Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MB263350411AE.scr.exe

Overview

General Information

Sample name:MB263350411AE.scr.exe
Analysis ID:1589999
MD5:578763e8d29b058a3332968654d6e73b
SHA1:b86ffe9c85f35d43dadc0f4cb1a059668ce95c43
SHA256:ff686f645ff7a1b0672895a7a72a5ee528cd112b2469182c79c98f7621af607e
Tags:exeuser-TeamDreier
Infos:

Detection

MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • MB263350411AE.scr.exe (PID: 4776 cmdline: "C:\Users\user\Desktop\MB263350411AE.scr.exe" MD5: 578763E8D29B058A3332968654D6E73B)
    • powershell.exe (PID: 6596 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 5536 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 4208 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MB263350411AE.scr.exe (PID: 7008 cmdline: "C:\Users\user\Desktop\MB263350411AE.scr.exe" MD5: 578763E8D29B058A3332968654D6E73B)
  • SnqkwvE.exe (PID: 1220 cmdline: C:\Users\user\AppData\Roaming\SnqkwvE.exe MD5: 578763E8D29B058A3332968654D6E73B)
    • schtasks.exe (PID: 4828 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp34E1.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • SnqkwvE.exe (PID: 5608 cmdline: "C:\Users\user\AppData\Roaming\SnqkwvE.exe" MD5: 578763E8D29B058A3332968654D6E73B)
  • cleanup
{"EXfil Mode": "SMTP", "From": "serverhar244@gpsamsterdamqroup.com", "Password": "         feXwu@m?K@@L               ", "Server": "fiber13.dnsiaas.com", "To": "benfavour015@gmail.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000007.00000002.3423870398.0000000003224000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
      00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xefa7:$a1: get_encryptedPassword
          • 0xf2cf:$a2: get_encryptedUsername
          • 0xed42:$a3: get_timePasswordChanged
          • 0xee63:$a4: get_passwordField
          • 0xefbd:$a5: set_encryptedPassword
          • 0x10919:$a7: get_logins
          • 0x105ca:$a8: GetOutlookPasswords
          • 0x103bc:$a9: StartKeylogger
          • 0x10869:$a10: KeyLoggerEventArgs
          • 0x10419:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 22 entries
          SourceRuleDescriptionAuthorStrings
          1.2.MB263350411AE.scr.exe.6840000.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            9.2.SnqkwvE.exe.2b9618c.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              1.2.MB263350411AE.scr.exe.29361b4.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                1.2.MB263350411AE.scr.exe.6840000.6.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  9.2.SnqkwvE.exe.2b9618c.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    Click to see the 25 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MB263350411AE.scr.exe", ParentImage: C:\Users\user\Desktop\MB263350411AE.scr.exe, ParentProcessId: 4776, ParentProcessName: MB263350411AE.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", ProcessId: 6596, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MB263350411AE.scr.exe", ParentImage: C:\Users\user\Desktop\MB263350411AE.scr.exe, ParentProcessId: 4776, ParentProcessName: MB263350411AE.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", ProcessId: 6596, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp34E1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp34E1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\SnqkwvE.exe, ParentImage: C:\Users\user\AppData\Roaming\SnqkwvE.exe, ParentProcessId: 1220, ParentProcessName: SnqkwvE.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp34E1.tmp", ProcessId: 4828, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MB263350411AE.scr.exe", ParentImage: C:\Users\user\Desktop\MB263350411AE.scr.exe, ParentProcessId: 4776, ParentProcessName: MB263350411AE.scr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp", ProcessId: 4208, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MB263350411AE.scr.exe", ParentImage: C:\Users\user\Desktop\MB263350411AE.scr.exe, ParentProcessId: 4776, ParentProcessName: MB263350411AE.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe", ProcessId: 6596, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MB263350411AE.scr.exe", ParentImage: C:\Users\user\Desktop\MB263350411AE.scr.exe, ParentProcessId: 4776, ParentProcessName: MB263350411AE.scr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp", ProcessId: 4208, ProcessName: schtasks.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-13T13:16:04.962767+010028032742Potentially Bad Traffic192.168.2.649716193.122.130.080TCP
                    2025-01-13T13:16:07.525185+010028032742Potentially Bad Traffic192.168.2.649730193.122.130.080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "serverhar244@gpsamsterdamqroup.com", "Password": " feXwu@m?K@@L ", "Server": "fiber13.dnsiaas.com", "To": "benfavour015@gmail.com", "Port": 587}
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeReversingLabs: Detection: 44%
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeVirustotal: Detection: 30%Perma Link
                    Source: MB263350411AE.scr.exeVirustotal: Detection: 30%Perma Link
                    Source: MB263350411AE.scr.exeReversingLabs: Detection: 44%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeJoe Sandbox ML: detected
                    Source: MB263350411AE.scr.exeJoe Sandbox ML: detected

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: MB263350411AE.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.6:49727 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.6:49741 version: TLS 1.0
                    Source: MB263350411AE.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 4x nop then jmp 014E9731h7_2_014E9480
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 4x nop then jmp 014E9E5Ah7_2_014E9A40
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 4x nop then jmp 014E9E5Ah7_2_014E9A30
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 4x nop then jmp 014E9E5Ah7_2_014E9D87
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 01319731h12_2_01319480
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 01319E5Ah12_2_01319A30
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 01319E5Ah12_2_01319D87
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E5E15h12_2_030E5AD8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E54D1h12_2_030E5228
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030EE5A0h12_2_030EE2F8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E83D8h12_2_030E8130
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030EF2A8h12_2_030EF000
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030EE9F8h12_2_030EE750
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E5929h12_2_030E5680
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E47C9h12_2_030E4520
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E8830h12_2_030E8588
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E76D0h12_2_030E7428
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030EF700h12_2_030EF458
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030EEE50h12_2_030EEBA8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E4C21h12_2_030E4978
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E7B28h12_2_030E7880
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030EFB58h12_2_030EF8B0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E7278h12_2_030E6FD3
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E5079h12_2_030E4DD0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 030E7F80h12_2_030E7CD8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A62B5h12_2_055A60D8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A6C3Fh12_2_055A60D8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A1CF8h12_2_055A1A50
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A18A0h12_2_055A15F8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A3840h12_2_055A3598
