A954CF61
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 076BAF6E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 9422667fb01c2aa59dca749a5d96b96ca898f5b3e0477ebf89cd8eb2890288b7
                                      • Instruction ID: 3a0922aa313751749f12bfe7ec994cb33ed9c8a7e0d8866e45cee8513427f86d
                                      • Opcode Fuzzy Hash: 9422667fb01c2aa59dca749a5d96b96ca898f5b3e0477ebf89cd8eb2890288b7
                                      • Instruction Fuzzy Hash: 492118B1D003099FDB10DFAAC4857EEBBF4EF89314F14842AD419A7240CB78A945CFA1
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 076BBA38
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: f15af5e5892b079a76eb70bd41790aa36c9a0de3df6d3e5f2cd1b913850b537a
                                      • Instruction ID: d00e3e22e6f83a36b614108b5a998c44b4fafecc976adee49c8c58bf53c4dfd1
                                      • Opcode Fuzzy Hash: f15af5e5892b079a76eb70bd41790aa36c9a0de3df6d3e5f2cd1b913850b537a
                                      • Instruction Fuzzy Hash: EC213AB1C003599FCB10DFAAC845AEEFBF5FF48310F508429E519A7240C7749541DBA1
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 076BB876
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: cd9832ab2137d9f911bfe7f6659d2aed809957f59a041ecf3f83488077e8a084
                                      • Instruction ID: 319d10998b33c061ccd1c2537b4b16c45b5b293f88aa19b7f0aabe9dc0e93cde
                                      • Opcode Fuzzy Hash: cd9832ab2137d9f911bfe7f6659d2aed809957f59a041ecf3f83488077e8a084
                                      • Instruction Fuzzy Hash: AF1167B2C002099FCB20DFAAD845ADFBFF5EF89314F208819E419A7250C775A581CBA1
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 076BB876
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: f71318a85b7060f67b724a0479aa5393595379e94943ae4021f7ca61f3c17264
                                      • Instruction ID: d57744672a8fad2e57d2521fe9cffc3d09412033a03cafb29d73a3eb0b64f8f9
                                      • Opcode Fuzzy Hash: f71318a85b7060f67b724a0479aa5393595379e94943ae4021f7ca61f3c17264
                                      • Instruction Fuzzy Hash: 5D1167B1D002099FCB20DFAAC844ADFBFF5EF88324F208819E519A7250C775A541CFA1
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 076BE365
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: b1eb1049c53594449a43468f20137f82f91ace000b34e7d34ecf31566c2bef94
                                      • Instruction ID: 45960da8d2769ffdec5926dd3d0a6b694f37ce1befcf3bf534d6c2ca47794d01
                                      • Opcode Fuzzy Hash: b1eb1049c53594449a43468f20137f82f91ace000b34e7d34ecf31566c2bef94
                                      • Instruction Fuzzy Hash: 4B11E3B5800349AFDB10DF9AD849BDEBBF8EB49714F108819E515A7210C375A584CFA1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: f7375f3a84a44bba1abd8c5030386b161af6d647eda82bb5a7045f5f64274a47
                                      • Instruction ID: 3fef776aefd848ae48d88486ff31552d6c649a7369060d6ef1fa13ba5bfbad1c
                                      • Opcode Fuzzy Hash: f7375f3a84a44bba1abd8c5030386b161af6d647eda82bb5a7045f5f64274a47
                                      • Instruction Fuzzy Hash: 9F1116B1D003498BCB20DFAAC4456DEFBF5EB89324F248819D419A7240C7756945CBA1
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0228B03E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122866054.0000000002280000.00000040.00000800.00020000.00000000.sdmp, Offset: 02280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2280000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 97884ae77b74cf6541eeb4ee838293bd5e799853edb6ccab162a8bf5f8bbcea0
                                      • Instruction ID: ada086bda91f546a908217d357ecda6597408d72fda03620f481f52fc1456973
                                      • Opcode Fuzzy Hash: 97884ae77b74cf6541eeb4ee838293bd5e799853edb6ccab162a8bf5f8bbcea0
                                      • Instruction Fuzzy Hash: 17110FB5C0034A8FCB10DF9AD444ADEFBF8EB88318F10841AD429A7250D379A545CFA1
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 076BE365
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 543cdba21d6aac2552d670b4ab30f5e7af2d3fbfa880bfe16d8719b56891f4bc
                                      • Instruction ID: 92f42964077df85454984346cae6b28ebd70f8dd6d7c4f6ddf0c4fffb17da0f3
                                      • Opcode Fuzzy Hash: 543cdba21d6aac2552d670b4ab30f5e7af2d3fbfa880bfe16d8719b56891f4bc
                                      • Instruction Fuzzy Hash: EF1103B5804349DFDB20DF9AC588BDEFBF8EB49714F108819E919A7210C375A984CFA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq
                                      • API String ID: 0-725504367
                                      • Opcode ID: db470182b036557eceba0de53681fd4c787bf7024ff98f653c850737b5028aff
                                      • Instruction ID: b3096cf806823a269a8e6b0ec9113cd161116b3b6d697ca515b5f85ced554ee3
                                      • Opcode Fuzzy Hash: db470182b036557eceba0de53681fd4c787bf7024ff98f653c850737b5028aff
                                      • Instruction Fuzzy Hash: A861D335A002058FDB11DF64C8A49AEBBF2FF89304F1484A9D816AB761DB35ED41CF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: %*&/)(#$^@!~-_
                                      • API String ID: 0-3325533558
                                      • Opcode ID: 8138c23b7687829288ceb45eb8d79cceea228299bdcdf8a4a384818e56f5adda
                                      • Instruction ID: dcc3520962369fa432c7c31d86c4debf075c28c2c130c036bd3e93a4f4d8866a
                                      • Opcode Fuzzy Hash: 8138c23b7687829288ceb45eb8d79cceea228299bdcdf8a4a384818e56f5adda
                                      • Instruction Fuzzy Hash: A851F1317102059BE7007F78A456B9E3F72EF89700F5485B8EE8A8F29ACE751D4AC791
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: %*&/)(#$^@!~-_
                                      • API String ID: 0-3325533558
                                      • Opcode ID: 89a4f32e12a042c369d00fd79bcb01d5b5cf474cbcd6943e2b566c4476c023fc
                                      • Instruction ID: 4292229a2b67372763bb821a95396b77072a59610fd498ad923a000cc7e5394c
                                      • Opcode Fuzzy Hash: 89a4f32e12a042c369d00fd79bcb01d5b5cf474cbcd6943e2b566c4476c023fc
                                      • Instruction Fuzzy Hash: D641F1307102059BE7007F78948AB9E3E76AF88700F508578EE8A9F28ADE755D49C7D1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq
                                      • API String ID: 0-725504367
                                      • Opcode ID: 396a19da75bad7835393b09cde433e9757c362f4da6e1d7ffed2b1c0464318d5
                                      • Instruction ID: ed80110a7dcced85a578169cfb4ce08225a9dce98e77f9f1ee5fe1ce2c657e71
                                      • Opcode Fuzzy Hash: 396a19da75bad7835393b09cde433e9757c362f4da6e1d7ffed2b1c0464318d5
                                      • Instruction Fuzzy Hash: 8931C235A0020AAFDB05DFA4D854ADEBBB2FFD8300F548569E102AB255DF349D46CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8aq
                                      • API String ID: 0-538729646
                                      • Opcode ID: 596374b0b2b9974a11af03c51a4d702f1d69eb2047aa2f24ce1dd637056ad8ae
                                      • Instruction ID: 0bd399b7ff46d0db387c92aefcb26d8e431e8e176b755fc289ea642e6023dd5b
                                      • Opcode Fuzzy Hash: 596374b0b2b9974a11af03c51a4d702f1d69eb2047aa2f24ce1dd637056ad8ae
                                      • Instruction Fuzzy Hash: BC310331F04244CBD714EFA4C841ABE7BBAFB89301F14846AE516AB381D7769D42CF92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q
                                      • API String ID: 0-1007455737
                                      • Opcode ID: 6588de6c47e7da64f8b12588443a5c313bcb15f87009df3b73ad301f49e3b81c
                                      • Instruction ID: a06cdb6570e809f7459e59d76cef8c1e0e84dcb23d58961f864f8927ff614f9a
                                      • Opcode Fuzzy Hash: 6588de6c47e7da64f8b12588443a5c313bcb15f87009df3b73ad301f49e3b81c
                                      • Instruction Fuzzy Hash: C231C033A04615CBC7108B29CC4167BB7B6FB81301F048163E9A68B795D735EC92CE66
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq
                                      • API String ID: 0-725504367
                                      • Opcode ID: b5195650c9dda4e83ba7ad26ec71c88363a1bf01cea04aec4bfe16a4754942b1
                                      • Instruction ID: f1704ff760acda598994edf3659d0fc233fe069e4b9e0cf5fe6f436ee7d2e7d2
                                      • Opcode Fuzzy Hash: b5195650c9dda4e83ba7ad26ec71c88363a1bf01cea04aec4bfe16a4754942b1
                                      • Instruction Fuzzy Hash: 2F219231B04208EFE744ABB88C45BAE7BB6EB85310F10C465E545DB281EE389E46CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq
                                      • API String ID: 0-725504367
                                      • Opcode ID: dcb5c899a04d91205d9744caffefd804677f6a88d9975875ade0ae6af37fe20a
                                      • Instruction ID: 6c4a110a1798d78e648931eadeb1ab13738a6b9bdbd32fe7f1bf0bd4da35a83a
                                      • Opcode Fuzzy Hash: dcb5c899a04d91205d9744caffefd804677f6a88d9975875ade0ae6af37fe20a
                                      • Instruction Fuzzy Hash: 74219231704208EFE744AEB48C45BAE7BB6EB85310F10C465E545EB181EE389E46CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d7727d96203ae28af5c2436d1c5f7c066d5544f58e54c4ab0a9ab15eeb7332b
                                      • Instruction ID: 5bf8cd4975ee53709ff5e5ba42b8d356c7be31994874905e2a0e1a05bb648ebf
                                      • Opcode Fuzzy Hash: 0d7727d96203ae28af5c2436d1c5f7c066d5544f58e54c4ab0a9ab15eeb7332b
                                      • Instruction Fuzzy Hash: C742F231D0065DCFDB15EFA8C8486ECBBB1BF49300F51829AD5497B265EB309A99CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f34047b4a241045acaea8a00660eb7106d49eaea53df0cfee18d96d844f7a1d1
                                      • Instruction ID: 02fe48fe2d8ae4aa99eac0ab06c6adc1ba90eb5e9eec525d83e5e4b9ac49cbe6
                                      • Opcode Fuzzy Hash: f34047b4a241045acaea8a00660eb7106d49eaea53df0cfee18d96d844f7a1d1
                                      • Instruction Fuzzy Hash: 9942F231D0061DCFDB15EFA8C8446ECBBB1BF49300F51869AD5497B265EB30AA99CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d612ebdb7ac7387614b310f29d7ded5484e4771b51906d9757d5cecd4b68c6c5
                                      • Instruction ID: 2023fa104a1bfd96d36e096b159450310b3dc367307288a66945a4d7634c129e
                                      • Opcode Fuzzy Hash: d612ebdb7ac7387614b310f29d7ded5484e4771b51906d9757d5cecd4b68c6c5
                                      • Instruction Fuzzy Hash: BC81D4357106008FCB04EB28D998A697BF6BF89A05B1541A9E902CB375DF71EC41CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 38af17be2eb82917cb244058e8e516befb51d6c7b5b3dfabaab50d630b179bc8
                                      • Instruction ID: 2b996af8d886472d253f50cf467e0af9ef176607c3f5470e7c93a6ebbf231181
                                      • Opcode Fuzzy Hash: 38af17be2eb82917cb244058e8e516befb51d6c7b5b3dfabaab50d630b179bc8
                                      • Instruction Fuzzy Hash: 7691C375A0060A9FDB15CFA8C984AAEB7F2FF48310F148969E929E7354D730E951CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7baacf2ef72c97827596061413e1f01f173a74d0bc8eaec5480c7d2e012b2f64
                                      • Instruction ID: 2a61d97aae852d5f90400522126f00d5e80832e145b3ced2606922c089f2fd8b
                                      • Opcode Fuzzy Hash: 7baacf2ef72c97827596061413e1f01f173a74d0bc8eaec5480c7d2e012b2f64
                                      • Instruction Fuzzy Hash: FC81A331A14609DFCB15EFA8D9486ADBBB2FF45310F11446AE042A72A4EB30DD95CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9110b3a0c567632adfb40106e273fc263dd6a816f791e1e4e320769b565f16d1
                                      • Instruction ID: 1f7b58f4f2e00dcb7419c4e874c795e0aad410f7d549e437e7a934e7d4cd7559
                                      • Opcode Fuzzy Hash: 9110b3a0c567632adfb40106e273fc263dd6a816f791e1e4e320769b565f16d1
                                      • Instruction Fuzzy Hash: B6513371A05208DFDF259FA5C9985ADFFB2FF88300F218169D4427B296CB7189A1CF85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c084fc0152c5daaeea14cc3be049b4bfde398d1f59a01fdb3b6e7b4c63f57aee
                                      • Instruction ID: 5dd0d58697e2ce918e9b17b3bac06ff1016c72893bfdde1c7f389543e5e83232
                                      • Opcode Fuzzy Hash: c084fc0152c5daaeea14cc3be049b4bfde398d1f59a01fdb3b6e7b4c63f57aee
                                      • Instruction Fuzzy Hash: CF515872A012198FDB24EBA9C4506AEB7F6FF88300F64467AC50A97681DB35DD11CF61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 543b3e57d52a9ea2ccfa1fe3d1c5f13300be4efc6e2ff944bc73c45b5650c171
                                      • Instruction ID: 1e20739b969e3680cd34cd251a7893b00f87cdd809d596ec7dd2c676f0e4c355
                                      • Opcode Fuzzy Hash: 543b3e57d52a9ea2ccfa1fe3d1c5f13300be4efc6e2ff944bc73c45b5650c171
                                      • Instruction Fuzzy Hash: 5C513B71E002499FCB14DFA9C818AAFBBFAEF98310F14846AD415E7351EB749901CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 524906853b6fdc9dcbc97dd392b0c3ab97e15d73563ffa9f964a086c52d5c7d3
                                      • Instruction ID: d0084b9b6bda6c9a517ab8428b363041540a729d2b5ed05756f8c7a9efb210a9
                                      • Opcode Fuzzy Hash: 524906853b6fdc9dcbc97dd392b0c3ab97e15d73563ffa9f964a086c52d5c7d3
                                      • Instruction Fuzzy Hash: 38516F3AB04119DBEB41CB68D851ABEF7B2FF44300F108126E546AB295DB74DC85CFA6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da03990900ebc470ea33ebfc38fdb20234785e984c3d7d9e6379a1430fb7eb3b
                                      • Instruction ID: 65311f2e29e231f3499cd88abf525c2fe07682dc3512cc41e422ae5c6d3d3f35
                                      • Opcode Fuzzy Hash: da03990900ebc470ea33ebfc38fdb20234785e984c3d7d9e6379a1430fb7eb3b
                                      • Instruction Fuzzy Hash: E441C272E082169FCB92EFE4C9986FA7BB3AB45340F514467D402A72A5E634CD13CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1b0f7a692d32266edcc68bb1dc59a262ac26d2c86636dd6f5b98021c6d966af8
                                      • Instruction ID: b16b8b9e3352a0832ee6937757935ceddfeec3f4e702bd84a4c6a5307962d3db
                                      • Opcode Fuzzy Hash: 1b0f7a692d32266edcc68bb1dc59a262ac26d2c86636dd6f5b98021c6d966af8
                                      • Instruction Fuzzy Hash: 41316A31E02218EFCB14EFA0E5945ADBBB2FF85301F25846AE49267761CB35AC65CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 056d70641a228d6cfeefd5ac52a85d2a916d98ff5abbc440d0743e0e258804cf
                                      • Instruction ID: bca2495f6e4225b1f710578503122bcac5c2482cb0a9cd022281475a97af1f8d
                                      • Opcode Fuzzy Hash: 056d70641a228d6cfeefd5ac52a85d2a916d98ff5abbc440d0743e0e258804cf
                                      • Instruction Fuzzy Hash: C1412535B142588FDB14EBA9C894EADBBF6FF89604F1440A9E501EB7A1DA35DC01CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b017a6b2d4514c2f4217349729991336475fbaae8098c28e9ec8b2b937ec3e77
                                      • Instruction ID: 9ee9b036b4d0d449f02b1cf024875c6e538824c5c3b53e653fc86f0583a0b051
                                      • Opcode Fuzzy Hash: b017a6b2d4514c2f4217349729991336475fbaae8098c28e9ec8b2b937ec3e77
                                      • Instruction Fuzzy Hash: F8414E76A002588FDF14EB78C494BEDBAB2FF88215F645829D402AB344DFB54D81CF96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc60dfd3ee524a93a65cd5e72c323eb11159fb2a1d813605e8d1836f1da6a5a7
                                      • Instruction ID: 2be444682cb0ca6cfd92dc4b535eb5d080e6ec538ab276dd18b3b6b2a0f7e4be
                                      • Opcode Fuzzy Hash: dc60dfd3ee524a93a65cd5e72c323eb11159fb2a1d813605e8d1836f1da6a5a7
                                      • Instruction Fuzzy Hash: 53416D72E182169BDB92EFE4C949ABA7BB3BB45340F114427D406A7298F635CD13CE90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 606671dee5f5645d94cdc6570820cf305a157b45de5514c3164de70a5fd94f00
                                      • Instruction ID: b79f5de98babf57e17c24a68ad0fba42ef1fd8acedb02c9de0d92496e5669b62
                                      • Opcode Fuzzy Hash: 606671dee5f5645d94cdc6570820cf305a157b45de5514c3164de70a5fd94f00