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A26E0h12_2_055A2438
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A0740h12_2_055A0498
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A49A0h12_2_055A46F8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A33E8h12_2_055A3140
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h12_2_055A51D8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A1448h12_2_055A11A0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A02E8h12_2_055A0040
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then mov esp, ebp12_2_055A93F0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A4548h12_2_055A42A0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A0FF0h12_2_055A0D48
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A2F90h12_2_055A2CE8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A40F0h12_2_055A3E48
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A2152h12_2_055A1EA8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h12_2_055A59FB
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A3C98h12_2_055A39F0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h12_2_055A581B
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A0B98h12_2_055A08F0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A2B38h12_2_055A2890
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 4x nop then jmp 055A4DF8h12_2_055A4B50
                    Source: global trafficTCP traffic: 192.168.2.6:59552 -> 1.1.1.1:53
                    Source: global trafficTCP traffic: 192.168.2.6:56773 -> 1.1.1.1:53
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                    Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                    Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49716 -> 193.122.130.0:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49730 -> 193.122.130.0:80
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.6:49727 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.6:49741 version: TLS 1.0
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.0000000003132000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000317C000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                    Source: MB263350411AE.scr.exe, SnqkwvE.exe.1.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: MB263350411AE.scr.exe, SnqkwvE.exe.1.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                    Source: MB263350411AE.scr.exe, SnqkwvE.exe.1.drString found in binary or memory: http://ocsp.comodoca.com0
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000316B000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.00000000031AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000316B000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.00000000031AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2190199347.0000000002521000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 00000009.00000002.2229165220.0000000002781000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                    Source: MB263350411AE.scr.exe, SnqkwvE.exe.1.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727

                    System Summary

                    barindex
                    Source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: MB263350411AE.scr.exe PID: 4776, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: MB263350411AE.scr.exe PID: 7008, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_008642041_2_00864204
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_008679D91_2_008679D9
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_04A01AEC1_2_04A01AEC
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_04A000401_2_04A00040
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_04A029B01_2_04A029B0
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_04A009F01_2_04A009F0
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_04A00A001_2_04A00A00
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_04A01AE01_2_04A01AE0
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_068716201_2_06871620
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_0687E6381_2_0687E638
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_06879A701_2_06879A70
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_068716121_2_06871612
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_0687E6281_2_0687E628
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_068788511_2_06878851
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_068788601_2_06878860
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_06BD16981_2_06BD1698
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_06BD1EF81_2_06BD1EF8
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_06BD1F081_2_06BD1F08
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_06BD9C801_2_06BD9C80
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_06BD3C481_2_06BD3C48
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_06BD1AD01_2_06BD1AD0
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 1_2_06BD33701_2_06BD3370
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 7_2_014EC5307_2_014EC530
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 7_2_014E94807_2_014E9480
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 7_2_014E1A4F7_2_014E1A4F
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 7_2_014EC5217_2_014EC521
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 7_2_014E2DD17_2_014E2DD1
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeCode function: 7_2_014E946F7_2_014E946F
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_00BD42049_2_00BD4204
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_00BD79D99_2_00BD79D9
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06B4E6389_2_06B4E638
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06B416209_2_06B41620
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06B49A709_2_06B49A70
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06B4E6289_2_06B4E628
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06B4161F9_2_06B4161F
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06B488609_2_06B48860
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06B488519_2_06B48851
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06EA16899_2_06EA1689
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06EA16989_2_06EA1698
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06EA8F809_2_06EA8F80
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06EA1F089_2_06EA1F08
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06EA3C489_2_06EA3C48
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06EA1AD09_2_06EA1AD0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_06EA33709_2_06EA3370
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_0131C53012_2_0131C530
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_013127B912_2_013127B9
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_0131948012_2_01319480
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_013119B812_2_013119B8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_0131C52112_2_0131C521
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_01312DD112_2_01312DD1
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_0131946F12_2_0131946F
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_0131FC9C12_2_0131FC9C
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E12AE12_2_030E12AE
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E613812_2_030E6138
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E0AB812_2_030E0AB8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E5AD812_2_030E5AD8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E89E012_2_030E89E0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EAE7812_2_030EAE78
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EBC5012_2_030EBC50
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E032012_2_030E0320
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E033012_2_030E0330
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E521A12_2_030E521A
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E522812_2_030E5228
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EE2F812_2_030EE2F8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E812012_2_030E8120
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E813012_2_030E8130
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EE17012_2_030EE170
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EF00012_2_030EF000
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E602A12_2_030E602A
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EE74012_2_030EE740
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EE75012_2_030EE750
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E566F12_2_030E566F
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E568012_2_030E5680
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E450F12_2_030E450F
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E452012_2_030E4520
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E857912_2_030E8579
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E858812_2_030E8588
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E741812_2_030E7418
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E742812_2_030E7428
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EF44812_2_030EF448
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EF45812_2_030EF458
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EEB9812_2_030EEB98
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EEBA812_2_030EEBA8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E5ACA12_2_030E5ACA
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E496912_2_030E4969
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E497812_2_030E4978
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E787112_2_030E7871
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E788012_2_030E7880
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EF8A112_2_030EF8A1
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EF8B012_2_030EF8B0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E6FD312_2_030E6FD3
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030EEFF012_2_030EEFF0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E4DC012_2_030E4DC0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E4DD012_2_030E4DD0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E7CC812_2_030E7CC8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E0CD812_2_030E0CD8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E7CD812_2_030E7CD8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A910812_2_055A9108
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A803012_2_055A8030
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A60D812_2_055A60D8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A739012_2_055A7390
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A6D4812_2_055A6D48
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A79E012_2_055A79E0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A1A5012_2_055A1A50
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A15F812_2_055A15F8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A15E812_2_055A15E8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A359812_2_055A3598
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A358812_2_055A3588
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A243812_2_055A2438
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A242712_2_055A2427
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A049812_2_055A0498
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A048812_2_055A0488
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A867812_2_055A8678
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A866812_2_055A8668
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A46F812_2_055A46F8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A46E912_2_055A46E9
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A314012_2_055A3140
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A313212_2_055A3132
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A51D812_2_055A51D8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A119012_2_055A1190
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A11A012_2_055A11A0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A004012_2_055A0040
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A000612_2_055A0006
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A802412_2_055A8024
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A60C912_2_055A60C9
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A738012_2_055A7380
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A429012_2_055A4290
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A42A012_2_055A42A0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A0D4812_2_055A0D48
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A0D3912_2_055A0D39
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A6D3712_2_055A6D37
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A2CD812_2_055A2CD8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A2CE812_2_055A2CE8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A3E4812_2_055A3E48
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A3E3812_2_055A3E38
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A1E9A12_2_055A1E9A
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A1EA812_2_055A1EA8
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A79D012_2_055A79D0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A39F012_2_055A39F0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A39E212_2_055A39E2
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A08F012_2_055A08F0
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A08E112_2_055A08E1
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A289012_2_055A2890
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A288012_2_055A2880
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A4B5012_2_055A4B50
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A4B4012_2_055A4B40
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_055A1A4012_2_055A1A40
                    Source: MB263350411AE.scr.exeStatic PE information: invalid certificate
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2190199347.0000000002521000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2187676747.00000000006DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2196895386.0000000007000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2195000631.0000000006840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2190199347.0000000002606000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000001.00000000.2159204543.00000000000D4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebpKV.exep( vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3419499183.000000000041A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3420161506.0000000000F97000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exeBinary or memory string: OriginalFilenamebpKV.exep( vs MB263350411AE.scr.exe
                    Source: MB263350411AE.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: MB263350411AE.scr.exe PID: 4776, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: MB263350411AE.scr.exe PID: 7008, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: MB263350411AE.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SnqkwvE.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/11@2/2
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeFile created: C:\Users\user\AppData\Roaming\SnqkwvE.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5716:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5920:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:716:120:WilError_03