                                      • Instruction Fuzzy Hash: 84416C3AA44205DFEB42CB98E841ABDF7B2FF44301F108126E546AB261D774DC86DF66
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 95044f1fd0c87f5be88f24cb3148868cd779c4c34da2ee5c239717ec1b5513a5
                                      • Instruction ID: 3c476b2f5bd75761912eb5295ed2c2d551ce52978edb5d6b3fb59313aae55151
                                      • Opcode Fuzzy Hash: 95044f1fd0c87f5be88f24cb3148868cd779c4c34da2ee5c239717ec1b5513a5
                                      • Instruction Fuzzy Hash: 18412B31A112089FDB14DFA8D854AADBBB6FF89310F148569E401BB3A0DB71ED81CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 51b5282e69f1a2ddca96e77c2ce2167e01df7ad2cb8af7b44f7a7d463f3ba6f8
                                      • Instruction ID: 5a4788813ac23dd6bf648bf029cdeb6b49f480eb43c4e5795590de3a1637dcdd
                                      • Opcode Fuzzy Hash: 51b5282e69f1a2ddca96e77c2ce2167e01df7ad2cb8af7b44f7a7d463f3ba6f8
                                      • Instruction Fuzzy Hash: FD413C31A012489FDB14EFA8D454AADBBB2FF89310F158569E441BB3A0DB71ED85CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2c441992a789160600fcc2de98e220597d8fb32248e3dbba1ca6348216966c04
                                      • Instruction ID: 86c121e7f142d4dc474e08379cb9666a1bc5876bd8796893c20515a0bba4008d
                                      • Opcode Fuzzy Hash: 2c441992a789160600fcc2de98e220597d8fb32248e3dbba1ca6348216966c04
                                      • Instruction Fuzzy Hash: A4411372E05218DFEB219BA5C9885EDFFB2FF84300F218159D4427B256DB3188A5CF84
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: df8e2e4847586a7d4dbc8218e9aa8bc983beb293937c9c0fb54ff918b520947f
                                      • Instruction ID: f406460c774ec6b3d1d2ddf08e2337f922a292eb5c047fb8b4d8c3836d551582
                                      • Opcode Fuzzy Hash: df8e2e4847586a7d4dbc8218e9aa8bc983beb293937c9c0fb54ff918b520947f
                                      • Instruction Fuzzy Hash: 3D41F776B042099FCB14CF69D884AAABBB2FF89710F158069E8159B3A1CB34EC41CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a4fd4dc87ccfb0a7f250567c2dd658bf64ef5ca099b792d50f64c50dec406428
                                      • Instruction ID: 28a8e90e53add8abf229eef3e7e44708296294c47fa40311ea05b6cd06191d04
                                      • Opcode Fuzzy Hash: a4fd4dc87ccfb0a7f250567c2dd658bf64ef5ca099b792d50f64c50dec406428
                                      • Instruction Fuzzy Hash: EE31AE76B04214CFC714ABA8D45856C3BF2FF59615B1985AAE40ACBB86CB39EC43CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: acf97eeaf89f212ff7adf5c12e6938adc178518a1a3fa2d2e0402c1467eb87a5
                                      • Instruction ID: 64305c433ba861e46bbdc7611e4dcc5bd01d469615a54abf7c07bb7190e0eeaa
                                      • Opcode Fuzzy Hash: acf97eeaf89f212ff7adf5c12e6938adc178518a1a3fa2d2e0402c1467eb87a5
                                      • Instruction Fuzzy Hash: 80319076A002558FDF24EB74C454BADBAB2FF88205F204839D402AB381DFB58D85CF96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 47d51de6c0fab440518d45a7dc43c381d61a3e9ae33c23ea1bdf6178aeb1497a
                                      • Instruction ID: 3f67dd93d5bca001f5ec4be42b76273d03f17e4d4dd367a087c6736ffe92b5ef
                                      • Opcode Fuzzy Hash: 47d51de6c0fab440518d45a7dc43c381d61a3e9ae33c23ea1bdf6178aeb1497a
                                      • Instruction Fuzzy Hash: 7941AFB1D10359DFDB14CF9AC888A9EFBB5FF88314F24812AE418AB250D7756846CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e76c52bf49f477dcc1763ff5e36ebd69106ae47320a2fbe19fa21b40501b4253
                                      • Instruction ID: 20eeced92137f872b6e60e0f076b96cbeb3e11d08110ee74d919ce04f4c90566
                                      • Opcode Fuzzy Hash: e76c52bf49f477dcc1763ff5e36ebd69106ae47320a2fbe19fa21b40501b4253
                                      • Instruction Fuzzy Hash: DF31B775E012199FDB09DFA9D4556EEBBF2BF88300F10802AE415A7364DB359942CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7f54634cf343bd5934de2a47b60cd0cf07357e36ef69935658659d21432906a4
                                      • Instruction ID: ae659887af85976e16e58da3debe17959d6cce7c054932ab1525f9a47dd4e006
                                      • Opcode Fuzzy Hash: 7f54634cf343bd5934de2a47b60cd0cf07357e36ef69935658659d21432906a4
                                      • Instruction Fuzzy Hash: C5F03A36704209AFCF08DBA8D85999EBFFAEB49250B1084AAE405D7365EA31AD118B54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 60b2fc6cbb22a4301988ff13583cc5a6a83cfd625d698f89a961372e8fad9192
                                      • Instruction ID: a9543e8c613aabd6b6be7c8df06515d9d458ed08204cc182bba90c372bc1c208
                                      • Opcode Fuzzy Hash: 60b2fc6cbb22a4301988ff13583cc5a6a83cfd625d698f89a961372e8fad9192
                                      • Instruction Fuzzy Hash: AB31E433A08611CBC7118B29DC416BFB7B6FF81211F048167E9968B795C336ED52CE56
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6bdf7888c9be0871456ffeffc72f9169ebeb8d6a2bd27810b917b1f7573f2b7f
                                      • Instruction ID: 9940bcbb5cf4dd9cbae4305a1d78a44cc44d2b7a7c143193a34c02f14f86511d
                                      • Opcode Fuzzy Hash: 6bdf7888c9be0871456ffeffc72f9169ebeb8d6a2bd27810b917b1f7573f2b7f
                                      • Instruction Fuzzy Hash: C4217172F001455BCB15DAA9C814ABFBBFAAFD8200F14855AE915E7251EA709E01CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7bf4e7ac13210370e7162e300623fcaec547a9915762f16773b83ca5cb9f4a9f
                                      • Instruction ID: 028955e97524eccf8a5448eb62d65e9428aca7392b22e6ef966bbffb0c05be02
                                      • Opcode Fuzzy Hash: 7bf4e7ac13210370e7162e300623fcaec547a9915762f16773b83ca5cb9f4a9f
                                      • Instruction Fuzzy Hash: A8319675E012199FDB49DFA9D854AEEBBF2BF88300F10802AE415B7354DB349942CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bdd1f40273c00c453ca292bc1d6114a4d5f2c449e19fc77ede0854e419c51925
                                      • Instruction ID: 06494c10ae50569c0f23a1638febe80a48d08722be2bb6932d8c379d01c0fea5
                                      • Opcode Fuzzy Hash: bdd1f40273c00c453ca292bc1d6114a4d5f2c449e19fc77ede0854e419c51925
                                      • Instruction Fuzzy Hash: 8B210337B106108FEB248B64C8919BE7BF7EF88314B18846AD147D7B95C638EC81CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8d8e481a3f7649159c804795af058704b1f64e8f3c0de083c66897995b45de04
                                      • Instruction ID: 623f8aeba7b8a0cf1bbc1c2d4eea7e2cc28730c629413b53bee4172bf63eaacc
                                      • Opcode Fuzzy Hash: 8d8e481a3f7649159c804795af058704b1f64e8f3c0de083c66897995b45de04
                                      • Instruction Fuzzy Hash: C921E032E05205CBDB15BBA8C4841AABBB2FF41300F50496AC547B7354EB31DD61CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3253f94ac5330f19aba0a42059afea2ca8c1684724b05496b902fff65d8775d4
                                      • Instruction ID: 15abc3c3bb8f7e482f4e8e181f8854d942a616fa7345cc93bf006b0c275cd7d5
                                      • Opcode Fuzzy Hash: 3253f94ac5330f19aba0a42059afea2ca8c1684724b05496b902fff65d8775d4
                                      • Instruction Fuzzy Hash: B2317832A15218EFCB05CFA8D844E9DBFF5BF48310F0980AAE505AB261DB30D944CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d642e526f225bef2d5561f746f13afc7a43e4e7f4be0303d69694025077df0f
                                      • Instruction ID: 04c65713bee99a269635cd1b087dd08b9784c28ab1ea5fab5450ff79493aeb64
                                      • Opcode Fuzzy Hash: 9d642e526f225bef2d5561f746f13afc7a43e4e7f4be0303d69694025077df0f
                                      • Instruction Fuzzy Hash: 3D21D137B106108FEB249A65C88197EB7E7FBC8325B288429D107D3B94CA34ED81CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a3ecae6b618724dabeaca754800a46f845cbd38b5852f07663e5819efc4497b3
                                      • Instruction ID: 39edc43cb48d3f942e123896c4ffce6f4a9a430cd1dbfdb63066f7b4e25f58b3
                                      • Opcode Fuzzy Hash: a3ecae6b618724dabeaca754800a46f845cbd38b5852f07663e5819efc4497b3
                                      • Instruction Fuzzy Hash: 4721C532B001159FDB14EB64C8549AEBBF6EF89360F1584ADD406EB351CA319D05CF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 89cd8a79845f321da3ab59c92f2ac9ab170945b59e3ce1a801e9e58988ff9c28
                                      • Instruction ID: 2c3d1dd5af4252ddc17b1f7e1ca26bb6d5a1f1641866dceb0492f62f29980df0
                                      • Opcode Fuzzy Hash: 89cd8a79845f321da3ab59c92f2ac9ab170945b59e3ce1a801e9e58988ff9c28
                                      • Instruction Fuzzy Hash: 272107357106148FCB05EB28D4988AD7BF6AF89A1171541AAE502DB3B2DB71DC05CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122287065.000000000091D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0091D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_91d000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: df3a52cc10c245c7f9673f4572228e33245bde4361d01dde9df070d039f92afb
                                      • Instruction ID: 2c700a243584ab0c2d3783da4da656088ae739f4eb165217b423c4a83418ae5a
                                      • Opcode Fuzzy Hash: df3a52cc10c245c7f9673f4572228e33245bde4361d01dde9df070d039f92afb
                                      • Instruction Fuzzy Hash: 31212BB1604208DFDB05DF14D9C0B56BF69FB94314F24C569D9090B2E6C33AE896C7A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ceb660f53405716a6492c6dd56f4d3a68734145039b2b6d9fe5a61224c726fe8
                                      • Instruction ID: 24ee7c8abb2581045e924ec0d70a88f50d150631f9972c56a9c4c86ef1c47cc5
                                      • Opcode Fuzzy Hash: ceb660f53405716a6492c6dd56f4d3a68734145039b2b6d9fe5a61224c726fe8
                                      • Instruction Fuzzy Hash: 69216F717043018BEB34AB79995493AB7A7BFC520A7184C6CD9428B7A5EF71EC01CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122412727.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_92d000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f1007017ec728a61fe65978080574a335e68250ec9046f37d805c4d3545a4543
                                      • Instruction ID: c705d47bf3f433758e402f65b28dc2690ab16781fd4187ff5486dd01a4924b6b
                                      • Opcode Fuzzy Hash: f1007017ec728a61fe65978080574a335e68250ec9046f37d805c4d3545a4543
                                      • Instruction Fuzzy Hash: 6A213BB1505200EFDB05DF14E5C0B25BBA9FB84314F34C96DD8094B35AC33AD806CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122412727.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_92d000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fc5b03123adf1b808b2af315717939688eac07acb135e0fd09ed0ebcaff8d688
                                      • Instruction ID: 5a05ffd2bbd12c62b64f3c9f2cfee7158a241a47ece6770062f15ddb79f14510
                                      • Opcode Fuzzy Hash: fc5b03123adf1b808b2af315717939688eac07acb135e0fd09ed0ebcaff8d688
                                      • Instruction Fuzzy Hash: BB210771544240DFDB14DF14E5C4B26BB65FB84314F34C96DD94A4B2AAC33AD807CA61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0183f71a90dad25e90fb350e04824c18a704a05c22870083de78c1e402c07bd2
                                      • Instruction ID: bf1918a9fa42ab04970dd84596a509bb0c2c1947d16f98cbd515f5fe9d35e453
                                      • Opcode Fuzzy Hash: 0183f71a90dad25e90fb350e04824c18a704a05c22870083de78c1e402c07bd2
                                      • Instruction Fuzzy Hash: E221F0B1D013099FDB10CF9AD984AAEFBF4FB48310F24842EE419A7300D375A944CBA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ed3320191238b413ef31f35c0a24b09cd16e79de2ed68dccfd94ce8c2d03e2ba
                                      • Instruction ID: b44e95b377ff54ac3259187ae3d5a178f94250532e9926831f3e88c4ea6f37c2
                                      • Opcode Fuzzy Hash: ed3320191238b413ef31f35c0a24b09cd16e79de2ed68dccfd94ce8c2d03e2ba
                                      • Instruction Fuzzy Hash: 2721D572D0524A8FDB02DF64C8516AEBFB1EF49200F0945AAD511EB392D7744D46CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 62a277510c57a38366dd60e249060a4d43b1558e6c6099e441af13d45c02f6ee
                                      • Instruction ID: e663ac5e7e3930e2a84dffaa97cb1483a8e4070e36bd48e84bf13f6def04caa3
                                      • Opcode Fuzzy Hash: 62a277510c57a38366dd60e249060a4d43b1558e6c6099e441af13d45c02f6ee
                                      • Instruction Fuzzy Hash: CE11BF72F0410AEBCB91AA95D5441EEBFB0EB40340F6048A5D08AB3284FA308D35CF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 679f9f3f7054c2f4e7a776e3bf6f07bc06f588cacd5c316b0e952ca7f8f98a5b
                                      • Instruction ID: dc76d611ca2397ebb013e0bf4b785256c4bfd5bc4364b989feec58a54920fcd3
                                      • Opcode Fuzzy Hash: 679f9f3f7054c2f4e7a776e3bf6f07bc06f588cacd5c316b0e952ca7f8f98a5b
                                      • Instruction Fuzzy Hash: 3521CEB5D053099FDB10CF9AD984AAEBBF8FB48310F14842AE419A7700D375A944CBA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122412727.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_92d000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 599417e0f70b6d4e6e1e5ed62567b10edac599aa4c2493af03c52d5911247cae
                                      • Instruction ID: 9566e43ab066707cd363dc2f48ef4dd60f3948ee2aafede9d813fd86a7a55dca
                                      • Opcode Fuzzy Hash: 599417e0f70b6d4e6e1e5ed62567b10edac599aa4c2493af03c52d5911247cae
                                      • Instruction Fuzzy Hash: 55219F755493C08FCB12CF24D994715BF71EB46314F28C5EAD8898F6A7C33A980ACB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aff3f84937c0e31ae6a911aaacd9b58f6a724694a172dc188fcf0138589c70c4
                                      • Instruction ID: e0e89947edc8605ae304dfc1f06c98d8bd8bb1a604865466cbaad2931cc95163
                                      • Opcode Fuzzy Hash: aff3f84937c0e31ae6a911aaacd9b58f6a724694a172dc188fcf0138589c70c4
                                      • Instruction Fuzzy Hash: 8621C7B5E0061A9FCB45CFADC8808AEBBF1FF89310B10816AE919E7325D7319915CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122287065.000000000091D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0091D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_91d000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                      • Instruction ID: f0bd7f364a6303345bc076d565bcdc78f4abd492d78fc7736d3a020b4d083394
                                      • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                      • Instruction Fuzzy Hash: BA112672504244CFDB16CF00D5C4B56BF72FB94324F24C6A9D8090B6A6C33AE85ACBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122412727.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_92d000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                      • Instruction ID: 86af05e6fe976f8661ad737dd929bd7686c6df49369b43e90314159fcf97e7ae
                                      • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                      • Instruction Fuzzy Hash: 8E119D75904280DFDB16CF14E5C4B15FBB1FB84314F24C6ADD8494B69AC33AD85ACBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 98642c627945c5e9e81d2c34ced4df395d6cf67c10b5cd3834efd12da5629a38
                                      • Instruction ID: 91d15badd78ae6f3dab83cbd683a4f8fdb54797a840f4f84aa4d8fc37eedfe1f
                                      • Opcode Fuzzy Hash: 98642c627945c5e9e81d2c34ced4df395d6cf67c10b5cd3834efd12da5629a38
                                      • Instruction Fuzzy Hash: BA11B9B5E0021A9F8B44DFADC8409AEBBF5FF88310B10816AE918E7315E7309911CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6861df86ea97c4215a5fa92e63c55a128904f4cbb617f42ce13ad133bec5978d
                                      • Instruction ID: f2d7106a1d9073b9f5f9fdb6397f76a5c401a0e920826024b4444d94a0048aa3
                                      • Opcode Fuzzy Hash: 6861df86ea97c4215a5fa92e63c55a128904f4cbb617f42ce13ad133bec5978d
                                      • Instruction Fuzzy Hash: EC11F3B5C042499FCB10DF9AD448A9EFBF8EB48320F14841AD419A3710D378A945CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8600b740eaae672187e0693103aca6d42cb8020f15e46fe3756293e4fb5e492b
                                      • Instruction ID: af4aa7554a2fb94062787996b272aeabc778b9e35f35583b2c01fbcebb1071eb
                                      • Opcode Fuzzy Hash: 8600b740eaae672187e0693103aca6d42cb8020f15e46fe3756293e4fb5e492b