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeFile created: C:\Users\user\AppData\Local\Temp\tmp21E6.tmpJump to behavior
                    Source: MB263350411AE.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: MB263350411AE.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3423870398.00000000031CC000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.00000000031BE000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.00000000031AE000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3425840077.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.00000000031ED000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.00000000031EE000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.0000000003221000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.00000000031FE000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000322D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: MB263350411AE.scr.exeVirustotal: Detection: 30%
                    Source: MB263350411AE.scr.exeReversingLabs: Detection: 44%
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeFile read: C:\Users\user\Desktop\MB263350411AE.scr.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\MB263350411AE.scr.exe "C:\Users\user\Desktop\MB263350411AE.scr.exe"
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Users\user\Desktop\MB263350411AE.scr.exe "C:\Users\user\Desktop\MB263350411AE.scr.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\SnqkwvE.exe C:\Users\user\AppData\Roaming\SnqkwvE.exe
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp34E1.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess created: C:\Users\user\AppData\Roaming\SnqkwvE.exe "C:\Users\user\AppData\Roaming\SnqkwvE.exe"
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Users\user\Desktop\MB263350411AE.scr.exe "C:\Users\user\Desktop\MB263350411AE.scr.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp34E1.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess created: C:\Users\user\AppData\Roaming\SnqkwvE.exe "C:\Users\user\AppData\Roaming\SnqkwvE.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: MB263350411AE.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: MB263350411AE.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_00BD95C7 push ds; iretd 9_2_00BD95D6
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 9_2_00BD9D68 push ds; iretd 9_2_00BD9D76
                    Source: MB263350411AE.scr.exeStatic PE information: section name: .text entropy: 7.551840052573886
                    Source: SnqkwvE.exe.1.drStatic PE information: section name: .text entropy: 7.551840052573886
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeFile created: C:\Users\user\AppData\Roaming\SnqkwvE.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 4776, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 820000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 2520000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 2390000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 8780000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 71A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 9780000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: A780000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 14E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: 50D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: BD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: 4780000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: 86C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: 70E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: 96C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: A6C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: 1310000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory allocated: 3030000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5840Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3909Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exe TID: 1220Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5800Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exe TID: 1584Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: SnqkwvE.exe, 0000000C.00000002.3422259917.00000000013AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll{
                    Source: MB263350411AE.scr.exe, 00000007.00000002.3420659038.00000000012F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeCode function: 12_2_030E0AB8 LdrInitializeThunk,LdrInitializeThunk,12_2_030E0AB8
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe"
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeMemory written: C:\Users\user\Desktop\MB263350411AE.scr.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeMemory written: C:\Users\user\AppData\Roaming\SnqkwvE.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeProcess created: C:\Users\user\Desktop\MB263350411AE.scr.exe "C:\Users\user\Desktop\MB263350411AE.scr.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp34E1.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeProcess created: C:\Users\user\AppData\Roaming\SnqkwvE.exe "C:\Users\user\AppData\Roaming\SnqkwvE.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Users\user\Desktop\MB263350411AE.scr.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Users\user\Desktop\MB263350411AE.scr.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Users\user\AppData\Roaming\SnqkwvE.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Users\user\AppData\Roaming\SnqkwvE.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 4776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 7008, type: MEMORYSTR
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.6840000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SnqkwvE.exe.2b9618c.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.29361b4.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.6840000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SnqkwvE.exe.2b9618c.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.29361b4.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SnqkwvE.exe.2974464.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.271448c.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SnqkwvE.exe.28bbacc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.265baf4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2195000631.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2229165220.0000000002866000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2190199347.0000000002606000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 4776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 7008, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\MB263350411AE.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SnqkwvE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3423870398.0000000003224000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3424904761.0000000003264000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 4776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 7008, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SnqkwvE.exe PID: 5608, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 4776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 7008, type: MEMORYSTR