                                      • Instruction Fuzzy Hash: 5C1104B1C042498FDB10DF9AD448B9EFBF8EB48310F14C41AE419A7310D374A945CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 63cb54a626d7262ebee5dbfff392b599b7c4b8c2848af1fccf83951db1f0b48f
                                      • Instruction ID: fad8ad0b1c30742bcdb107fbd546a91765b00682f8e1d2d9d8d88c73c5bc7bcf
                                      • Opcode Fuzzy Hash: 63cb54a626d7262ebee5dbfff392b599b7c4b8c2848af1fccf83951db1f0b48f
                                      • Instruction Fuzzy Hash: 7411F3B1C042498FDB10DF9AD448A9EFBF8EB48310F14841AE419A7310D375A945CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1a48cf64d2bb5e721938f7a5de4d5b442402bf08f0232b1f034511b66aa2030
                                      • Instruction ID: e1a30744e2a4d50a5e8df39cb1a810c8da2ec80ea4627f14e7fdbabf4934d9d1
                                      • Opcode Fuzzy Hash: d1a48cf64d2bb5e721938f7a5de4d5b442402bf08f0232b1f034511b66aa2030
                                      • Instruction Fuzzy Hash: 2A01F7B3F091159FC792A664D8444E97FB1EB85340F1448AAD08AE7295FA308D16CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 29cbe7bc7e8f128c31ff6494614aab2188ae1235b8b4701586e9cf3b631088eb
                                      • Instruction ID: a3535251c6edcd99c465d4c38bdff6d1feeb9ee6952fa51fd54454136f3ca028
                                      • Opcode Fuzzy Hash: 29cbe7bc7e8f128c31ff6494614aab2188ae1235b8b4701586e9cf3b631088eb
                                      • Instruction Fuzzy Hash: EC01287B7081456FEB036B7498618D97F72EE7A21034544E3D141CB263E5168A0BDB52
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 38823bdef8525cd1729a3796ae1ed363ba3dddc41dd7513caf14b275385404df
                                      • Instruction ID: cf654c3b10fee0bcdcd9163eeed90b03b44c7a2b3bb0ddc459ebefe5bd369758
                                      • Opcode Fuzzy Hash: 38823bdef8525cd1729a3796ae1ed363ba3dddc41dd7513caf14b275385404df
                                      • Instruction Fuzzy Hash: D0113072A00249CFDF14EF74C455BADBAB2BF88352F144429D002A7285DFB54D85DF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ebabdf41f21c7de71f3711c7515b82101af0eb879cec5a838721842c590ce782
                                      • Instruction ID: 9882e65400a32889eb7f528bfca1f0193a205fb78dc57ef3dffe9daf6167c4ea
                                      • Opcode Fuzzy Hash: ebabdf41f21c7de71f3711c7515b82101af0eb879cec5a838721842c590ce782
                                      • Instruction Fuzzy Hash: 3701D6B2B012549FCF16E7A898548BE7BB6EFD5210F01006DD506AB361CE300E51CBEA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e65887905a86466e03e49e7acfefa406abf5f8ea7c9b0a4ee0efd4864da30b20
                                      • Instruction ID: e842dcb77953df8361a5f4d553c9e65cd8f38c65d2c0358c760851945906bdee
                                      • Opcode Fuzzy Hash: e65887905a86466e03e49e7acfefa406abf5f8ea7c9b0a4ee0efd4864da30b20
                                      • Instruction Fuzzy Hash: E801283291475ADFCF119FB4D8444D9FF72FF89304F01866AE0416B151DB719449CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e0e4ead6cc0325ea5f2c8a7ea40f705533143c0b25f48e877dfac3490858fb02
                                      • Instruction ID: 332c62ad66816f029e436260000196d517f2402f734fc2af3eae44e4471a6545
                                      • Opcode Fuzzy Hash: e0e4ead6cc0325ea5f2c8a7ea40f705533143c0b25f48e877dfac3490858fb02
                                      • Instruction Fuzzy Hash: 64F0C8776041446FCF05CB54D8518D9BFB5DF0615071440A7E408C7321E6319D13CB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 563d42e779ce11aece1227d2708e0db5b1186f81e1c4fe1354edc2ad7463750a
                                      • Instruction ID: 46472a07c98424eee61eed6c209b6dce90a5c7129405e3457dc198d3957ab297
                                      • Opcode Fuzzy Hash: 563d42e779ce11aece1227d2708e0db5b1186f81e1c4fe1354edc2ad7463750a
                                      • Instruction Fuzzy Hash: 76018C31E002099FDB04EFA8D8126AEBBB1EF48314F04452AD616F7390EB749A41CFD0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5e5a5d0f8f91ef49c95b55db3e860c86f90b2624301ab5982929af7839b8bd01
                                      • Instruction ID: 8b8a6147f2071169d4d96c162e1b52497248e97690c8fe95c455ba32796cd074
                                      • Opcode Fuzzy Hash: 5e5a5d0f8f91ef49c95b55db3e860c86f90b2624301ab5982929af7839b8bd01
                                      • Instruction Fuzzy Hash: FF01A431A10664DFCB21EF6DD884CEEBBB4EF8A300701459EE545DB221DB31994ACFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fb98399a5213442454e62a5698d7974af24e8160eb114f716882cf79f2fb1cda
                                      • Instruction ID: f27d5c00efd44e12854ea560d185cce5d05e8a3578c88fc0ed52cd786a0c1386
                                      • Opcode Fuzzy Hash: fb98399a5213442454e62a5698d7974af24e8160eb114f716882cf79f2fb1cda
                                      • Instruction Fuzzy Hash: 1FF0F0739042047FCB119B98A800DEAFBA9EF45330B95C097E004E7202D231AE0ACFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ed7ac7eff320889b07a82977f84d6e0027944a640b95b28a9fa113c1b987f84
                                      • Instruction ID: 70a8d409b9421bb537e82fb095accb8632d89b11f5717f2af9c470d5330da0fa
                                      • Opcode Fuzzy Hash: 3ed7ac7eff320889b07a82977f84d6e0027944a640b95b28a9fa113c1b987f84
                                      • Instruction Fuzzy Hash: 39012879E0425ADFEF05DBA8E8515FEBB72FF89300F008059E515A7260DB346D52CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1b9840095baa68b77ad41c97898b751d6d41772f5c1a6c661be91941719fa00e
                                      • Instruction ID: c78627cf62f9bc8a21c8e5a25e8d20fa0213f486cf422c7ae7ed6f2e9c52dfc2
                                      • Opcode Fuzzy Hash: 1b9840095baa68b77ad41c97898b751d6d41772f5c1a6c661be91941719fa00e
                                      • Instruction Fuzzy Hash: AEF09072B04354AFDB05EBB8886446E7FFADB85100B0588BAD546D7261EE309D01C7A4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1fd530be0c1578d2ea355b30c9d57ca8f920e88cd951d17256308ebab269bf1b
                                      • Instruction ID: 399a7918c4435abd44a97b1d5c687edf10f1ed78ee82f6014c302d6e6cf9cbfc
                                      • Opcode Fuzzy Hash: 1fd530be0c1578d2ea355b30c9d57ca8f920e88cd951d17256308ebab269bf1b
                                      • Instruction Fuzzy Hash: 77F0A736B043186FDB04DA7984988AE7FFBDB94250F14C8A5A409D3340E9349D028690
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a2a3721e7bd1ba3469d3488fe5af4ac7350d70da477959c8ecc26982cd52cdc
                                      • Instruction ID: 6c74212c03f2391b8c6a2fe5c4779ccc7ae4bafafea2ced23621493f4959ea70
                                      • Opcode Fuzzy Hash: 4a2a3721e7bd1ba3469d3488fe5af4ac7350d70da477959c8ecc26982cd52cdc
                                      • Instruction Fuzzy Hash: 69017830A182599FCB14DFA9D894EEEBBF2FF49300F10406AE401E7361C6309901CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7bb29d7855715ae5e076ad60c4e96a2a3098f5b6a7d6e0f5cfdd8c9ad88d672e
                                      • Instruction ID: 9becae20775cb6b80a6c39a4676092122a20292e944ba888c94a96f805a6959c
                                      • Opcode Fuzzy Hash: 7bb29d7855715ae5e076ad60c4e96a2a3098f5b6a7d6e0f5cfdd8c9ad88d672e
                                      • Instruction Fuzzy Hash: B9F0B4726041056FDF08DFA4D855C9ABFF9EF04220B0580ABE408DB225E7709D11CB54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a3604d164e20b1e288889ae4e89d6094915c6cab8204bf924ac46e0d85ae3cc5
                                      • Instruction ID: 436903fd959ce910919136aeba481ef177ffc3cb8c1ec27a693c6742009f6802
                                      • Opcode Fuzzy Hash: a3604d164e20b1e288889ae4e89d6094915c6cab8204bf924ac46e0d85ae3cc5
                                      • Instruction Fuzzy Hash: C1E0928B50D3915BE303666C5CB02E17F30EF63744F58489BE6818A567E0488D1AD7B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: add427197186879fc4f65f5985cf18ccbe32480c78280f1a9e0ff353b9e0e737
                                      • Instruction ID: 661d78b69c4255f9a6e2e960a4073d54deb69407f13948a90c336ffde3d364bc
                                      • Opcode Fuzzy Hash: add427197186879fc4f65f5985cf18ccbe32480c78280f1a9e0ff353b9e0e737
                                      • Instruction Fuzzy Hash: D2F03072B0024ACBDF14EF75C455BADBAB2BF84745F108838D0019B291DFB48981DF96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: feaaaa6b1e519c595f2f47061c42dc50f3f2627f20bc072edec2acf46c3fcecf
                                      • Instruction ID: 5f5dda5c3296bd3f07d7cdd05384e48fc28650ca3eb7752a90e26e8df474c033
                                      • Opcode Fuzzy Hash: feaaaa6b1e519c595f2f47061c42dc50f3f2627f20bc072edec2acf46c3fcecf
                                      • Instruction Fuzzy Hash: 94F0E53120A341CFC319AB3C94948263BF6AF4630036488FFE0558B762CA35EC84CB49
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: df12667f86ec9b1cabfd090d37664f63298cfec87327c5e9151210acf4e580cf
                                      • Instruction ID: f6e388f8239c94d25969331d60a05ba3e8e3c2fcbe168c008bb770190b149c19
                                      • Opcode Fuzzy Hash: df12667f86ec9b1cabfd090d37664f63298cfec87327c5e9151210acf4e580cf
                                      • Instruction Fuzzy Hash: 55E09B36B04314AFD715CE56C844C9BBFFAEF85110B05C0EAD808DB212E6319D45CB55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9b0e8dd5899de7aead89cb916a6e2378274178824e1dccc6e1269af7c4389457
                                      • Instruction ID: 4be5b6cdd0a7c34d42051fcce1f93aac48d1727e9939152403f1521cc711bf35
                                      • Opcode Fuzzy Hash: 9b0e8dd5899de7aead89cb916a6e2378274178824e1dccc6e1269af7c4389457
                                      • Instruction Fuzzy Hash: 7FE0DF6690E3D14FEB628A30A8A158CBF61FF52200F1D88CBD0C0CB1A2C4154A4ACB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: acaed5da995e81321e297366d033d84cf53eb1906f485bd9ea944be6409b3eb1
                                      • Instruction ID: fd7c206532749d7342356dda333b1a45bd38b743e7621018a96333004e7c290c
                                      • Opcode Fuzzy Hash: acaed5da995e81321e297366d033d84cf53eb1906f485bd9ea944be6409b3eb1
                                      • Instruction Fuzzy Hash: A3E09231605350CFC3259F25D06486177B5AF4331572594FED0559B762C635EC84CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d3a228c2a6dc1720ead66907510027c0734b44e1d8c27fc49471e114e5819f17
                                      • Instruction ID: a66b407e998ff4b5a510659a99e787b6d8803ea70d22a5e83a569d73026fa106
                                      • Opcode Fuzzy Hash: d3a228c2a6dc1720ead66907510027c0734b44e1d8c27fc49471e114e5819f17
                                      • Instruction Fuzzy Hash: E9E09237E5010CDACF00AB81EA187FEBB71FB8431AF280422E122B1A80C73009A0CE90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7f1a17b5fad0e25f6045a0de19271a6da79270c99d03088dcc44dfa8a9e2c97c
                                      • Instruction ID: 8d3147a576dd870d2b373566d29accc02a9df4297cfc58264b7b8fb4e8574c38
                                      • Opcode Fuzzy Hash: 7f1a17b5fad0e25f6045a0de19271a6da79270c99d03088dcc44dfa8a9e2c97c
                                      • Instruction Fuzzy Hash: 6EE0DF36A01755CFC722EB78E494AA93BE2EF82310B214869D0059F257CE348C05CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 25f2a02f401f338dfdce7506230f05f82d22f97785fe55040764a7eea848ae07
                                      • Instruction ID: a246583196be6644d0b1cd942e346175d934741940d80d0fc9ecd609791130d9
                                      • Opcode Fuzzy Hash: 25f2a02f401f338dfdce7506230f05f82d22f97785fe55040764a7eea848ae07
                                      • Instruction Fuzzy Hash: AAD02E3729812002D5A4D518EC917EA3342FBC4300F2C8C5AF881D7288C42ACE86CA80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90c0d7e977bf7e98263c273dfe4f2ffbb9b859ac23d888b02fd07e647a96505c
                                      • Instruction ID: f768ffdd80ea135573368c8742e85e8c4161b6b952fc43e51dd4ddba12b5a8d5
                                      • Opcode Fuzzy Hash: 90c0d7e977bf7e98263c273dfe4f2ffbb9b859ac23d888b02fd07e647a96505c
                                      • Instruction Fuzzy Hash: E6E01A36100109EFCB02DF50D844C857BB6FF05314715C0A5E9064B232C732E855DF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5d5e7821906b1d59180f29f5a1144dfd080639e790902b0ed5f1859f34a28349
                                      • Instruction ID: fa76eaa9e017d33f6d93247aede7f1a72d3ddbd53d12b42563358fbef902af84
                                      • Opcode Fuzzy Hash: 5d5e7821906b1d59180f29f5a1144dfd080639e790902b0ed5f1859f34a28349
                                      • Instruction Fuzzy Hash: 97E04C36046504EFC7126F90E859C85BFB5EB46250B0684A5E9498B073D762852AEB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b664919f85b544b5d29d0c2c032504d2e4a419adda930d7efa1ebcd4d726bf81
                                      • Instruction ID: acaabe87a7580b00847e6d809fb40b75ee771874f92b33778a48c03004f923e9
                                      • Opcode Fuzzy Hash: b664919f85b544b5d29d0c2c032504d2e4a419adda930d7efa1ebcd4d726bf81
                                      • Instruction Fuzzy Hash: B3E0867720D3818FD7915B31E91C655BFA1BF50310F0588AEE445C2962E3348850DF13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c780bab1cc7755436764584f7c24879fa1cd30e5185753e94ebfd4e0529bfc44
                                      • Instruction ID: 0a935407d4be36ae05d78f590144c2a9328e5f2f95353c2d1c0fd632283327e6
                                      • Opcode Fuzzy Hash: c780bab1cc7755436764584f7c24879fa1cd30e5185753e94ebfd4e0529bfc44
                                      • Instruction Fuzzy Hash: 07D05E3111A242CFEF039F14D89A9943FB1FF42341B0248A1D841CF257DA38584BCF61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 288e5fc567276b7df4352e2d466b56948b8fa559ee21ad5cde22508426d3ab80
                                      • Instruction ID: c26a32e54d4426e0e09c2faa81307a4981064b365ab49d2491cc1362f1f268fd
                                      • Opcode Fuzzy Hash: 288e5fc567276b7df4352e2d466b56948b8fa559ee21ad5cde22508426d3ab80
                                      • Instruction Fuzzy Hash: 03D02213A0610A86BB25A0294808039324BE240000B88009ABE338FA09E612FE02CFB3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 00c52d2c02f426f507079ea64b15c1cbc80099556a75286fa1c2fd225b876efd
                                      • Instruction ID: c176eb836443e044a29b134945f278754b963a7dba5fcf0ec558548c36fab90c
                                      • Opcode Fuzzy Hash: 00c52d2c02f426f507079ea64b15c1cbc80099556a75286fa1c2fd225b876efd
                                      • Instruction Fuzzy Hash: 70D0A7507096400BD3042BF4D0583597FA1D785721F1050B5D84D8F7C7DE3A9C03CB01
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d6e16d2318e36d104ffb50f14f7bdff7e5ea559266628f7c03f6fc060be51fd
                                      • Instruction ID: 19c69cfeec74199314280c22311af5c635981dcf8f93e4957abf475a2ddc806b
                                      • Opcode Fuzzy Hash: 2d6e16d2318e36d104ffb50f14f7bdff7e5ea559266628f7c03f6fc060be51fd
                                      • Instruction Fuzzy Hash: 63E0EC301446559FC7528B24D8858E87F71AB55210B05849AE889CB263C3329817CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5bf62d83380822eac4676ca644baa55c3ca338f75a068d90d1c4499c6eddde1e
                                      • Instruction ID: 301cf233eb93adeebefbb130a551ccecbf6f7075b119a2fb52f4380618766856
                                      • Opcode Fuzzy Hash: 5bf62d83380822eac4676ca644baa55c3ca338f75a068d90d1c4499c6eddde1e
                                      • Instruction Fuzzy Hash: DBD0A722059F504FD3127A3058074EDBF30BA47201B81454EC0C64B052E624115BC7E6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad99083d4c811cd63888b836b4b98376116ff06b59e464ea93b97f89a4b43401
                                      • Instruction ID: e5a40b60814b888fba28011e29c129b54e98f3498128973504afe23cc8ed4323
                                      • Opcode Fuzzy Hash: ad99083d4c811cd63888b836b4b98376116ff06b59e464ea93b97f89a4b43401
                                      • Instruction Fuzzy Hash: 7CE04275A40109CFDB00DF64D5A9EADBBB1FB08315F208459E416A7261CB745844DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 91b29ea9ffe61ccefe00c11f542329a96a211a618357dae61dd356348fa1bca6
                                      • Instruction ID: 0eeaf9a5e8ee72b27f356587eea77efe1c84b84bd6a51ca3325b60dc1dcf61fa
                                      • Opcode Fuzzy Hash: 91b29ea9ffe61ccefe00c11f542329a96a211a618357dae61dd356348fa1bca6
                                      • Instruction Fuzzy Hash: 58D012362053489FDF505BB1D91CB25BEEAFF54261F008435E805C2661EB35CC50ED62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be950325300ff04a70f2411bcbec625f7b20b0ffde8ecbb574cb2c6a02631c4a