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.6840000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SnqkwvE.exe.2b9618c.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.29361b4.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.6840000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SnqkwvE.exe.2b9618c.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.29361b4.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SnqkwvE.exe.2974464.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.271448c.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.SnqkwvE.exe.28bbacc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.265baf4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2195000631.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2229165220.0000000002866000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2190199347.0000000002606000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3540790.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.MB263350411AE.scr.exe.3529970.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 4776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MB263350411AE.scr.exe PID: 7008, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    1
                    Query Registry
                    Remote Services1
                    Email Collection
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    11
                    Disable or Modify Tools
                    LSASS Memory11
                    Security Software Discovery
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin Shares1
                    Data from Local System
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                    Process Injection
                    NTDS31
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture13
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                    Obfuscated Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Software Packing
                    Cached Domain Credentials1
                    System Network Configuration Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem13
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589999 Sample: MB263350411AE.scr.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 46 reallyfreegeoip.org 2->46 48 checkip.dyndns.org 2->48 50 checkip.dyndns.com 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Sigma detected: Scheduled temp file as task from temp location 2->56 60 8 other signatures 2->60 8 MB263350411AE.scr.exe 7 2->8         started        12 SnqkwvE.exe 5 2->12         started        signatures3 58 Tries to detect the country of the analysis system (by using the IP) 46->58 process4 file5 34 C:\Users\user\AppData\Roaming\SnqkwvE.exe, PE32 8->34 dropped 36 C:\Users\user\...\SnqkwvE.exe:Zone.Identifier, ASCII 8->36 dropped 38 C:\Users\user\AppData\Local\...\tmp21E6.tmp, XML 8->38 dropped 40 C:\Users\user\...\MB263350411AE.scr.exe.log, ASCII 8->40 dropped 62 Uses schtasks.exe or at.exe to add and modify task schedules 8->62 64 Adds a directory exclusion to Windows Defender 8->64 66 Injects a PE file into a foreign processes 8->66 14 powershell.exe 23 8->14         started        17 MB263350411AE.scr.exe 15 2 8->17         started        20 schtasks.exe 1 8->20         started        68 Multi AV Scanner detection for dropped file 12->68 70 Machine Learning detection for dropped file 12->70 22 SnqkwvE.exe 14 2 12->22         started        24 schtasks.exe 1 12->24         started        signatures6 process7 dnsIp8 72 Loading BitLocker PowerShell Module 14->72 26 WmiPrvSE.exe 14->26         started        28 conhost.exe 14->28         started        42 checkip.dyndns.com 193.122.130.0, 49716, 49730, 80 ORACLE-BMC-31898US United States 17->42 44 reallyfreegeoip.org 104.21.112.1, 443, 49727, 49741 CLOUDFLARENETUS United States 17->44 30 conhost.exe 20->30         started        74 Tries to steal Mail credentials (via file / registry access) 22->74 76 Tries to harvest and steal browser information (history, passwords, etc) 22->76 32 conhost.exe 24->32         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    MB263350411AE.scr.exe31%VirustotalBrowse
                    MB263350411AE.scr.exe45%ReversingLabsByteCode-MSIL.Virus.Virut
                    MB263350411AE.scr.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\SnqkwvE.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\SnqkwvE.exe45%ReversingLabsByteCode-MSIL.Virus.Virut
                    C:\Users\user\AppData\Roaming\SnqkwvE.exe31%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    reallyfreegeoip.org
                    104.21.112.1
                    truefalse
                      high
                      checkip.dyndns.com
                      193.122.130.0
                      truefalse
                        high
                        checkip.dyndns.org
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.org/false
                            high
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://reallyfreegeoip.org/xml/8.46.123.189lMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.comdMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.org/qMB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgdMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000316B000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.00000000031AB000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.org/xml/8.46.123.189dMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://reallyfreegeoip.orgMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000316B000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.00000000031AB000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgdMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.orgMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.orgMB263350411AE.scr.exe, 00000007.00000002.3423870398.0000000003132000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000317C000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.comMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://checkip.dyndns.org/dMB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMB263350411AE.scr.exe, 00000001.00000002.2190199347.0000000002521000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 00000009.00000002.2229165220.0000000002781000.00000004.00000800.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.chiark.greenend.org.uk/~sgtatham/putty/0MB263350411AE.scr.exe, SnqkwvE.exe.1.drfalse
                                                        high
                                                        https://api.telegram.org/bot-/sendDocument?chat_id=MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                          high
                                                          https://reallyfreegeoip.org/xml/MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3423870398.000000000314E000.00000004.00000800.00020000.00000000.sdmp, MB263350411AE.scr.exe, 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SnqkwvE.exe, 0000000C.00000002.3424904761.000000000318E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            104.21.112.1
                                                            reallyfreegeoip.orgUnited States
                                                            13335CLOUDFLARENETUSfalse
                                                            193.122.130.0
                                                            checkip.dyndns.comUnited States
                                                            31898ORACLE-BMC-31898USfalse
                                                            Joe Sandbox version:42.0.0 Malachite
                                                            Analysis ID:1589999
                                                            Start date and time:2025-01-13 13:15:04 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 7m 14s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:18
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:MB263350411AE.scr.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@16/11@2/2
                                                            EGA Information:
                                                            • Successful, ratio: 75%
                                                            HCA Information:
                                                            • Successful, ratio: 98%