                                      • Instruction ID: caf7ab6c232022d5440cfdd8ec2c2554a48a56270ee2057f8061654cba6d5caf
                                      • Opcode Fuzzy Hash: be950325300ff04a70f2411bcbec625f7b20b0ffde8ecbb574cb2c6a02631c4a
                                      • Instruction Fuzzy Hash: CCD0C9705296414FDB179F28C499AA4BFB0FF53715B5481D2C8818B187C668A456CB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 34d0147a1e7c2b466caf3cabd9ad22e11cd8cbf77c2231be1ac7be3a1502214d
                                      • Instruction ID: 8373e81fea1adb80d2e5f43aaf9f3ee31c2d9d50bb70e1cb162fb317f8765e61
                                      • Opcode Fuzzy Hash: 34d0147a1e7c2b466caf3cabd9ad22e11cd8cbf77c2231be1ac7be3a1502214d
                                      • Instruction Fuzzy Hash: 40C08C243002084BC7042AF5A01836A7BCAEB88B21F105424A80E8B385EE3BBC028611
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c45b28cf6ea067431e40db8bd24e0e3f88137ac00cf30cd2a37c0ffc209e89bd
                                      • Instruction ID: 9ec19dbab7c45cee9a5029014ca08763451a93e3651b5216cd64d3f5dd34592d
                                      • Opcode Fuzzy Hash: c45b28cf6ea067431e40db8bd24e0e3f88137ac00cf30cd2a37c0ffc209e89bd
                                      • Instruction Fuzzy Hash: BEB09B3231413517DA09719D64106BD72CE4785564F40006B951D977419CC5DC8203DF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 412df9ddaa76db588bca07a811dd80c9ef368654d3b5e6f9ca5bfef65ac34d96
                                      • Instruction ID: 7ac2e39c10950ae5f477fca0d82ebe18a643d779a2375c6a2342b044e24a1179
                                      • Opcode Fuzzy Hash: 412df9ddaa76db588bca07a811dd80c9ef368654d3b5e6f9ca5bfef65ac34d96
                                      • Instruction Fuzzy Hash: 42C09227916E0686BA2510218D0E96AB3AAF5005217CC4056ED378AA04E226EE02EE76
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 07f0eb56845d3ed88eae2aba70b82e47bd71d03790a01e1c0fbd75b05a070780
                                      • Instruction ID: 50ba7e1d0db39129c8521189e7e2e30911fae08accdd08f5518fee85a90670e3
                                      • Opcode Fuzzy Hash: 07f0eb56845d3ed88eae2aba70b82e47bd71d03790a01e1c0fbd75b05a070780
                                      • Instruction Fuzzy Hash: B7C0023B040108EFCB426FC0E908C85BFAAEB48320709C4A1FA098A032D772D574EB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4f23b91a7de96d1caa8976649afc07abb46c33fe1a5d08cb98d334186b2971ae
                                      • Instruction ID: 6a8f74afc55359eedcfef23467c5022bef1aaa823e56072f5de5807c2487c93d
                                      • Opcode Fuzzy Hash: 4f23b91a7de96d1caa8976649afc07abb46c33fe1a5d08cb98d334186b2971ae
                                      • Instruction Fuzzy Hash: 4CB0124676000947E51CADED18951B031C163C496573039F87D1EC5BE9DE13ED538606
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                      • Instruction ID: 61412fa5721fa0801f19765b42d0f6ac58f054d2697597a3f249e516f761f0d5
                                      • Opcode Fuzzy Hash: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                      • Instruction Fuzzy Hash: 87C00235140108AFC740DF55D445D95BBA9EB59660B1180A1F9484B722C632E9119A90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1c6ab9684edbf29f9745f089a2c19404afde628b97399e0ce548a04b508881ec
                                      • Instruction ID: babcca688db74e81e3833c628e5db3d1c150cbf601cac86a24817a50d4570495
                                      • Opcode Fuzzy Hash: 1c6ab9684edbf29f9745f089a2c19404afde628b97399e0ce548a04b508881ec
                                      • Instruction Fuzzy Hash: 17B012BF298241A27100B3644DA49ABF421FBA3B04F508C09B345100018465AC39E93F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2133422624.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_56a0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6055b488815583e3273874246860d5f1135398d7feb6a4411cbf7a64daf319c0
                                      • Instruction ID: 4790ba7c9ed7f9a1888fd31218c670a90442af8f83e205a6d4ebe83ba2d33c87
                                      • Opcode Fuzzy Hash: 6055b488815583e3273874246860d5f1135398d7feb6a4411cbf7a64daf319c0
                                      • Instruction Fuzzy Hash: E1C00139412206CAEE00AE14E849B543BA2FB40306F225624A4016B6089BB82884CE81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2182a8641b80dfdb871c83f9c61ba12617f4c4052a9c0c48bac201464a43d41d
                                      • Instruction ID: b72d6260a0e2130f4f683304879163a5b746fff70999cc8d9cebc2a5aa555079
                                      • Opcode Fuzzy Hash: 2182a8641b80dfdb871c83f9c61ba12617f4c4052a9c0c48bac201464a43d41d
                                      • Instruction Fuzzy Hash: 36E10BB4E102198FCB14DFA8C5809AEBBF2FF89304F248169D555AB356D730A981CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2132764573.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4ae0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4251b2fec2543332ab3d94ae071306cbfed5faf539219edbe7c94a928d40ad02
                                      • Instruction ID: a1798eecf489907641a678f6b8da4d1ad79c53358369270a86a4fe6068080586
                                      • Opcode Fuzzy Hash: 4251b2fec2543332ab3d94ae071306cbfed5faf539219edbe7c94a928d40ad02
                                      • Instruction Fuzzy Hash: E112A8B2C82B458BE790CFA5F84C1893BB1B745338BD14A29E3621B2E5D7B4117ACF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 62585558850b6088bcb8aa8be517de363d84d8fd2f95ed9bf9a7754c38b231e0
                                      • Instruction ID: 1aecef4570159f37473d75d657332b10a93a6918fde30798dc689033c71f8f3f
                                      • Opcode Fuzzy Hash: 62585558850b6088bcb8aa8be517de363d84d8fd2f95ed9bf9a7754c38b231e0
                                      • Instruction Fuzzy Hash: ABE1E8B4E101198FCB24DFA9C5809AEBBF2FF89304F24C169D455AB355D730A982CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fbede9aa3a0b46dd90869980d062163fbc8cffdf44cdf956f75eba9df8f556e5
                                      • Instruction ID: c1978755cf82fe9da2c5332c900878b4eb7f35049f848de9e1a95333cca316dc
                                      • Opcode Fuzzy Hash: fbede9aa3a0b46dd90869980d062163fbc8cffdf44cdf956f75eba9df8f556e5
                                      • Instruction Fuzzy Hash: 19E108B4E10219CFCB24DFA9C5809AEBBF2FF89304F248169D555AB355D730A981CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9baf14cb5c3ba5f3b2d8f74c201c87b866fb52fa69d2f9165daa91201784200a
                                      • Instruction ID: d3dd9eb6aae095997637486c304288dd959d621ee6b69e562582a6a518cc826b
                                      • Opcode Fuzzy Hash: 9baf14cb5c3ba5f3b2d8f74c201c87b866fb52fa69d2f9165daa91201784200a
                                      • Instruction Fuzzy Hash: D4E1FBB4E101198FDB24DFA9C5809AEFBF2FF89304F248169D459AB355D730A981CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2136709736.00000000076B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_76b0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e6ef9c9ddc3018400635508c4439feec6a3e4e3a02447287dbeb7f2233bbc003
                                      • Instruction ID: 09153f594d62e515a8299c7d8e74048b745a8c313547415856ab9e8775ea782d
                                      • Opcode Fuzzy Hash: e6ef9c9ddc3018400635508c4439feec6a3e4e3a02447287dbeb7f2233bbc003
                                      • Instruction Fuzzy Hash: 0FE1DCB4E1011A8FCB24DFA9C5809AEFBF6FF89304F248159E455AB355D730A981CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2132764573.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4ae0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3869a74f4b1156cc32b69622098cad993d7574bc7ba831848ee6a857c11793c0
                                      • Instruction ID: f459837cfa786523253fd720d481c7f557ff84bc075cbe6df37cf027fbde7923
                                      • Opcode Fuzzy Hash: 3869a74f4b1156cc32b69622098cad993d7574bc7ba831848ee6a857c11793c0
                                      • Instruction Fuzzy Hash: 5BE11935D2065A8ACB11EBA4D95069DB7B1FFD6300F20C79AE4097B251EB706EC9CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2122866054.0000000002280000.00000040.00000800.00020000.00000000.sdmp, Offset: 02280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2280000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f631ec08310f0dba81c73d00106eae89da9bcced7154695ed3b02302205b5eab
                                      • Instruction ID: 10495392a81d6af6bc47b1ce8b8f3ee3530c8e4483c95c6b46fac198af4df0b7
                                      • Opcode Fuzzy Hash: f631ec08310f0dba81c73d00106eae89da9bcced7154695ed3b02302205b5eab
                                      • Instruction Fuzzy Hash: 5CA17E32E212158FCF05EFB4C94459EB7B2FF84304B65856AE901AB6A9DB31E916CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2132764573.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4ae0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7dfcbb748e012eed46588dc89058fbd1584835fffc446c90f6d5567e6e396c1b
                                      • Instruction ID: 00ca6d6cfa1d8f8e0c74aef0abd29f9f77c55e04c564d5cc749be5010e3a33e3
                                      • Opcode Fuzzy Hash: 7dfcbb748e012eed46588dc89058fbd1584835fffc446c90f6d5567e6e396c1b
                                      • Instruction Fuzzy Hash: CED10835D2065A8ACB01EBB4D99069DB7B1FFD5300F20C79AE5097B254EB706EC9CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2132764573.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_4ae0000_ZpYFG94D4C.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 07971a2bceb7390a5518ebf7ad45be49a13aad2e8a845a71ef8873edf758bd62
                                      • Instruction ID: 8aa74d700f4c60e21e749d2cd96de4dedb3c1813fca59fe722cf0d5f3e040ddb
                                      • Opcode Fuzzy Hash: 07971a2bceb7390a5518ebf7ad45be49a13aad2e8a845a71ef8873edf758bd62
                                      • Instruction Fuzzy Hash: C6915B70B007069FCB44EF79D89056ABBF2FF883107108939D81ACB755EB74E9528B94

                                      Execution Graph

                                      Execution Coverage:10.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:29.2%
                                      Total number of Nodes:24
                                      Total number of Limit Nodes:0
                                      execution_graph 32505 10dced8 32506 10dcee4 32505->32506 32510 52411c0 32506->32510 32516 52411b8 32506->32516 32507 10dcf98 32511 52411e2 32510->32511 32512 52412ae 32511->32512 32522 5248174 32511->32522 32526 5247d8b 32511->32526 32530 5247d90 32511->32530 32512->32507 32517 52411e2 32516->32517 32518 52412ae 32517->32518 32519 5248174 LdrInitializeThunk 32517->32519 32520 5247d90 LdrInitializeThunk 32517->32520 32521 5247d8b LdrInitializeThunk 32517->32521 32518->32507 32519->32518 32520->32518 32521->32518 32524 524802b 32522->32524 32523 52482b1 LdrInitializeThunk 32525 52482c9 32523->32525 32524->32523 32525->32512 32529 5247dc1 32526->32529 32527 5247f21 32527->32512 32528 52482b1 LdrInitializeThunk 32528->32527 32529->32527 32529->32528 32532 5247dc1 32530->32532 32531 5247f21 32531->32512 32532->32531 32533 52482b1 LdrInitializeThunk 32532->32533 32533->32531

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 637 10d6880-10d68a3 638 10d68ae-10d68ce 637->638 639 10d68a5-10d68ab 637->639 642 10d68d5-10d68dc 638->642 643 10d68d0 638->643 639->638 645 10d68de-10d68e9 642->645 644 10d6c64-10d6c6d 643->644 646 10d68ef-10d6902 645->646 647 10d6c75-10d6c99 645->647 650 10d6918-10d6933 646->650 651 10d6904-10d6912 646->651 655 10d6935-10d693b 650->655 656 10d6957-10d695a 650->656 651->650 654 10d6bec-10d6bf3 651->654 654->644 659 10d6bf5-10d6bf7 654->659 657 10d693d 655->657 658 10d6944-10d6947 655->658 660 10d6ab4-10d6aba 656->660 661 10d6960-10d6963 656->661 657->658 657->660 662 10d697a-10d6980 657->662 663 10d6ba6-10d6ba9 657->663 658->662 664 10d6949-10d694c 658->664 665 10d6bf9-10d6bfe 659->665 666 10d6c06-10d6c0c 659->666 660->663 667 10d6ac0-10d6ac5 660->667 661->660 668 10d6969-10d696f 661->668 670 10d6986-10d6988 662->670 671 10d6982-10d6984 662->671 672 10d6baf-10d6bb5 663->672 673 10d6c70 663->673 674 10d69e6-10d69ec 664->674 675 10d6952 664->675 665->666 666->647 676 10d6c0e-10d6c13 666->676 667->663 668->660 669 10d6975 668->669 669->663 678 10d6992-10d699b 670->678 671->678 679 10d6bda-10d6bde 672->679 680 10d6bb7-10d6bbf 672->680 673->647 674->663 677 10d69f2-10d69f8 674->677 675->663 681 10d6c58-10d6c5b 676->681 682 10d6c15-10d6c1a 676->682 684 10d69fe-10d6a00 677->684 685 10d69fa-10d69fc 677->685 687 10d699d-10d69a8 678->687 688 10d69ae-10d69d6 678->688 679->654 689 10d6be0-10d6be6 679->689 680->647 686 10d6bc5-10d6bd4 680->686 681->673 690 10d6c5d-10d6c62 681->690 682->673 683 10d6c1c 682->683 691 10d6c23-10d6c28 683->691 692 10d6a0a-10d6a21 684->692 685->692 686->650 686->679 687->663 687->688 710 10d69dc-10d69e1 688->710 711 10d6aca-10d6b00 688->711 689->645 689->654 690->644 690->659 693 10d6c4a-10d6c4c 691->693 694 10d6c2a-10d6c2c 691->694 703 10d6a4c-10d6a73 692->703 704 10d6a23-10d6a3c 692->704 693->673 701 10d6c4e-10d6c51 693->701 698 10d6c2e-10d6c33 694->698 699 10d6c3b-10d6c41 694->699 698->699 699->647 702 10d6c43-10d6c48 699->702 701->681 702->693 706 10d6c1e-10d6c21 702->706 703->673 715 10d6a79-10d6a7c 703->715 704->711 716 10d6a42-10d6a47 704->716 706->673 706->691 710->711 717 10d6b0d-10d6b15 711->717 718 10d6b02-10d6b06 711->718 715->673 719 10d6a82-10d6aab 715->719 716->711 717->673 722 10d6b1b-10d6b20 717->722 720 10d6b08-10d6b0b 718->720 721 10d6b25-10d6b29 718->721 719->711 734 10d6aad-10d6ab2 719->734 720->717 720->721 723 10d6b48-10d6b4c 721->723 724 10d6b2b-10d6b31 721->724 722->663 727 10d6b4e-10d6b54 723->727 728 10d6b56-10d6b75 call 10d7085 723->728 724->723 726 10d6b33-10d6b3b 724->726 726->673 729 10d6b41-10d6b46 726->729 727->728 731 10d6b7b-10d6b7f 727->731 728->731 729->663 731->663 732 10d6b81-10d6b9d 731->732 732->663 734->711
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o]q$(o]q$,aq$,aq
                                      • API String ID: 0-1947289240
                                      • Opcode ID: 2211a79ecd2464e71e442cab9235b3f54d699bb45a8badbc7be033b6717dfb81
                                      • Instruction ID: ec08d9b2d18dbd8fb806ea87c97bca24b2589ca81cccda980fc891dcd9706757
                                      • Opcode Fuzzy Hash: 2211a79ecd2464e71e442cab9235b3f54d699bb45a8badbc7be033b6717dfb81
                                      • Instruction Fuzzy Hash: FAD13B70A0020ADFDB55CFA9C984AADBBF6FF88310F1584A5E585AB261D732EC41CF51

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1805 10d6108-10d614e 1807 10d6719-10d6766 1805->1807 1808 10d6154-10d6162 1805->1808 1948 10d6768 call 10d6879 1807->1948 1949 10d6768 call 10d6880 1807->1949 1811 10d6164-10d6175 1808->1811 1812 10d6190-10d61a1 1808->1812 1811->1812 1821 10d6177-10d6183 1811->1821 1813 10d61a3-10d61a7 1812->1813 1814 10d6212-10d6226 1812->1814 1817 10d61a9-10d61b5 1813->1817 1818 10d61c2-10d61cb 1813->1818 1950 10d6229 call 10d6108 1814->1950 1951 10d6229 call 10d6730 1814->1951 1815 10d676e-10d6774 1819 10d67c4-10d67c8 1815->1819 1820 10d6776-10d677a 1815->1820 1823 10d61bb-10d61bd 1817->1823 1824 10d6543-10d658e 1817->1824 1827 10d64d4 1818->1827 1828 10d61d1-10d61d4 1818->1828 1825 10d67df-10d67f3 1819->1825 1826 10d67ca-10d67d9 1819->1826 1829 10d677c-10d6781 1820->1829 1830 10d6789-10d6790 1820->1830 1831 10d64d9-10d653c 1821->1831 1832 10d6189-10d618b 1821->1832 1822 10d622f-10d6235 1833 10d623e-10d6245 1822->1833 1834 10d6237-10d6239 1822->1834 1835 10d64ca-10d64d1 1823->1835 1902 10d6595-10d6614 1824->1902 1838 10d67fb-10d6802 1825->1838 1952 10d67f5 call 10d9904 1825->1952 1836 10d67db-10d67dd 1826->1836 1837 10d6805-10d680f 1826->1837 1827->1831 1828->1827 1839 10d61da-10d61f9 1828->1839 1829->1830 1840 10d6866-10d6872 1830->1840 1841 10d6796-10d679d 1830->1841 1831->1824 1832->1835 1842 10d624b-10d6262 1833->1842 1843 10d6333-10d6344 1833->1843 1834->1835 1836->1838 1844 10d6819-10d681d 1837->1844 1845 10d6811-10d6817 1837->1845 1839->1827 1865 10d61ff-10d6205 1839->1865 1841->1819 1846 10d679f-10d67a3 1841->1846 1842->1843 1863 10d6268-10d6274 1842->1863 1860 10d636e-10d6374 1843->1860 1861 10d6346-10d6353 1843->1861 1848 10d6825-10d685f 1844->1848 1850 10d681f 1844->1850 1845->1848 1851 10d67a5-10d67aa 1846->1851 1852 10d67b2-10d67b9 1846->1852 1848->1840 1850->1848 1851->1852 1852->1840 1858 10d67bf-10d67c2 1852->1858 1858->1838 1867 10d638f-10d6395 1860->1867 1868 10d6376-10d6382 1860->1868 1861->1867 1879 10d6355-10d6361 1861->1879 1869 10d632c-10d632e 1863->1869 1870 10d627a-10d62e6 1863->1870 1865->1807 1872 10d620b-10d620f 1865->1872 1877 10d639b-10d63b8 1867->1877 1878 10d64c7 1867->1878 1875 10d6388-10d638a 1868->1875 1876 10d662b-10d668e 1868->1876 1869->1835 1905 10d62e8-10d6312 1870->1905 1906 10d6314-10d6329 1870->1906 1872->1814 1875->1835 1928 10d6695-10d6714 1876->1928 1877->1827 1896 10d63be-10d63c1 1877->1896 1878->1835 1884 10d6619-10d6624 1879->1884 1885 10d6367-10d6369 1879->1885 1884->1876 1885->1835 1896->1807 1898 10d63c7-10d63ed 1896->1898 1898->1878 1910 10d63f3-10d63ff 1898->1910 1905->1906 1906->1869 1912 10d6405-10d647d 1910->1912 1913 10d64c3-10d64c5 1910->1913 1931 10d647f-10d64a9 1912->1931 1932 10d64ab-10d64c0 1912->1932 1913->1835 1931->1932 1932->1913 1948->1815 1949->1815 1950->1822 1951->1822 1952->1838