                                                            • Number of executed functions: 170
                                                            • Number of non-executed functions: 12
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                            • Excluded IPs from analysis (whitelisted): 13.107.253.45, 2.23.242.162, 52.149.20.212, 13.85.23.206, 40.126.32.68, 2.23.227.208
                                                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, wns2-am3p.wns.windows.com, fe3cr.delivery.mp.microsoft.com
                                                            • Execution Graph export aborted for target MB263350411AE.scr.exe, PID 7008 because it is empty
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtCreateKey calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                            TimeTypeDescription
                                                            07:15:59API Interceptor1x Sleep call for process: MB263350411AE.scr.exe modified
                                                            07:16:01API Interceptor13x Sleep call for process: powershell.exe modified
                                                            07:16:04API Interceptor1x Sleep call for process: SnqkwvE.exe modified
                                                            13:16:03Task SchedulerRun new task: SnqkwvE path: C:\Users\user\AppData\Roaming\SnqkwvE.exe
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            104.21.112.1MACHINE SPECIFICATIONS.exeGet hashmaliciousFormBookBrowse
                                                            • www.buyspeechst.shop/w98i/
                                                            trow.exeGet hashmaliciousUnknownBrowse
                                                            • www.rs-ag.com/
                                                            fqbVL4XxCr.exeGet hashmaliciousFormBookBrowse
                                                            • www.vilakodsiy.sbs/w7eo/
                                                            BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                                            • www.kkpmoneysocial.top/86am/
                                                            9MZZG92yMO.exeGet hashmaliciousFormBookBrowse
                                                            • www.buyspeechst.shop/qzi3/
                                                            QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                                            • www.buyspeechst.shop/w98i/
                                                            wxl1r0lntg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                            • 838596cm.nyafka.top/lineLongpolllinuxFlowercentraluploads.php
                                                            SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                            • beammp.com/phpmyadmin/
                                                            193.122.130.0Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                            • checkip.dyndns.org/
                                                            h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                            • checkip.dyndns.org/
                                                            x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                            • checkip.dyndns.org/
                                                            dZMT94YYwO.exeGet hashmaliciousMassLogger RATBrowse
                                                            • checkip.dyndns.org/
                                                            n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            checkip.dyndns.comQUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.8.169
                                                            Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 193.122.130.0
                                                            SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 158.101.44.242
                                                            PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.8.169
                                                            FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 132.226.247.73
                                                            Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 132.226.8.169
                                                            nfKqna8HuC.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 158.101.44.242
                                                            mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 193.122.6.168
                                                            reallyfreegeoip.orgQUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 104.21.112.1
                                                            Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 104.21.32.1
                                                            SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 104.21.112.1
                                                            PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 104.21.32.1
                                                            FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.80.1
                                                            QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 104.21.80.1
                                                            Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.64.1
                                                            Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 104.21.32.1
                                                            mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 104.21.16.1
                                                            aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.112.1
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            ORACLE-BMC-31898USRemittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 193.122.130.0
                                                            SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 158.101.44.242
                                                            FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            trow.exeGet hashmaliciousUnknownBrowse
                                                            • 147.154.3.56
                                                            nfKqna8HuC.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 158.101.44.242
                                                            mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 193.122.6.168
                                                            aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 193.122.6.168
                                                            ZpYFG94D4C.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 193.122.6.168
                                                            h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 193.122.130.0
                                                            CLOUDFLARENETUSRFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
                                                            • 104.21.80.156
                                                            QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 104.21.112.1
                                                            Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 104.21.32.1
                                                            SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 104.21.112.1