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o]q$Haq
                                      • API String ID: 0-903699183
                                      • Opcode ID: 7ecf9c2c43113be18b4df967e66ac3b54f74109811cf8baa96d8ab8662ae2402
                                      • Instruction ID: 3cc5ca84f158c5178df600935acb14cf703d2520659ab06ffc0606437efba050
                                      • Opcode Fuzzy Hash: 7ecf9c2c43113be18b4df967e66ac3b54f74109811cf8baa96d8ab8662ae2402
                                      • Instruction Fuzzy Hash: EA128070A0021A8FDB14DF69C894AAEBBF6BF88300F148569E585DB395DF35DD42CB90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2238 10dc190-10dc195 2239 10dc159-10dc182 2238->2239 2240 10dc197-10dc1c0 2238->2240 2242 10dc1c7-10dc2a4 call 10d3908 call 10d3428 2240->2242 2243 10dc1c2 2240->2243 2255 10dc2ab-10dc2cc call 10d4dc8 2242->2255 2256 10dc2a6 2242->2256 2243->2242 2258 10dc2d1-10dc2dc 2255->2258 2256->2255 2259 10dc2de 2258->2259 2260 10dc2e3-10dc2e7 2258->2260 2259->2260 2261 10dc2ec-10dc2f3 2260->2261 2262 10dc2e9-10dc2ea 2260->2262 2264 10dc2fa-10dc308 2261->2264 2265 10dc2f5 2261->2265 2263 10dc30b-10dc34f 2262->2263 2269 10dc3b5-10dc3cc 2263->2269 2264->2263 2265->2264 2271 10dc3ce-10dc3f3 2269->2271 2272 10dc351-10dc367 2269->2272 2278 10dc40b 2271->2278 2279 10dc3f5-10dc40a 2271->2279 2276 10dc369-10dc375 2272->2276 2277 10dc391 2272->2277 2280 10dc37f-10dc385 2276->2280 2281 10dc377-10dc37d 2276->2281 2282 10dc397-10dc3b4 2277->2282 2279->2278 2283 10dc38f 2280->2283 2281->2283 2282->2269 2283->2282
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q$PH]q
                                      • API String ID: 0-1166926398
                                      • Opcode ID: 64be3d2de6083baa1cf0a906dd7ef6b593cc0af2341b8d968fa31debb979009d
                                      • Instruction ID: 0cd80553753269d575245763a37396a05e633a784138fd56c68747d8962099ce
                                      • Opcode Fuzzy Hash: 64be3d2de6083baa1cf0a906dd7ef6b593cc0af2341b8d968fa31debb979009d
                                      • Instruction Fuzzy Hash: 2791E474E00218CFEB54DFAAD984A9DBBF2BF89300F14C069E859AB365DB349945CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2189 10dbeb3-10dbeb5 2190 10dbe79-10dbe94 2189->2190 2191 10dbeb7-10dbed9 2189->2191 2192 10dbedd-10dbee0 2190->2192 2193 10dbe96-10dbea2 2190->2193 2191->2192 2194 10dbee7-10dbfc4 call 10d3908 call 10d3428 2192->2194 2195 10dbee2-10dbee3 2192->2195 2206 10dbfcb-10dbfec call 10d4dc8 2194->2206 2207 10dbfc6 2194->2207 2195->2194 2209 10dbff1-10dbffc 2206->2209 2207->2206 2210 10dbffe 2209->2210 2211 10dc003-10dc007 2209->2211 2210->2211 2212 10dc00c-10dc013 2211->2212 2213 10dc009-10dc00a 2211->2213 2215 10dc01a-10dc028 2212->2215 2216 10dc015 2212->2216 2214 10dc02b-10dc06f 2213->2214 2220 10dc0d5-10dc0ec 2214->2220 2215->2214 2216->2215 2222 10dc0ee-10dc113 2220->2222 2223 10dc071-10dc087 2220->2223 2230 10dc12b 2222->2230 2231 10dc115-10dc12a 2222->2231 2227 10dc089-10dc095 2223->2227 2228 10dc0b1 2223->2228 2232 10dc09f-10dc0a5 2227->2232 2233 10dc097-10dc09d 2227->2233 2229 10dc0b7-10dc0d4 2228->2229 2229->2220 2231->2230 2234 10dc0af 2232->2234 2233->2234 2234->2229
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q$PH]q
                                      • API String ID: 0-1166926398
                                      • Opcode ID: e9d7c94994ea83d65c1c5cfefc0a375bf2df121f215c2571ad941bd938a5979b
                                      • Instruction ID: 98ce5810a95ca95ccf0dbb85190f81b1d8b4cb482169f0383c4e3b2aead4a3f0
                                      • Opcode Fuzzy Hash: e9d7c94994ea83d65c1c5cfefc0a375bf2df121f215c2571ad941bd938a5979b
                                      • Instruction Fuzzy Hash: 9791F7B4E00258CFEB14DFA9D984A9DBBF2BF89300F14C069E449AB365DB319941CF51

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2287 10dbbd3-10dbbd5 2288 10dbb99-10dbb9b 2287->2288 2289 10dbbd7-10dbbd9 2287->2289 2292 10dbbbd-10dbbc8 2288->2292 2290 10dbb9d-10dbb9f 2289->2290 2291 10dbbdb-10dbc00 2289->2291 2290->2292 2293 10dbc07-10dbce4 call 10d3908 call 10d3428 2291->2293 2294 10dbc02 2291->2294 2304 10dbceb-10dbd0c call 10d4dc8 2293->2304 2305 10dbce6 2293->2305 2294->2293 2307 10dbd11-10dbd1c 2304->2307 2305->2304 2308 10dbd1e 2307->2308 2309 10dbd23-10dbd27 2307->2309 2308->2309 2310 10dbd2c-10dbd33 2309->2310 2311 10dbd29-10dbd2a 2309->2311 2313 10dbd3a-10dbd48 2310->2313 2314 10dbd35 2310->2314 2312 10dbd4b-10dbd8f 2311->2312 2318 10dbdf5-10dbe0c 2312->2318 2313->2312 2314->2313 2320 10dbe0e-10dbe33 2318->2320 2321 10dbd91-10dbda7 2318->2321 2327 10dbe4b 2320->2327 2328 10dbe35-10dbe4a 2320->2328 2325 10dbda9-10dbdb5 2321->2325 2326 10dbdd1 2321->2326 2329 10dbdbf-10dbdc5 2325->2329 2330 10dbdb7-10dbdbd 2325->2330 2331 10dbdd7-10dbdf4 2326->2331 2328->2327 2332 10dbdcf 2329->2332 2330->2332 2331->2318 2332->2331
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q$PH]q
                                      • API String ID: 0-1166926398
                                      • Opcode ID: c8fde60b4f6abca96c35c22c98c716646be2a24eb1b125f2da1c59bb26d5924a
                                      • Instruction ID: 276b3a86c1249cfada148ffb25a07358a3ec827cbd558d689debd4f3a4bfde9f
                                      • Opcode Fuzzy Hash: c8fde60b4f6abca96c35c22c98c716646be2a24eb1b125f2da1c59bb26d5924a
                                      • Instruction Fuzzy Hash: A881E474E00218CFDB58DFAAC884A9DBBF2FF89300F1580A9E559AB355EB349941CF11

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2336 10d4add-10d4b08 2337 10d4b0f-10d4bec call 10d3908 call 10d3428 2336->2337 2338 10d4b0a 2336->2338 2348 10d4bee 2337->2348 2349 10d4bf3-10d4c11 2337->2349 2338->2337 2348->2349 2379 10d4c14 call 10d4dc8 2349->2379 2380 10d4c14 call 10d4dbb 2349->2380 2350 10d4c1a-10d4c25 2351 10d4c2c-10d4c30 2350->2351 2352 10d4c27 2350->2352 2353 10d4c35-10d4c3c 2351->2353 2354 10d4c32-10d4c33 2351->2354 2352->2351 2356 10d4c3e 2353->2356 2357 10d4c43-10d4c51 2353->2357 2355 10d4c54-10d4c98 2354->2355 2361 10d4cfe-10d4d15 2355->2361 2356->2357 2357->2355 2363 10d4c9a-10d4cb0 2361->2363 2364 10d4d17-10d4d3c 2361->2364 2368 10d4cda 2363->2368 2369 10d4cb2-10d4cbe 2363->2369 2370 10d4d3e-10d4d53 2364->2370 2371 10d4d54 2364->2371 2374 10d4ce0-10d4cfd 2368->2374 2372 10d4cc8-10d4cce 2369->2372 2373 10d4cc0-10d4cc6 2369->2373 2370->2371 2375 10d4cd8 2372->2375 2373->2375 2374->2361 2375->2374 2379->2350 2380->2350
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q$PH]q
                                      • API String ID: 0-1166926398
                                      • Opcode ID: e97e39a99c06125604dfc14c6d0f1e2042c94d8f49b67b79993a154ab51609a6
                                      • Instruction ID: 9342c573ab1bb82dab80fad54d0998c665a561aa3a94704c61a66c962a3f3e82
                                      • Opcode Fuzzy Hash: e97e39a99c06125604dfc14c6d0f1e2042c94d8f49b67b79993a154ab51609a6
                                      • Instruction Fuzzy Hash: 7881C074E00218CFDB58DFAAD884A9DBBF2BF89300F149069E858EB365DB349945CF11

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2381 10dca31-10dca60 2382 10dca67-10dcb44 call 10d3908 call 10d3428 2381->2382 2383 10dca62 2381->2383 2393 10dcb4b-10dcb6c call 10d4dc8 2382->2393 2394 10dcb46 2382->2394 2383->2382 2396 10dcb71-10dcb7c 2393->2396 2394->2393 2397 10dcb7e 2396->2397 2398 10dcb83-10dcb87 2396->2398 2397->2398 2399 10dcb8c-10dcb93 2398->2399 2400 10dcb89-10dcb8a 2398->2400 2402 10dcb9a-10dcba8 2399->2402 2403 10dcb95 2399->2403 2401 10dcbab-10dcbef 2400->2401 2407 10dcc55-10dcc6c 2401->2407 2402->2401 2403->2402 2409 10dcc6e-10dcc93 2407->2409 2410 10dcbf1-10dcc07 2407->2410 2416 10dccab 2409->2416 2417 10dcc95-10dccaa 2409->2417 2414 10dcc09-10dcc15 2410->2414 2415 10dcc31 2410->2415 2418 10dcc1f-10dcc25 2414->2418 2419 10dcc17-10dcc1d 2414->2419 2420 10dcc37-10dcc54 2415->2420 2417->2416 2421 10dcc2f 2418->2421 2419->2421 2420->2407 2421->2420
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q$PH]q
                                      • API String ID: 0-1166926398
                                      • Opcode ID: 53def9e692f5846346175b342321634dcf8c3d1cdd65e8ed4bcb8b5d79fcbe73
                                      • Instruction ID: 671e53938f574c61a45602d2887ab832bdabdc8d5d955c92ce6e7fbe29eeb514
                                      • Opcode Fuzzy Hash: 53def9e692f5846346175b342321634dcf8c3d1cdd65e8ed4bcb8b5d79fcbe73
                                      • Instruction Fuzzy Hash: E881B574E00218CFEB58DFA9D984A9DBBF2BF88310F14D069E549AB365DB349941CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2425 10dc759-10dc780 2426 10dc787-10dc864 call 10d3908 call 10d3428 2425->2426 2427 10dc782 2425->2427 2437 10dc86b-10dc88c call 10d4dc8 2426->2437 2438 10dc866 2426->2438 2427->2426 2440 10dc891-10dc89c 2437->2440 2438->2437 2441 10dc89e 2440->2441 2442 10dc8a3-10dc8a7 2440->2442 2441->2442 2443 10dc8ac-10dc8b3 2442->2443 2444 10dc8a9-10dc8aa 2442->2444 2446 10dc8ba-10dc8c8 2443->2446 2447 10dc8b5 2443->2447 2445 10dc8cb-10dc90f 2444->2445 2451 10dc975-10dc98c 2445->2451 2446->2445 2447->2446 2453 10dc98e-10dc9b3 2451->2453 2454 10dc911-10dc927 2451->2454 2460 10dc9cb 2453->2460 2461 10dc9b5-10dc9ca 2453->2461 2458 10dc929-10dc935 2454->2458 2459 10dc951 2454->2459 2462 10dc93f-10dc945 2458->2462 2463 10dc937-10dc93d 2458->2463 2464 10dc957-10dc974 2459->2464 2461->2460 2465 10dc94f 2462->2465 2463->2465 2464->2451 2465->2464
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q$PH]q
                                      • API String ID: 0-1166926398
                                      • Opcode ID: c7457e97ade1ba75f992776c7525d75167c00d205658f48b5cc71bb755d0e6a7
                                      • Instruction ID: b78732a468caf20f8d3a073b1dd7055e44d3ea599fa801a4e35ab58524f3a13b
                                      • Opcode Fuzzy Hash: c7457e97ade1ba75f992776c7525d75167c00d205658f48b5cc71bb755d0e6a7
                                      • Instruction Fuzzy Hash: 7581B074E00218CFEB58DFAAD984A9DFBF2BF88310F148069E449AB365DB349941CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2469 10db4f7-10db520 2470 10db527-10db604 call 10d3908 call 10d3428 2469->2470 2471 10db522 2469->2471 2481 10db60b-10db62c call 10d4dc8 2470->2481 2482 10db606 2470->2482 2471->2470 2484 10db631-10db63c 2481->2484 2482->2481 2485 10db63e 2484->2485 2486 10db643-10db647 2484->2486 2485->2486 2487 10db64c-10db653 2486->2487 2488 10db649-10db64a 2486->2488 2490 10db65a-10db668 2487->2490 2491 10db655 2487->2491 2489 10db66b-10db6af 2488->2489 2495 10db715-10db72c 2489->2495 2490->2489 2491->2490 2497 10db72e-10db753 2495->2497 2498 10db6b1-10db6c7 2495->2498 2504 10db76b 2497->2504 2505 10db755-10db76a 2497->2505 2502 10db6c9-10db6d5 2498->2502 2503 10db6f1 2498->2503 2506 10db6df-10db6e5 2502->2506 2507 10db6d7-10db6dd 2502->2507 2508 10db6f7-10db714 2503->2508 2505->2504 2509 10db6ef 2506->2509 2507->2509 2508->2495 2509->2508
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q$PH]q
                                      • API String ID: 0-1166926398
                                      • Opcode ID: 7ec59b95d0708ea21a71adc7d0709bd742076c3de281cb7d763f883cfdc228ca
                                      • Instruction ID: 7b488ba06983bb083cf77d71fe3ffb59f40435c192a12bb4f4206b771fac60ab
                                      • Opcode Fuzzy Hash: 7ec59b95d0708ea21a71adc7d0709bd742076c3de281cb7d763f883cfdc228ca
                                      • Instruction Fuzzy Hash: 7481B274E00218CFDB58DFAAD984A9DBBF2BF89300F15C069E849AB365DB349941CF51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q$PH]q
                                      • API String ID: 0-1166926398
                                      • Opcode ID: 4c8576f4d2edffce4ec3dbbf5f91de3401f55de549707b009bfd3bf469e62596
                                      • Instruction ID: fa57b855ef7eeda4fe35270c2046e0be3eb0df8ef6f2ee76657ef517e64c65be
                                      • Opcode Fuzzy Hash: 4c8576f4d2edffce4ec3dbbf5f91de3401f55de549707b009bfd3bf469e62596
                                      • Instruction Fuzzy Hash: 8B81B5B4E00218CFEB58DFA9D984A9DBBF2BF88300F14D069E459AB365DB349941CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 984d4576b7428fbd3031831ca620f8c86a8444dfd1327c15678cbcfe06480b57
                                      • Instruction ID: 1a21c83688ba8bc6c269b6807d9ec73960d39a6c4b95504e1dc6e1ad4ae81ff8
                                      • Opcode Fuzzy Hash: 984d4576b7428fbd3031831ca620f8c86a8444dfd1327c15678cbcfe06480b57
                                      • Instruction Fuzzy Hash: F1F1F574E11218CFDB18DFA9C884B9DBBB2BF48304F54C1A9E448AB355DB709986CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 564df5e654f79822a3d8037501dca4cdb83ac7c2138fa181ca3d302d840b3b7d
                                      • Instruction ID: 23d743721f29a770f2851e84eefd2d071367debd8e4c23d81063c02af592c898
                                      • Opcode Fuzzy Hash: 564df5e654f79822a3d8037501dca4cdb83ac7c2138fa181ca3d302d840b3b7d
                                      • Instruction Fuzzy Hash: DA72B074E012298FDB64DF69C880BDDBBB2BB49304F5481EAD449A7355DB309E82CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e2c28d8435fc2a5afccc3ad8280cb9b65b013746a8404651bb7ddd65c4e5ec86
                                      • Instruction ID: 4150d4f1e43d596fbd0f5e9f052afb0ea86f781fe6cc0219670094d09084d2cb
                                      • Opcode Fuzzy Hash: e2c28d8435fc2a5afccc3ad8280cb9b65b013746a8404651bb7ddd65c4e5ec86
                                      • Instruction Fuzzy Hash: 15C1B278E00219CFDB14DFA5D994B9DBBB2BF89304F1080A9D809AB354DB359E95CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3d89dc83c85cb6e605073862142c9ec5e6d52a5ed608e0fce1e54771f0f07e06
                                      • Instruction ID: 97c51cdc21a8672ea040c491d443e589764a763d841e004402bb860a1e5fe439
                                      • Opcode Fuzzy Hash: 3d89dc83c85cb6e605073862142c9ec5e6d52a5ed608e0fce1e54771f0f07e06
                                      • Instruction Fuzzy Hash: A9C1C178E00219CFDB54DFA5D994B9DBBB2BF88304F2080A9D809AB354DB359E85CF11
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57b82b3269b4577a8bf34d881c3c917ca88fde1aa271779cde7a5c0872a9b569
                                      • Instruction ID: af517145b9bb0342c3c95c7db303c2b090db5b90699b7b7a757b0625bb92ae8a
                                      • Opcode Fuzzy Hash: 57b82b3269b4577a8bf34d881c3c917ca88fde1aa271779cde7a5c0872a9b569
                                      • Instruction Fuzzy Hash: 8EA10670D00209CFDB14DFA8C594BDDBBB1FF88304F20866AE449AB291DB749985CF55
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: af82e2106a3dac1796ba97899860c799bc504a6879d74fc6b16831ee9614440e
                                      • Instruction ID: 88cc7eae2494d33b9bd22191af0f95e8c4d955baec2c7cb20e4e87b14cd90a89
                                      • Opcode Fuzzy Hash: af82e2106a3dac1796ba97899860c799bc504a6879d74fc6b16831ee9614440e
                                      • Instruction Fuzzy Hash: C3A11570E00209CFEB14DFA8C594BDDBBB1FF88304F20866AE449AB291DB759985CF55
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d4781e9d840610f6ede5635dd13882ba4e51a1b707ad82011897ddc0ed69d36f
                                      • Instruction ID: e49d40a612b5e3279594d9794e75473f6d71a06aeebb52cae6fd3ebad1892c6b
                                      • Opcode Fuzzy Hash: d4781e9d840610f6ede5635dd13882ba4e51a1b707ad82011897ddc0ed69d36f
                                      • Instruction Fuzzy Hash: F5911370D10219CFEB14DFA8C588BEDBBB1FF48310F20966AE449AB291DB709995CF15

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 527 10d7085-10d7099 635 10d709b call 10d7438 527->635 636 10d709b call 10d7433 527->636 528 10d70a1-10d70b1 529 10d70b7-10d70ba 528->529 530 10d72a6-10d72aa 528->530 533 10d70bc-10d70c2 529->533 534 10d70c4-10d70c7 529->534 531 10d73cf 530->531 532 10d72b0-10d72b6 530->532 538 10d73d4-10d73e9 531->538 535 10d72bc-10d72c0 532->535 536 10d6fcf-10d6fd8 532->536 533->534 537 10d70cd-10d70d0 533->537 534->531 534->537 541 10d72d9-10d72e7 535->541 542 10d72c2-10d72d6 535->542 539 10d6fda-10d6fdf 536->539 540 10d6fe7-10d6ff3 536->540 543 10d70d8-10d70db 537->543 544 10d70d2-10d70d6 537->544 539->540 540->538 546 10d6ff9-10d6fff 540->546 554 10d72e9-10d72fe 541->554 555 10d7358-10d736d 541->555 543->531 545 10d70e1-10d70e5 543->545 544->543 544->545 545->531 547 10d70eb-10d70f1 545->547 546->530 549 10d7005-10d7015 546->549 552 10d70f7-10d7122 call 10d6ca0 * 2 547->552 553 10d7052-10d7063 547->553 563 10d7029-10d702b 549->563 564 10d7017-10d7027 549->564 582 10d720c-10d7226 552->582 583 10d7128-10d712c 552->583 553->538 557 10d7069-10d707b 553->557 565 10d7305-10d7312 554->565 566 10d7300-10d7303 554->566 567 10d736f-10d7372 555->567 568 10d7374-10d7381 555->568 557->538 562 10d7081 557->562 562->527 569 10d702e-10d7034 563->569 564->569 572 10d7314-10d7355 565->572 566->572 573 10d7383-10d73be 567->573 568->573 569->530 574 10d703a-10d7049 569->574 601 10d73c5-10d73cc 573->601 574->552 576 10d704f 574->576 576->553 582->535 604 10d722c-10d7230 582->604 583->530 586 10d7132-10d7136 583->586 588 10d715e-10d7164 586->588 589 10d7138-10d7145 586->589 590 10d719f-10d71a5 588->590 591 10d7166-10d716a 588->591 607 10d7154 589->607 608 10d7147-10d7152 589->608 595 10d71a7-10d71ab 590->595 596 10d71b1-10d71b7 590->596 591->590 594 10d716c-10d7175 591->594 599 10d7184-10d719a 594->599 600 10d7177-10d717c 594->600 595->596 595->601 605 10d71b9-10d71bd 596->605 606 10d71c3-10d71c5 596->606 599->530 600->599 612 10d726c-10d7270 604->612 613 10d7232-10d723c call 10d5b50 604->613 605->530 605->606 609 10d71fa-10d71fc 606->609 610 10d71c7-10d71d0 606->610 611 10d7156-10d7158 607->611 608->611 609->530 618 10d7202-10d7209 609->618 616 10d71df-10d71f5 610->616 617 10d71d2-10d71d7 610->617 611->530 611->588 612->601 620 10d7276-10d727a 612->620 613->612 623 10d723e-10d7253 613->623 616->530 617->616 620->601 622 10d7280-10d728d 620->622 626 10d729c 622->626 627 10d728f-10d729a 622->627 623->612 632 10d7255-10d726a 623->632 629 10d729e-10d72a0 626->629 627->629 629->530 629->601 632->535 632->612 635->528 636->528
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o]q$(o]q$(o]q$,aq$,aq
                                      • API String ID: 0-615190528
                                      • Opcode ID: b2e51cd9013ef918a22611cfce9ec8e1ee2fc034080eed3a6434bdf418d67f2b
                                      • Instruction ID: 2257bf1cbec119c2947cec09bda1b3308329166dcd8179ef8c32f6aa23cdc9e5
                                      • Opcode Fuzzy Hash: b2e51cd9013ef918a22611cfce9ec8e1ee2fc034080eed3a6434bdf418d67f2b
                                      • Instruction Fuzzy Hash: 23D15E34A00349CFCB65DF68C484AAEBBF2FF49318F158599E9859B2A1DB30ED41CB50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1953 10d56a8-10d56ca 1954 10d56cc-10d56d0 1953->1954 1955 10d56e0-10d56eb 1953->1955 1956 10d56f8-10d56ff 1954->1956 1957 10d56d2-10d56de 1954->1957 1958 10d56f1-10d56f3 1955->1958 1959 10d5793-10d57bf 1955->1959 1960 10d571f-10d5728 1956->1960 1961 10d5701-10d5708 1956->1961 1957->1955 1957->1956 1962 10d578b-10d5790 1958->1962 1966 10d57c6-10d581e 1959->1966 2054 10d572a call 10d56a8 1960->2054 2055 10d572a call 10d56a0 1960->2055 1961->1960 1963 10d570a-10d5715 1961->1963 1965 10d571b-10d571d 1963->1965 1963->1966 1965->1962 1985 10d582d-10d583f 1966->1985 1986 10d5820-10d5826 1966->1986 1967 10d5730-10d5732 1968 10d573a-10d5742 1967->1968 1969 10d5734-10d5738 1967->1969 1972 10d5744-10d5749 1968->1972 1973 10d5751-10d5753 1968->1973 1969->1968 1971 10d5755-10d5774 call 10d6108 1969->1971 1979 10d5789 1971->1979 1980 10d5776-10d577f 1971->1980 1972->1973 1973->1962 1979->1962 2059 10d5781 call 10da70d 1980->2059 2060 10d5781 call 10da65b 1980->2060 1982 10d5787 1982->1962 1988 10d5845-10d5849 1985->1988 1989 10d58d3-10d58d5 1985->1989 1986->1985 1990 10d5859-10d5866 1988->1990 1991 10d584b-10d5857 1988->1991 2057 10d58d7 call 10d5a70 1989->2057 2058 10d58d7 call 10d5a63 1989->2058 1997 10d5868-10d5872 1990->1997 1991->1997 1992 10d58dd-10d58e3 1995 10d58ef-10d58f6 1992->1995 1996 10d58e5-10d58eb 1992->1996 1998 10d58ed 1996->1998 1999 10d5951-10d59b0 1996->1999 2002 10d589f-10d58a3 1997->2002 2003 10d5874-10d5883 1997->2003 1998->1995 2012 10d59b7-10d59db 1999->2012 2004 10d58af-10d58b3 2002->2004 2005 10d58a5-10d58ab 2002->2005 2014 10d5885-10d588c 2003->2014 2015 10d5893-10d589d 2003->2015 2004->1995 2009 10d58b5-10d58b9 2004->2009 2007 10d58ad 2005->2007 2008 10d58f9-10d594a 2005->2008 2007->1995 2008->1999 2011 10d58bf-10d58d1 2009->2011 2009->2012 2011->1995 2022 10d59dd-10d59df 2012->2022 2023 10d59e1-10d59e3 2012->2023 2014->2015 2015->2002 2024 10d5a59-10d5a5c 2022->2024 2025 10d59e5-10d59e9 2023->2025 2026 10d59f4-10d59f6 2023->2026 2030 10d59ef-10d59f2 2025->2030 2031 10d59eb-10d59ed 2025->2031 2032 10d5a09-10d5a0f 2026->2032 2033 10d59f8-10d59fc 2026->2033 2030->2024 2031->2024 2037 10d5a3a-10d5a3c 2032->2037 2038 10d5a11-10d5a38 2032->2038 2034 10d59fe-10d5a00 2033->2034 2035 10d5a02-10d5a07 2033->2035 2034->2024 2035->2024 2041 10d5a43-10d5a45 2037->2041 2038->2041 2044 10d5a4b-10d5a4d 2041->2044 2045 10d5a47-10d5a49 2041->2045 2047 10d5a4f-10d5a54 2044->2047 2048 10d5a56 2044->2048 2045->2024 2047->2024 2048->2024 2054->1967 2055->1967 2057->1992 2058->1992 2059->1982 2060->1982
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq$Haq
                                      • API String ID: 0-4016896955
                                      • Opcode ID: b0837c3ebe0e835efc67591ef3a36eb6971898d8be1b778968015540b36a7f26
                                      • Instruction ID: ec178fa59f8c6830570f23bf7b9458166ed390354f5e7d69c17b9e122bbaf9d0
                                      • Opcode Fuzzy Hash: b0837c3ebe0e835efc67591ef3a36eb6971898d8be1b778968015540b36a7f26
                                      • Instruction Fuzzy Hash: CBB1AC317043558FDB569F68D894B6E7BF2BF88310F1589A9E8868B291DF34C842CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2061 10d87f3-10d8805 2062 10d8807-10d880c 2061->2062 2063 10d8811-10d881d 2061->2063 2064 10d8ba6-10d8bab 2062->2064 2066 10d882d-10d8832 2063->2066 2067 10d881f-10d8821 2063->2067 2066->2064 2068 10d8829-10d882b 2067->2068 2068->2066 2069 10d8837-10d8843 2068->2069 2071 10d8845-10d8851 2069->2071 2072 10d8853-10d8858 2069->2072 2071->2072 2074 10d885d-10d8868 2071->2074 2072->2064 2076 10d886e-10d8879 2074->2076 2077 10d8912-10d891d 2074->2077 2080 10d888f 2076->2080 2081 10d887b-10d888d 2076->2081 2082 10d89c0-10d89cc 2077->2082 2083 10d8923-10d8932 2077->2083 2084 10d8894-10d8896 2080->2084 2081->2084 2092 10d89dc-10d89ee 2082->2092 2093 10d89ce-10d89da 2082->2093 2090 10d8934-10d893e 2083->2090 2091 10d8943-10d8952 2083->2091 2087 10d8898-10d88a7 2084->2087 2088 10d88b6-10d88bb 2084->2088 2087->2088 2098 10d88a9-10d88b4 2087->2098 2088->2064 2090->2064 2101 10d8954-10d8960 2091->2101 2102 10d8976-10d897f 2091->2102 2105 10d89f0-10d89fc 2092->2105 2106 10d8a12-10d8a17 2092->2106 2093->2092 2100 10d8a1c-10d8a27 2093->2100 2098->2088 2109 10d88c0-10d88c9 2098->2109 2115 10d8a2d-10d8a36 2100->2115 2116 10d8b09-10d8b14 2100->2116 2113 10d896c-10d8971 2101->2113 2114 10d8962-10d8967 2101->2114 2111 10d8995 2102->2111 2112 10d8981-10d8993 2102->2112 2126 10d89fe-10d8a03 2105->2126 2127 10d8a08-10d8a0d 2105->2127 2106->2064 2121 10d88cb-10d88d0 2109->2121 2122 10d88d5-10d88e4 2109->2122 2118 10d899a-10d899c 2111->2118 2112->2118 2113->2064 2114->2064 2128 10d8a4c 2115->2128 2129 10d8a38-10d8a4a 2115->2129 2130 10d8b3e-10d8b4d 2116->2130 2131 10d8b16-10d8b20 2116->2131 2118->2082 2124 10d899e-10d89aa 2118->2124 2121->2064 2139 10d8908-10d890d 2122->2139 2140 10d88e6-10d88f2 2122->2140 2141 10d89ac-10d89b1 2124->2141 2142 10d89b6-10d89bb 2124->2142 2126->2064 2127->2064 2132 10d8a51-10d8a53 2128->2132 2129->2132 2144 10d8b4f-10d8b5e 2130->2144 2145 10d8ba1 2130->2145 2147 10d8b37-10d8b3c 2131->2147 2148 10d8b22-10d8b2e 2131->2148 2137 10d8a55-10d8a61 2132->2137 2138 10d8a63 2132->2138 2146 10d8a68-10d8a6a 2137->2146 2138->2146 2139->2064 2154 10d88fe-10d8903 2140->2154 2155 10d88f4-10d88f9 2140->2155 2141->2064 2142->2064 2144->2145 2157 10d8b60-10d8b78 2144->2157 2145->2064 2151 10d8a6c-10d8a71 2146->2151 2152 10d8a76-10d8a89 2146->2152 2147->2064 2148->2147 2159 10d8b30-10d8b35 2148->2159 2151->2064 2160 10d8a8b 2152->2160 2161 10d8ac1-10d8acb 2152->2161 2154->2064 2155->2064 2172 10d8b9a-10d8b9f 2157->2172 2173 10d8b7a-10d8b98 2157->2173 2159->2064 2162 10d8a8e-10d8a9f call 10d8258 2160->2162 2168 10d8acd-10d8ad9 call 10d8258 2161->2168 2169 10d8aea-10d8af6 2161->2169 2170 10d8aa6-10d8aab 2162->2170 2171 10d8aa1-10d8aa4 2162->2171 2183 10d8adb-10d8ade 2168->2183 2184 10d8ae0-10d8ae5 2168->2184 2178 10d8aff 2169->2178 2179 10d8af8-10d8afd 2169->2179 2170->2064 2171->2170 2176 10d8ab0-10d8ab3 2171->2176 2172->2064 2173->2064 2180 10d8bac-10d8bba 2176->2180 2181 10d8ab9-10d8abf 2176->2181 2185 10d8b04 2178->2185 2179->2185 2181->2161 2181->2162 2183->2169 2183->2184 2184->2064 2185->2064
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q
                                      • API String ID: 0-3120983240
                                      • Opcode ID: 14681012c1fa0d1f6e518e96ac431cbddba8bc1cd2908864baf6a8da096e95b1
                                      • Instruction ID: 834150a168bfd26f1532c7df145d989794f7a99282782bfc7812f3e4c652ec08
                                      • Opcode Fuzzy Hash: 14681012c1fa0d1f6e518e96ac431cbddba8bc1cd2908864baf6a8da096e95b1
                                      • Instruction Fuzzy Hash: 19B14FB07103018FEB599B2DC959B3D76D6EF85714F1884ABE682CF3A1EA64CC42C752
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,aq$,aq
                                      • API String ID: 0-2990736959
                                      • Opcode ID: 8930035390317d7ef78ffdbcf6051fb0ee950bcfd498d07061d6d4ec6523b810
                                      • Instruction ID: 9f802fff2de93b1c32141cd09895aca3e21e5b5a0a2e4c98428d86824544002f
                                      • Opcode Fuzzy Hash: 8930035390317d7ef78ffdbcf6051fb0ee950bcfd498d07061d6d4ec6523b810
                                      • Instruction Fuzzy Hash: 98617135A0060ACFDB58EF6CC8889ADBBF2BF89301B1585A5D941AB361D731E841CF61
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Xaq$Xaq
                                      • API String ID: 0-1488805882
                                      • Opcode ID: f2461a8f290e99968be900b1ff024e7e866c5631705586077b372d4ebac3d244
                                      • Instruction ID: dca999a56e6653e3170ab740916ef0056e05f4cf2932af78a31f7eb58b4b2b7c
                                      • Opcode Fuzzy Hash: f2461a8f290e99968be900b1ff024e7e866c5631705586077b372d4ebac3d244
                                      • Instruction Fuzzy Hash: D93126F9B003168BDB5D4A69459427EBAE6BFC4210F144479D986CB384DFB8DC418292
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q
                                      • API String ID: 0-127220927
                                      • Opcode ID: ad2ed3c02787da75fcef5cb65a3ead896ff1f88359dbd78d1b2e1bb0616cf743
                                      • Instruction ID: ea4377559d2e5b3579dad275099bbe11cea01736be006a17afd226781e7a9505
                                      • Opcode Fuzzy Hash: ad2ed3c02787da75fcef5cb65a3ead896ff1f88359dbd78d1b2e1bb0616cf743
                                      • Instruction Fuzzy Hash: F231B6303003028BDB2A9F6DD89563E7BA5BF84750719C8D7D4AADB362EF24CC818755
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o]q
                                      • API String ID: 0-794736227
                                      • Opcode ID: ea4017f9283470a5ac6e14375719efeb4499f6c56f824eae0e0765fee1be611b
                                      • Instruction ID: 880644f4013b5dcae6dd6e4f040918843c762ed21f6a5bc48e17a0976fed9f51
                                      • Opcode Fuzzy Hash: ea4017f9283470a5ac6e14375719efeb4499f6c56f824eae0e0765fee1be611b
                                      • Instruction Fuzzy Hash: F622503570030ADFCB15CF68C984AAEBBF2FF88354F158995E4859B292D734E841CB61
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4536102202.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5820000_RegSvcs.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: c0fdc3fa2447fbbc5a599d0726b69ff31ba90885a346fb87e0a7e3862b221ee8
                                      • Instruction ID: a537e95886147f9cb41d8d5c834b8ce7f5e26512baa13a92605103615c22f182
                                      • Opcode Fuzzy Hash: c0fdc3fa2447fbbc5a599d0726b69ff31ba90885a346fb87e0a7e3862b221ee8
                                      • Instruction Fuzzy Hash: AE7148B0A01B158FD724DF29D0547AABBF6FF88301F10892DD886DBA50D775E885CB91
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4536102202.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5820000_RegSvcs.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: dddda08498b99d54b43002b911b7d90bf731191d1985390aa660651e6b48f003
                                      • Instruction ID: 58e5661a688b162783264b58e8ca560a21df9ecc3ccf8392145fd5592857d6db
                                      • Opcode Fuzzy Hash: dddda08498b99d54b43002b911b7d90bf731191d1985390aa660651e6b48f003
                                      • Instruction Fuzzy Hash: E16125B5C05349AFCB02CFA9C844ADEBFBABF49314F15815AF808AB261D7719885CF51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q
                                      • API String ID: 0-3081347316
                                      • Opcode ID: 7ea2ddb32eb635468649b524f77c67c484b2687f812d87cf394b77f558270665
                                      • Instruction ID: 86b7b1f9d3127ae8d655e045fa137b554eba6ee1d2db53cfe5b3318240a6e0a0
                                      • Opcode Fuzzy Hash: 7ea2ddb32eb635468649b524f77c67c484b2687f812d87cf394b77f558270665
                                      • Instruction Fuzzy Hash: 3622A578A0021ACFCB54EF64E995B9DBBB2FF88301F1089A5E849A7358DB345D95CF40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q
                                      • API String ID: 0-3081347316
                                      • Opcode ID: 5197579ea9e3d62a0de675e5bd8b378b7c947aed025c09e8c1b47fba2c0251a0
                                      • Instruction ID: 6f21149d91bba786ab47bcdca91caf4e342ca9ba05db0556240b616956f39962
                                      • Opcode Fuzzy Hash: 5197579ea9e3d62a0de675e5bd8b378b7c947aed025c09e8c1b47fba2c0251a0
                                      • Instruction Fuzzy Hash: E922B678A0021ACFCB54EF64E995B9DBBB2FF88301F1089A5E849A7358DB345D95CF40
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0582DFC2
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4536102202.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5820000_RegSvcs.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 15ba2aec8843d28078c5effcf76a00d620691f74815eb8b7903039ec469adcea
                                      • Instruction ID: b9da77a65b9a273817393d8679c912e36405c9996e2901108d3a17fceda9ba5e
                                      • Opcode Fuzzy Hash: 15ba2aec8843d28078c5effcf76a00d620691f74815eb8b7903039ec469adcea
                                      • Instruction Fuzzy Hash: 9B51DFB1C143599FDB14CF99C884ADEBFF5BF88304F20812AE819AB210D774A885CF95
                                      APIs
                                      • LdrInitializeThunk.NTDLL(00000000), ref: 052482B6
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID: InitializeThunk
                                      • String ID:
                                      • API String ID: 2994545307-0
                                      • Opcode ID: e01258d64ff06b8da04733171fdb59fd6fc7f5e8bd8e7417963a8b9ccedfcae3
                                      • Instruction ID: 02cf5f6f3d52ba3f03cc3d58a05803efc2227b9ed798f5623cfb4e006c768202
                                      • Opcode Fuzzy Hash: e01258d64ff06b8da04733171fdb59fd6fc7f5e8bd8e7417963a8b9ccedfcae3
                                      • Instruction Fuzzy Hash: 9E117974E211098FCB08EFA8D884EBDBBB5FF88304F548165E904A7241E770A981CF65
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0582BCEC), ref: 0582BF26
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4536102202.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5820000_RegSvcs.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 0f70eb406526e963ce49b5dd556e8ba8b17ceda95cfecb7bf280e5306408224f
                                      • Instruction ID: 4b8976bb1eb210a43fe7e084ef69cee7d05a2e884208eb558004abc81143521b
                                      • Opcode Fuzzy Hash: 0f70eb406526e963ce49b5dd556e8ba8b17ceda95cfecb7bf280e5306408224f
                                      • Instruction Fuzzy Hash: 23113FB5C043498FCB10DF9AD444A9EFFF4EF88215F20842AD819B7210C379A985CFA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o]q