                                                            https://shortener.kountryboyzbailbonds.com/orVbdaZDUTFihPy?https://go.microsoft.com/ref=?ONSKE6784f8047cd90___store=ot&url=ONSKE6784f8047cd90&utm_source=follow-up-email&utm_medium=email&utm_campaign=abandoned%20helpful%20linkGet hashmaliciousUnknownBrowse
                                                            • 104.19.132.76
                                                            PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 104.21.32.1
                                                            https://smartbooking.ma/Get hashmaliciousUnknownBrowse
                                                            • 188.114.97.3
                                                            FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.80.1
                                                            https://connexion-pro.support/adobe/s/assets/Get hashmaliciousUnknownBrowse
                                                            • 104.21.11.138
                                                            rRef6010273.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            54328bd36c14bd82ddaa0c04b25ed9adQUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 104.21.112.1
                                                            Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 104.21.112.1
                                                            SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 104.21.112.1
                                                            PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 104.21.112.1
                                                            FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.112.1
                                                            QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 104.21.112.1
                                                            Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.112.1
                                                            Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 104.21.112.1
                                                            Loader.exeGet hashmaliciousUnknownBrowse
                                                            • 104.21.112.1
                                                            mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 104.21.112.1
                                                            No context
                                                            Process:C:\Users\user\Desktop\MB263350411AE.scr.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Users\user\AppData\Roaming\SnqkwvE.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):2232
                                                            Entropy (8bit):5.379460230152629
                                                            Encrypted:false
                                                            SSDEEP:48:fWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//8PUyus:fLHyIFKL3IZ2KRH9Oug8s
                                                            MD5:5EDBE2AEEFE69FB36ECED2E31AC9386F
                                                            SHA1:6614C7900E4994E1A3606D22916BE68F701A19D4
                                                            SHA-256:4275A59302475C8198165F4EB61EA2A88BD12056EA6EE5197C1BF8E6B6A6F9FD
                                                            SHA-512:CFBAB752BE8CB209B25F2D1AD30E08E5E7ADB2EE5B4CCE98DCFD20B05E4B1CEFFCB6551556B134A2123412C864A8A544701C846F204783D99CB58936DC086A76
                                                            Malicious:false
                                                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\Desktop\MB263350411AE.scr.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1594
                                                            Entropy (8bit):5.093195143039198
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhHb1eHky1mIHdUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLOAxvn:cge7QYrFdOFzOzN33ODOiDdKrsuTzv
                                                            MD5:BB641185A6E04F771135E43AD78A3659
                                                            SHA1:651809FEF5CDF5B721656F862BBC9D27F320597E
                                                            SHA-256:9D1135C8051DE2596E8F885285C94CF421CA714F9BE860EE34C4D59775339355
                                                            SHA-512:EC4D1592B8DE9F0019838C321F02FF1693F37B68DFCBC668ED5E0F6D03792CC757FF31E35196E4CB19971F0E0EFD7EC88F72142B2095B681F583064AB8ABE850
                                                            Malicious:true
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <Run
                                                            Process:C:\Users\user\AppData\Roaming\SnqkwvE.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1594
                                                            Entropy (8bit):5.093195143039198
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhHb1eHky1mIHdUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLOAxvn:cge7QYrFdOFzOzN33ODOiDdKrsuTzv
                                                            MD5:BB641185A6E04F771135E43AD78A3659
                                                            SHA1:651809FEF5CDF5B721656F862BBC9D27F320597E
                                                            SHA-256:9D1135C8051DE2596E8F885285C94CF421CA714F9BE860EE34C4D59775339355
                                                            SHA-512:EC4D1592B8DE9F0019838C321F02FF1693F37B68DFCBC668ED5E0F6D03792CC757FF31E35196E4CB19971F0E0EFD7EC88F72142B2095B681F583064AB8ABE850
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <Run
                                                            Process:C:\Users\user\Desktop\MB263350411AE.scr.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):616968
                                                            Entropy (8bit):7.547414224495075
                                                            Encrypted:false
                                                            SSDEEP:12288:6XQhdIwhfi3adcWmCKjSpqvvuBso/InAHd68Kw30odiK68mAl12tZ9uLUxL7HNHM:LhdIwhKKCWTiWqnmrG58h62qLBK
                                                            MD5:578763E8D29B058A3332968654D6E73B
                                                            SHA1:B86FFE9C85F35D43DADC0F4CB1A059668CE95C43
                                                            SHA-256:FF686F645FF7A1B0672895A7A72A5EE528CD112B2469182C79C98F7621AF607E
                                                            SHA-512:3C312A080991E9CCEE56E3CC568EEB8C143981D560BCE566AFB00951F60820C8F418ACE86B5B947792E0450AAB1FAA5658F3E68CBEA008FF510373A63D5710FD
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 45%
                                                            • Antivirus: Virustotal, Detection: 31%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p..g..............0......$......6,... ...@....@.. ....................................`..................................+..O....@..<!...........4...6........................................................... ............... ..H............text...L.... ...................... ..`.rsrc...<!...@..."..................@..@.reloc...............2..............@..B.................,......H........v..................H...................................................}......}......}......}.....(......*..0.................}......}......}......}.....(.......(............}.....{....(......{....(......{.....o......{.....o......{......r...p.d.d.s......{......r...p.x.d..s......{......r...p .....d..s......{......r1..p .....d..s......{......r;..p ,... ......s......{......rI..p T... ......s.......+<..{.......X...s.....rW..p..X...(....re..p...(....(....&...X.......-..{.