                                      • API String ID: 0-794736227
                                      • Opcode ID: 25f4a710fce9555079e68323c8b28ad9b54173f0313c8026d7d619e798e9b34d
                                      • Instruction ID: ccaf0bc16493bc3d82e77a8440eac2308139b953e02f7b11329c4d6d535d9ca3
                                      • Opcode Fuzzy Hash: 25f4a710fce9555079e68323c8b28ad9b54173f0313c8026d7d619e798e9b34d
                                      • Instruction Fuzzy Hash: 0F41BF35B002059FCB159B78D864AAEBBF6BFCC710F144469E946D7391CE319C06CBA0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q
                                      • API String ID: 0-1259897404
                                      • Opcode ID: d4148dc6ad381fb45c8ae8cc9be67480c9ca37466576fa985097552f5d5b16d3
                                      • Instruction ID: 92c830d80a894286cdabb64dad1ac802184262112b6c6f8ba66a05d4ed23c044
                                      • Opcode Fuzzy Hash: d4148dc6ad381fb45c8ae8cc9be67480c9ca37466576fa985097552f5d5b16d3
                                      • Instruction Fuzzy Hash: C1414575700215CFCB158F69D888AAE7BB2BF88310F1144A9F9468B2A1CB71DD41CB90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8211fc7cfbd5b9a33642ae4d12e169604fc317711ccf609be66e840a6c0f155c
                                      • Instruction ID: 7dcf3b9827920b52a41c529be98e199b9f185230e025d23655fb32afbb270e7e
                                      • Opcode Fuzzy Hash: 8211fc7cfbd5b9a33642ae4d12e169604fc317711ccf609be66e840a6c0f155c
                                      • Instruction Fuzzy Hash: 57421B74A10219CFEB64DBA4C860BAEBA77FF88300F1080A9C14A6B394DF355E95DF55
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6a122b0aaa812c364e0d924b10124ff3bf1e3b912ff64daa6b0216869bd04939
                                      • Instruction ID: 1facb264c2827bb9215b67c8f519173f26c96521bd05f8fdefd2e67151748b25
                                      • Opcode Fuzzy Hash: 6a122b0aaa812c364e0d924b10124ff3bf1e3b912ff64daa6b0216869bd04939
                                      • Instruction Fuzzy Hash: E4421B74A10219CFEB64DBA4C860BAEBA77FF88300F1080A9C14A6B394DF355E95DF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aeb08dc3f125dc8605d064d25882328d479f2e01bba089860638aec8f387e0aa
                                      • Instruction ID: 1315cd68fe8b2075b71fcaf9016e3fca7b0b0696ae7ceef57c38a9a946ddb6f2
                                      • Opcode Fuzzy Hash: aeb08dc3f125dc8605d064d25882328d479f2e01bba089860638aec8f387e0aa
                                      • Instruction Fuzzy Hash: E57118347002568FDB55DF2CC498AAE7BE5AF49348F5900A9E946CB3B1DB70DC41CB91
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c659a42f28cc2d007fef726590c9d30ed1f60f2557daf82c5372d33843dfcbf1
                                      • Instruction ID: 229770fd54cb7328eed14f4ab8778464dbeaf37a7b3d8d1e1c75fc1b7b21df12
                                      • Opcode Fuzzy Hash: c659a42f28cc2d007fef726590c9d30ed1f60f2557daf82c5372d33843dfcbf1
                                      • Instruction Fuzzy Hash: AC51C1B88A5B478FD2142F24A6EC16ABBA0FF1F3177046D84B08E95815DF75946ACB20
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5ad4d184faa905c2468bf459b573cd1b5a0e321a27fea1687e13b4b0a4a3e6e
                                      • Instruction ID: 5978dbf2a2a58c18358a0924dc00fb5e362f096c69aa28bf57c7fad3d52a0fbd
                                      • Opcode Fuzzy Hash: e5ad4d184faa905c2468bf459b573cd1b5a0e321a27fea1687e13b4b0a4a3e6e
                                      • Instruction Fuzzy Hash: 7651B0B88A1B079FD2142F24A6EC16ABBA4FF4F3177406C48B08E95815DF75946ACB20
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f281d2656753ce52a52c47b98eb022c24e87d86a36e31309dcf5bb09e6b91f67
                                      • Instruction ID: d3f73d49da5a1234888d4ea0129d00af7098c808367e1eba5b3cc3c820e5e8d9
                                      • Opcode Fuzzy Hash: f281d2656753ce52a52c47b98eb022c24e87d86a36e31309dcf5bb09e6b91f67
                                      • Instruction Fuzzy Hash: C0517671E0035A9FCF09CFE8C8549DDBFB2BF88304F14845AE845AB261EB349956CB90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 73b998e8ae12804bcce3bb358a837aa3694fbe2ef7c7066096b0cb55d7fe1a98
                                      • Instruction ID: 65154ed3ae5083a3a760ec1b6f3b0182c0cd59ca8742d47c855484ebefdbf034
                                      • Opcode Fuzzy Hash: 73b998e8ae12804bcce3bb358a837aa3694fbe2ef7c7066096b0cb55d7fe1a98
                                      • Instruction Fuzzy Hash: 44511374D01319CFDB14DFA4D998AAEBBB2FF88304F208529E809AB355DB355986CF41
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 352ae6c27f46c2f42544e11c6980a600f976c48ec03b79add4c3bf24476f6837
                                      • Instruction ID: dc76816f1eba4e3c0904f931038d58e1d83174c958a8594d21514290b94cec09
                                      • Opcode Fuzzy Hash: 352ae6c27f46c2f42544e11c6980a600f976c48ec03b79add4c3bf24476f6837
                                      • Instruction Fuzzy Hash: A7518174E01208DFDB58DFAAD5849DDBBF2BF89300F208169E819AB365DB31A801CF40
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7c04ae9f068631b5545cf1e3b606459152612c5e7ed2050d04bd7ac02038c2f1
                                      • Instruction ID: 596e57b9c2103126743ad3a58b275e1eac930566461c102d31d2369e2c0400ab
                                      • Opcode Fuzzy Hash: 7c04ae9f068631b5545cf1e3b606459152612c5e7ed2050d04bd7ac02038c2f1
                                      • Instruction Fuzzy Hash: 68518378E01308CFCB48DFA9D59499DBBB6FF89310B209469E809AB364DB35AD41CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7d874ea59c8a661cbf5042d669f42423eb694874d85d508b4b0fcca578072539
                                      • Instruction ID: 7956cee2ad6e2acffb92d28249ea88adcacc364c37bd724bf21b1a899aace0f5
                                      • Opcode Fuzzy Hash: 7d874ea59c8a661cbf5042d669f42423eb694874d85d508b4b0fcca578072539
                                      • Instruction Fuzzy Hash: 0051AE74E01229CFCB64DF68D984BEDBBB1BB49305F1095AAE409A7350D735AE81CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7c21784d130eae455f621c4a2c631b5facb8a97595a8836519c6fd3174a65189
                                      • Instruction ID: 6256f7c9ff1fc42f337143dafa321c7cf242ab596196fa44acff3fe064bdeb47
                                      • Opcode Fuzzy Hash: 7c21784d130eae455f621c4a2c631b5facb8a97595a8836519c6fd3174a65189
                                      • Instruction Fuzzy Hash: 2F414374D00249CFCB15EFE8D4846EDBBB1FF89300F61915AD49AA7284EB34A882CF54
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 241fa82a33f7c1202ecdf51dc5c2b691320df21afd74a351e5e603373d2650f1
                                      • Instruction ID: 7b42f6852f4f72eefb0ff0a26b11cea716500feefc6078e3f268f7a104c92a02
                                      • Opcode Fuzzy Hash: 241fa82a33f7c1202ecdf51dc5c2b691320df21afd74a351e5e603373d2650f1
                                      • Instruction Fuzzy Hash: 7741AE30A00309DFCB119F68C844BAABBF6FF88304F05846AE8959B241DB75DD55CBA1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3bbe0cee5a7c615417a5302de7768b5101fdb07c13304f17adcfe030b8ae791b
                                      • Instruction ID: 52a2be79d4bbbb0f1194b2ccea219f530d68d17d943c55189a418b44ff9202e8
                                      • Opcode Fuzzy Hash: 3bbe0cee5a7c615417a5302de7768b5101fdb07c13304f17adcfe030b8ae791b
                                      • Instruction Fuzzy Hash: E6412374D01249CFCB11EFE8D4946EDBBB2FF49310F21916AE489A7284E735A881CF54
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 10bc7a644801c45f144a3740965507c153d911560e1db4878c911dfdd61e9ca8
                                      • Instruction ID: b6bf67811955430f663618f17db3f29f5b3fd086342fe8ae3cce7096cd535863
                                      • Opcode Fuzzy Hash: 10bc7a644801c45f144a3740965507c153d911560e1db4878c911dfdd61e9ca8
                                      • Instruction Fuzzy Hash: 83411374D012088BDB04EFA9D444AEEFBB2BF89300F55D16AD848A7294EB75A841CF94
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f5827d0c1cacde9f22ca5dc8edfe5a4ac654ceed2bb829dc4b2cd261b23de0c3
                                      • Instruction ID: 76aef2462badae0f59e63b755691e0516df4f8ad362ff9359f8d9fd3e65859ee
                                      • Opcode Fuzzy Hash: f5827d0c1cacde9f22ca5dc8edfe5a4ac654ceed2bb829dc4b2cd261b23de0c3
                                      • Instruction Fuzzy Hash: 1331813160424AAFCF169F68D894AAF7BA6FF88300F004424F956CB651CF35DC66DBA0
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 236dd3032acb522eb95eb650f5d2806a407b6b30a0f92329a9cf90f21667bcf4
                                      • Instruction ID: fad5a6bd9c456948a43145ae33ba6bb1ad13ea34f1d976b94f16fd0e416e412d
                                      • Opcode Fuzzy Hash: 236dd3032acb522eb95eb650f5d2806a407b6b30a0f92329a9cf90f21667bcf4
                                      • Instruction Fuzzy Hash: 9031C171F0030ACFC705CF68C4846AEFBB2BF85310B158456D6949B3A2C7359852CB90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4bd1b4bcdc489ab46d100dca8a986e903b2578047dcae793ee29b8077f80f2de
                                      • Instruction ID: 2084005da079804a49e735a6721f99ccb048dfa85d0fdb63bcb5b6200058aef3
                                      • Opcode Fuzzy Hash: 4bd1b4bcdc489ab46d100dca8a986e903b2578047dcae793ee29b8077f80f2de
                                      • Instruction Fuzzy Hash: 572180383003128BEB651A29C894A7E36D7BFC875CF1548B9D646CB795EE25CC43D781
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8df20c65ddd289ea8cdd04dfccbdde7ddd91d3680fccf4fabb883bd824d9b909
                                      • Instruction ID: 441286c3b3032ee5f98e5791d5e660a961ff9f4d6d8d79c1678f71ceccd50daf
                                      • Opcode Fuzzy Hash: 8df20c65ddd289ea8cdd04dfccbdde7ddd91d3680fccf4fabb883bd824d9b909
                                      • Instruction Fuzzy Hash: CB2192343003128BEB661B3D8894A7E36D7BFC865CB1548B9D646CB755EE25CC429781
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: edd2c8e94398add0b8d6152d051211a15f48dd3c7a2e295ec145622fd9959192
                                      • Instruction ID: 997bf5f133f0ca7c6630205157b1b31288ec0be33529a5298567de5e342ffd18
                                      • Opcode Fuzzy Hash: edd2c8e94398add0b8d6152d051211a15f48dd3c7a2e295ec145622fd9959192
                                      • Instruction Fuzzy Hash: E521C139A002059FCB15DF78D8509AE77B6EB98264B10C459E94A8B340EB35EE46CBD2
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 88ac33ffadaa0c536f156e913dcdc0c9e20c7e8f428c175c751cba2e73bf895e
                                      • Instruction ID: 6482f93f4b65a571cc674c38deed356884647ee59f7f4a777d8473c75585e965
                                      • Opcode Fuzzy Hash: 88ac33ffadaa0c536f156e913dcdc0c9e20c7e8f428c175c751cba2e73bf895e
                                      • Instruction Fuzzy Hash: B321AE357007228BD7259A29C8A492FB7A6AFC9761B1541A9ED46CB354CF30DC02CBC1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4532853109.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_104d000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 734e6e150ee7246cc6f02eb1ae8cffbd4f924876b4394dbbaffe89561da08ea5
                                      • Instruction ID: 24665fa55226ed8fac623695bb322232835f2db63597fcfd974efb2eb98aba74
                                      • Opcode Fuzzy Hash: 734e6e150ee7246cc6f02eb1ae8cffbd4f924876b4394dbbaffe89561da08ea5
                                      • Instruction Fuzzy Hash: 792167F1504204EFCB11CF98D8C0B2ABBA5FB94314F20C9BDE9890B242C736D446CB61
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f3a1725b9df24d2f9d777863b6c7d4aeba5d83530d28c96573a639db02decb1c
                                      • Instruction ID: e12619a8d7d80a705986a2a1eacb1e04cd34b978cdc1ec50d504aaec976ff40d
                                      • Opcode Fuzzy Hash: f3a1725b9df24d2f9d777863b6c7d4aeba5d83530d28c96573a639db02decb1c
                                      • Instruction Fuzzy Hash: 0131A578E11309CFCB44DFA8E59499DBBB6FF49305B208469E809AB324DB31AD45CF41
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d66a113fbbe57ee6176879bdbcd1e3dc84f5c1bc59c7dd69fe7f643949d61cb
                                      • Instruction ID: b024be3c6e9fd474ec51206c87ff33c41a1e7fe109ef04729c97bbdabc9259e9
                                      • Opcode Fuzzy Hash: 2d66a113fbbe57ee6176879bdbcd1e3dc84f5c1bc59c7dd69fe7f643949d61cb
                                      • Instruction Fuzzy Hash: 2021C231608245AFCB229F68D4946AB3FA6EF84310F044469F495CB642CF38DC16CBA0
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ff70ecc9fa4e95b4e48e59fc1346df7e381aedc9e552260883917c20ad69a107
                                      • Instruction ID: 097c78b073c17b9bc050726882da758ee2a931f24a851768b52ba2b6316af2ad
                                      • Opcode Fuzzy Hash: ff70ecc9fa4e95b4e48e59fc1346df7e381aedc9e552260883917c20ad69a107
                                      • Instruction Fuzzy Hash: E821E431A00349DFDB15CF68C940B9EBFF2EF85328F058695D5989B292D371E810CBA4
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4fa3e1add7babd8dadd4a9321e8ff184782682a3c53491eadd749b84ccd91946
                                      • Instruction ID: 5aef2f7d1f92fe8c24938424f4aabadc27052b86e188b1b3d4869a934a1711d5
                                      • Opcode Fuzzy Hash: 4fa3e1add7babd8dadd4a9321e8ff184782682a3c53491eadd749b84ccd91946
                                      • Instruction Fuzzy Hash: C611C4317047129FD3165B69C8A452EBBF6EF8925070944A9ED46CB351CF20DC02CB81
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2895929141be8297480d84eadb2fca48efc5d159720770fd599b137a2e3033c6
                                      • Instruction ID: 28031d107f1bec7b7c2095d85850eb88930e0ad6ed834108d897eb19b2ba903c
                                      • Opcode Fuzzy Hash: 2895929141be8297480d84eadb2fca48efc5d159720770fd599b137a2e3033c6
                                      • Instruction Fuzzy Hash: 54211AB4D0010A9FDB45EFB8D58479EBFF2FB85300F2085AAD4449B215EB355A5ACB81
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 01a24d76e2248d336942b78a39112b0ee35a46f834fdecdf672156da1091a354
                                      • Instruction ID: 9887db5a87f241c709a3557740ff416ac8d4deed925d29b496a446183b37944f
                                      • Opcode Fuzzy Hash: 01a24d76e2248d336942b78a39112b0ee35a46f834fdecdf672156da1091a354
                                      • Instruction Fuzzy Hash: 01113A70D002498BDB18DFEAD4446EEBBF6AFCD310F14D066D858B72A5DB3058568F54
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e1a2b27431ad2c9684faf8010b698d590c40e13d7665b80aff241e140b4a26ef
                                      • Instruction ID: ecbfb44ffbaf168e373b551e5000330138615cb2d4ea7282a5f13d70d7a0ca3a
                                      • Opcode Fuzzy Hash: e1a2b27431ad2c9684faf8010b698d590c40e13d7665b80aff241e140b4a26ef
                                      • Instruction Fuzzy Hash: A32136B4C0560A8FCB40EFA8C5445EEBFF1FF49300F1041AAD945B7264EB349A46CB91
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 87dfb2ce3e52b0327b37e75e4bf19e939cec596c5a248033398dbff28ab06af8
                                      • Instruction ID: c1a1602a541715d14dc522486eeceb401722c8c5e32fdca1dc2c73f94ba2ebdb
                                      • Opcode Fuzzy Hash: 87dfb2ce3e52b0327b37e75e4bf19e939cec596c5a248033398dbff28ab06af8
                                      • Instruction Fuzzy Hash: 9F113AB4D0020ADFDB44EFA8D58479EBBF2FB84300F2085AAD4489B214EB345E56CB81
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5e583600069be5420afb1f0f666188a667e34c9ee0aa639b9d75193fe42d1278
                                      • Instruction ID: f5f143d67d76c7ed1678cee2e62a5f23ce2925bd8df9f2ed89555359e0c8f381
                                      • Opcode Fuzzy Hash: 5e583600069be5420afb1f0f666188a667e34c9ee0aa639b9d75193fe42d1278
                                      • Instruction Fuzzy Hash: AC21CFB8C0520A8FCB40EFA9D9856EEBFF0BF09300F10456AD845B3250EB345A56CFA1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4532853109.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_104d000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                      • Instruction ID: 4ad3fe4aa630b382e075fee55281535929ce7660dc15a9faedefcab7c5502642
                                      • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                      • Instruction Fuzzy Hash: 8111DDB5504284DFDB12CF54D9C4B15BFA2FB88314F24C6ADE9894B662C33AD44ACF62
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8364cd7e82461ab3725a995aa9d4702b3b692846633a004b0150d9be99c8c0e7
                                      • Instruction ID: 0eceaa48f778600aa3f5d7ab826ba684976ba5f0d006359abfec3ad653ebf80c
                                      • Opcode Fuzzy Hash: 8364cd7e82461ab3725a995aa9d4702b3b692846633a004b0150d9be99c8c0e7
                                      • Instruction Fuzzy Hash: 4101D271B042155FDB028E68AC10AEE3FF7DFC9251B1880AAF945CB294DE71C812C790
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c2f52469aed22e8da37479982151c0c5a3f5836e75322f4d9605faaff2ac6ad7
                                      • Instruction ID: c9c5dd7fa07a6248f85f38105824c4074664d16c2aae0b3358bfc36b9e6463a9
                                      • Opcode Fuzzy Hash: c2f52469aed22e8da37479982151c0c5a3f5836e75322f4d9605faaff2ac6ad7
                                      • Instruction Fuzzy Hash: 20E02674C4020897CB10AEE9EA0C3EAB7B5DBCA311F40A421D244A2184CF7921168B91
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c96f995352c1408885aa5990c1a576071bb8b3265b6f76c0fe99965e13636e23
                                      • Instruction ID: 2054d2c567bf15cd4afb501610dc97b9a466bdc68578e0b0a20474e41cd4eb6d
                                      • Opcode Fuzzy Hash: c96f995352c1408885aa5990c1a576071bb8b3265b6f76c0fe99965e13636e23
                                      • Instruction Fuzzy Hash: CCE02634D002089BCB04AED9E9083EAB7F5EB8A311F409461E644A3180CB7A851A8B91
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1129bcbb24c476884b4788c41b67cee447ed4ce49aeac303b6f0a063ea2e7064
                                      • Instruction ID: 1baafbf2af0b33c17f43910d8bafc74c79651c27dfff966b4e8422eb134a9191
                                      • Opcode Fuzzy Hash: 1129bcbb24c476884b4788c41b67cee447ed4ce49aeac303b6f0a063ea2e7064
                                      • Instruction Fuzzy Hash: A5E026E2C09340DBE7209BEA69260F9BF70CDE7251784A0C7D0C9DB5A9DB19E206DB11
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a594ef34090771f72bd6982ffe1a7ddf9ea98ec0359fac9cee4a900d42e31fa2
                                      • Instruction ID: 81a7535741f0bb05ff766ce4813b0d4f2a2a33fc5bee85a7914a3216a6e0e4c8
                                      • Opcode Fuzzy Hash: a594ef34090771f72bd6982ffe1a7ddf9ea98ec0359fac9cee4a900d42e31fa2
                                      • Instruction Fuzzy Hash: 2CE06831D243D396CB12ABB4AC044EEFF30AF83220F4442D7E0642E492E730158AC392
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2abf546f6295b99d2abb194b1b5771787dcbab5470957903f29ec7fdd1e49bb
                                      • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                      • Opcode Fuzzy Hash: b2abf546f6295b99d2abb194b1b5771787dcbab5470957903f29ec7fdd1e49bb
                                      • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6151d7b1d3b1172bf5584a8cbc85d66b0e5e397391462f4434b0848a5003be9f
                                      • Instruction ID: 8b3f438c078d8ce39cd6e0827b908f7cdeb4f458571bd2dd0826c9b190964860
                                      • Opcode Fuzzy Hash: 6151d7b1d3b1172bf5584a8cbc85d66b0e5e397391462f4434b0848a5003be9f
                                      • Instruction Fuzzy Hash: F1D0123764C5645EA626008D7C41AF66BCDCAC93B5B2941F7F99CD776098428C5141A4
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 99416af67fd1302ce517c46f966fc2cb4461ba4f243553a4e44404be6beb9c36
                                      • Instruction ID: 5b90c4560535c0e0c84b9645b9b7ab914828ec4ad047513a171b015b8dd7261d
                                      • Opcode Fuzzy Hash: 99416af67fd1302ce517c46f966fc2cb4461ba4f243553a4e44404be6beb9c36
                                      • Instruction Fuzzy Hash: 75D0677BB410199FCB049F9CE8508DDB7B6FB9C321B048526E925A3261C6319921DBA0
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad3ac816d25d7b4708d3da969b1914da93ad70f3e22a2bea13c22ffbc2e40da0
                                      • Instruction ID: e0c536b241b290a2203f979047906b7762b2ca72b53fb142d80dc3a38a79ee31
                                      • Opcode Fuzzy Hash: ad3ac816d25d7b4708d3da969b1914da93ad70f3e22a2bea13c22ffbc2e40da0
                                      • Instruction Fuzzy Hash: 79D0C2744083828BC722E374F9915983F32AA80204B604994B8414A006EF795C5B8B50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3d358f90ffa1347fceed067115ce9c533c185c447cb17a43314fef0c0ba3d9af
                                      • Instruction ID: 41ac4a1146c82e4cc78585bfee4b230bfc1351ff18e9c5c83ee8fecda47b5e89
                                      • Opcode Fuzzy Hash: 3d358f90ffa1347fceed067115ce9c533c185c447cb17a43314fef0c0ba3d9af
                                      • Instruction Fuzzy Hash: ECD06774D4421ECBCB20DF98EA442DCBBB0EF85300F1014D69809B3200D7305AA18F11
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 377578a4f8911cf74a31b3ebdfd490e0adafced4bd6b6ef8472428b5cf9ffe1f
                                      • Instruction ID: 726bad8682d07aac3df8961593a3079994b982a248f60748177124af14208677
                                      • Opcode Fuzzy Hash: 377578a4f8911cf74a31b3ebdfd490e0adafced4bd6b6ef8472428b5cf9ffe1f
                                      • Instruction Fuzzy Hash: 91C0127450430B87C655F775FA45655776BBBC0304F704D10B40A4A119EF7C6C954690
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .5uq
                                      • API String ID: 0-910421107
                                      • Opcode ID: 3529f813f6077d69d2414cc17e997d16f1a94c1de40ab776c9628ec7c0a8e6f4
                                      • Instruction ID: e42c2f63413839a8cc891254114e3c185abda4b2802265072849999a4deb337f
                                      • Opcode Fuzzy Hash: 3529f813f6077d69d2414cc17e997d16f1a94c1de40ab776c9628ec7c0a8e6f4
                                      • Instruction Fuzzy Hash: 64528C74E01229CFDB64DF69C884BDDBBB2BB89304F1485EAD449AB254DB319E81CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3523f7d46b155100cc42b38a057a708c6e31f7da8d3e2c0d68df530509143406
                                      • Instruction ID: 7e2db60fd876284a2b0bc0c60e31e96c9b2b198effe2e3614250c2073ad9ba28
                                      • Opcode Fuzzy Hash: 3523f7d46b155100cc42b38a057a708c6e31f7da8d3e2c0d68df530509143406
                                      • Instruction Fuzzy Hash: AFC1B078E00219CFDB54DFA5D994B9DBBB2BF88304F2080A9D809AB354DB359E85CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: db7f8d4561c752c5707254ef0fbf3fd326bc2b0a55ec0b975d922997b77b0544
                                      • Instruction ID: 9d5dee2e59b11e518700f1e7720636dc61f7b3c23c2f315d4fa8224a2ee14670
                                      • Opcode Fuzzy Hash: db7f8d4561c752c5707254ef0fbf3fd326bc2b0a55ec0b975d922997b77b0544
                                      • Instruction Fuzzy Hash: 38C1D274E10218CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB354DB359E85CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9eafc7d6dab55bfeb0558dc5e7cc2098b2bceeebfe768df52e658a4440db6af8
                                      • Instruction ID: a84723e9c46d99baabddaf815c3da3cf63844bd93bf07e166cd22026a43ec72a
                                      • Opcode Fuzzy Hash: 9eafc7d6dab55bfeb0558dc5e7cc2098b2bceeebfe768df52e658a4440db6af8
                                      • Instruction Fuzzy Hash: 66C1B278E00219CFDB54DFA5D994B9DBBB2BF88304F2080A9D809AB354DB359E95CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7a929399345c25327872f0dcdb4a62ae57e1e3f512508c460f6a098c5dfa7402
                                      • Instruction ID: 0b07cadbc6cd257d9fc04df7d47af80a7eb26cfee7fc7de870bf2ca875602e6b
                                      • Opcode Fuzzy Hash: 7a929399345c25327872f0dcdb4a62ae57e1e3f512508c460f6a098c5dfa7402
                                      • Instruction Fuzzy Hash: 43C1C074E10218CFDB18DFA5D994B9DBBB2BF88304F2480A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1dc22b36c16b66130878aa683b10ac9dc61d49cf37f6549a064fb9812500f29a
                                      • Instruction ID: 1b1c447e987ba2a5b6f39af18da55d39237177e06b6820f9ec41861640bfa2b9
                                      • Opcode Fuzzy Hash: 1dc22b36c16b66130878aa683b10ac9dc61d49cf37f6549a064fb9812500f29a
                                      • Instruction Fuzzy Hash: 74C1C274E10218CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a987eeeb071210e84afa26fa0b9ae9fa2ee5426ecccb7a7f8fe0a7b5eafd457
                                      • Instruction ID: 410cc781cc7a21d6d280bb8e2dfdc60ee3fda14264a23e062eb13b8ab7b926da
                                      • Opcode Fuzzy Hash: 2a987eeeb071210e84afa26fa0b9ae9fa2ee5426ecccb7a7f8fe0a7b5eafd457
                                      • Instruction Fuzzy Hash: F6C1D274E10218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ca15eda78deebb082b4c7c6e2a10fc574a017beb99e8a84cef751b3fe0878f06
                                      • Instruction ID: 08b0ee007ca38e128ba3a58d4c0d7a42b1c19c99de27c5bc76a95295233f8264
                                      • Opcode Fuzzy Hash: ca15eda78deebb082b4c7c6e2a10fc574a017beb99e8a84cef751b3fe0878f06
                                      • Instruction Fuzzy Hash: 28C1C374E11218CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6bab1e3663ddbbb4a635ae9350bfdf363f6d5ef0ceb69c6f4c9ee6a328291dad
                                      • Instruction ID: 4e8261189fec3ca7a75cc2ddf4ec2d5f190add0109ed606ff20169f8582f2bf5
                                      • Opcode Fuzzy Hash: 6bab1e3663ddbbb4a635ae9350bfdf363f6d5ef0ceb69c6f4c9ee6a328291dad
                                      • Instruction Fuzzy Hash: 87C1C574E11218CFDB18DFA5D994B9DBBB2BF88304F1080A9D409AB354DB359D85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e4677bbae75779cad9d75a6b7a5e5ccaae5ef7c5875312658281df4481a549f6
                                      • Instruction ID: 692b054836e8df73fdef7c5bff2ba32abef4199c0a182c25af5775ee6e80201b
                                      • Opcode Fuzzy Hash: e4677bbae75779cad9d75a6b7a5e5ccaae5ef7c5875312658281df4481a549f6
                                      • Instruction Fuzzy Hash: DEC1C274E10219CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b819d3d267e92748293e12864a2d9c5a7b4da46535e6acfc6e13dd0e4db07a80
                                      • Instruction ID: 8b74e58a1d204bc2eec4c2b6c607f55e3cec315bf31e608a998a1c636e2da71c
                                      • Opcode Fuzzy Hash: b819d3d267e92748293e12864a2d9c5a7b4da46535e6acfc6e13dd0e4db07a80
                                      • Instruction Fuzzy Hash: 80C1C374E10218CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3823c6c37aaa2a64741159ee13d4e447d087d5362ca3a8fa69c529413f0faf9a
                                      • Instruction ID: 2793e697ef1c10d105a97a3a771b5b09f028c2bfdddd5fbf9ec7dbcce3095e81
                                      • Opcode Fuzzy Hash: 3823c6c37aaa2a64741159ee13d4e447d087d5362ca3a8fa69c529413f0faf9a
                                      • Instruction Fuzzy Hash: CFC1B274E01219CFDB54DFA5D958B9DBBB2BF88304F1080A9D809AB354DB359D85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ad865fced0b355643f7c9dadbf8f0e5dc29791704751785a9a21e3b27361d6b
                                      • Instruction ID: 455425e84e9815a016d577f0f4168488c401988904b535a3fea70138a48ba295
                                      • Opcode Fuzzy Hash: 5ad865fced0b355643f7c9dadbf8f0e5dc29791704751785a9a21e3b27361d6b
                                      • Instruction Fuzzy Hash: 65C1D374E10218CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1505ceee0451bb67b22e4d7c4ccd38b6b665d057e69f8658c1270afb41686c97
                                      • Instruction ID: aa945f093cee0d1d04a2c6c57a8b00bc94bad1d6a48aafacb572702997e5e6ec
                                      • Opcode Fuzzy Hash: 1505ceee0451bb67b22e4d7c4ccd38b6b665d057e69f8658c1270afb41686c97
                                      • Instruction Fuzzy Hash: C7C1B074E10218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 078608bbf1ba586aabd90299c2e7215a76482618ca64caaf48a4a18b1249f4a6
                                      • Instruction ID: de4a657789f3857077555a3ffd7efa3ca4e178a323122c88179f67130fd019ed
                                      • Opcode Fuzzy Hash: 078608bbf1ba586aabd90299c2e7215a76482618ca64caaf48a4a18b1249f4a6
                                      • Instruction Fuzzy Hash: 02C1C374E10218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 59375dfc4577c9f0a60f5a64659302fc79a321164e8e0628af8e460ba9c51e95
                                      • Instruction ID: eee3784c9db017f279cfaf00cedb892590b0d79ffb2ac42374bb8ef52b89f20f
                                      • Opcode Fuzzy Hash: 59375dfc4577c9f0a60f5a64659302fc79a321164e8e0628af8e460ba9c51e95
                                      • Instruction Fuzzy Hash: 77C1D274E10218CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc629bc9fc0965e9d2ed95a60e9222b98e38fa233563696fa618e192ccb68920
                                      • Instruction ID: bcc86c39cf0fa5e5e0f86ee4819d2b71ead95971bfabbde397a7a7ca0b801fde
                                      • Opcode Fuzzy Hash: dc629bc9fc0965e9d2ed95a60e9222b98e38fa233563696fa618e192ccb68920
                                      • Instruction Fuzzy Hash: AFC1C174E10218CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 288b7b8d936a29ecfeeed7afb54a7f35d938cac605d02ac288cc89ffc90d5d55
                                      • Instruction ID: d966ace811a945ac820622aa892e3b23924e57dbd0f4c46974737c94c39b7ba6
                                      • Opcode Fuzzy Hash: 288b7b8d936a29ecfeeed7afb54a7f35d938cac605d02ac288cc89ffc90d5d55
                                      • Instruction Fuzzy Hash: 71C1C174E10218CFDB18DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dd428f509de4480367e20ce9a3f80ee12521e3250063b2659d625a43a0ba64f9
                                      • Instruction ID: bb5d8798656a2801bc129b2fbb1284590355db65c0373b12e4598b10c84662fc
                                      • Opcode Fuzzy Hash: dd428f509de4480367e20ce9a3f80ee12521e3250063b2659d625a43a0ba64f9
                                      • Instruction Fuzzy Hash: BCC1D474E11218CFDB18DFA9D994B9DBBB2BF88304F2080A9D809AB355DB359D81CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fc6a2937b89d5ec398f56b9e0335b193e481a01001e87a354167068bf34eff40
                                      • Instruction ID: 07d28b8ef877cb299d96a7706586e15f74fda2b163c2376a707ef5cc98e3c219
                                      • Opcode Fuzzy Hash: fc6a2937b89d5ec398f56b9e0335b193e481a01001e87a354167068bf34eff40
                                      • Instruction Fuzzy Hash: 88C1D474E11218CFDB18DFA5D954B9DBBB2BF88304F1080A9D409AB355DB359D85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4535690819.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_5240000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 476b4b6cc9bfaff069dd5f62e06886a2577f8781762379f0a0d06b0ca51caace
                                      • Instruction ID: 1af94008877be9b03d9a50b8e83c103771cb844773212f1b403eaab6f070ae89
                                      • Opcode Fuzzy Hash: 476b4b6cc9bfaff069dd5f62e06886a2577f8781762379f0a0d06b0ca51caace
                                      • Instruction Fuzzy Hash: 04C1C274E10218CFDB58DFA5D994B9DBBB2BF88304F2080A9D809AB355DB359E85CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 60fda3c3bf4e43689970628c638c3a52ea6537ac8fe5cfae8973115d0b5f8687
                                      • Instruction ID: d7ed338f7727164318887dee1002afe290cacd398c43f82124328aa15eea4d39
                                      • Opcode Fuzzy Hash: 60fda3c3bf4e43689970628c638c3a52ea6537ac8fe5cfae8973115d0b5f8687
                                      • Instruction Fuzzy Hash: 33A17E74A01229CFDB64DF64C994BDABBB2BF49301F1085EAE44DA7250DB319E81CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c9ad01bcddd55c6b3279c3fac4cd816e644fbc89db5996256f78d09a08b1cf99
                                      • Instruction ID: 4216b6b9136f32a1f7b8267372fc3c77bc20422d372c9f504e246036b872c98b
                                      • Opcode Fuzzy Hash: c9ad01bcddd55c6b3279c3fac4cd816e644fbc89db5996256f78d09a08b1cf99
                                      • Instruction Fuzzy Hash: 3A517074A01229CFCB64DF24C954B9AB7B2BF4A305F5089E9E40EA7350DB319E81CF51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.4533076989.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_10d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \;]q$\;]q$\;]q$\;]q
                                      • API String ID: 0-2351511683
                                      • Opcode ID: 0ea2f01878e47479c01966b160095a3a88c2b9233109c6ae70d9a750f7305aa4
                                      • Instruction ID: 4527d96a0292fa0a4d95dacb9926618fffea3340f8a63c63852f9b803e47b091
                                      • Opcode Fuzzy Hash: 0ea2f01878e47479c01966b160095a3a88c2b9233109c6ae70d9a750f7305aa4
                                      • Instruction Fuzzy Hash: 59018F717102158FDBA48E2DC48492B7FF6AF88B6072541BAF681CB3B1DA73DC418B90