                                                            Process:C:\Users\user\Desktop\MB263350411AE.scr.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.547414224495075
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                            • Win32 Executable (generic) a (10002005/4) 49.97%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:MB263350411AE.scr.exe
                                                            File size:616'968 bytes
                                                            MD5:578763e8d29b058a3332968654d6e73b
                                                            SHA1:b86ffe9c85f35d43dadc0f4cb1a059668ce95c43
                                                            SHA256:ff686f645ff7a1b0672895a7a72a5ee528cd112b2469182c79c98f7621af607e
                                                            SHA512:3c312a080991e9ccee56e3cc568eeb8c143981d560bce566afb00951f60820c8f418ace86b5b947792e0450aab1faa5658f3e68cbea008ff510373a63d5710fd
                                                            SSDEEP:12288:6XQhdIwhfi3adcWmCKjSpqvvuBso/InAHd68Kw30odiK68mAl12tZ9uLUxL7HNHM:LhdIwhKKCWTiWqnmrG58h62qLBK
                                                            TLSH:DCD4DF1521ACD602C0A26FB00971D3F84B756E99BA21CB1B8FE97DEF79767047A40363
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p..g..............0......$......6,... ...@....@.. ....................................`................................
                                                            Icon Hash:132d922957b24d93
                                                            Entrypoint:0x492c36
                                                            Entrypoint Section:.text
                                                            Digitally signed:true
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x67849D70 [Mon Jan 13 04:58:24 2025 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Signature Valid:false
                                                            Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                            Signature Validation Error:The digital signature of the object did not verify
                                                            Error Number:-2146869232
                                                            Not Before, Not After
                                                            • 13/11/2018 01:00:00 09/11/2021 00:59:59
                                                            Subject Chain
                                                            • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                            Version:3
                                                            Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                            Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                            Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                            Serial:7C1118CBBADC95DA3752C46E47A27438
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            call far 0000h : 003E9999h
                                                            aas
                                                            int CCh
                                                            dec esp
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x92be40x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x213c.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x934000x3608
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x980000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000x90c4c0x90e00a2e58f0c6d9e30070bc20c9e2dc0b28fFalse0.8552597875323554data7.551840052573886IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x940000x213c0x22006cc53da7dba7314b0f41cd8e93853723False0.6403952205882353data6.461402195633676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x980000xc0x200b2d5ce2beba0428e88414a9a7ab7b6b8False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x940c80x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 72960.6911123227917121
                                                            RT_GROUP_ICON0x95d800x14data1.15
                                                            RT_VERSION0x95da40x394OpenPGP Secret Key0.4104803493449782
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2025-01-13T13:16:04.962767+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649716193.122.130.080TCP
                                                            2025-01-13T13:16:07.525185+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649730193.122.130.080TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 13, 2025 13:16:02.711895943 CET4971680192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:02.716660976 CET8049716193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:02.716730118 CET4971680192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:02.716989040 CET4971680192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:02.721725941 CET8049716193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:04.754336119 CET8049716193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:04.777080059 CET4971680192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:04.782051086 CET8049716193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:04.918770075 CET8049716193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:04.962766886 CET4971680192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:05.022552967 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:05.022610903 CET44349727104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:05.022674084 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:05.065529108 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:05.065562010 CET44349727104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:06.451697111 CET4973080192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:06.483158112 CET8049730193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:06.483232975 CET4973080192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:06.483830929 CET4973080192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:06.490169048 CET44349727104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:06.490231991 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:06.490885973 CET8049730193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:06.492986917 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:06.493005991 CET44349727104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:06.493428946 CET44349727104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:06.543121099 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:06.564194918 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:06.607335091 CET44349727104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:06.672683954 CET44349727104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:06.672766924 CET44349727104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:06.672893047 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:06.679037094 CET49727443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:07.378289938 CET8049730193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:07.382591963 CET4973080192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:07.387432098 CET8049730193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:07.483958006 CET8049730193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:16:07.486284018 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:07.486325979 CET44349741104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:07.486552000 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:07.491257906 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:07.491276979 CET44349741104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:07.525185108 CET4973080192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:16:07.947896957 CET44349741104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:07.948081017 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:07.949604034 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:07.949620962 CET44349741104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:07.949868917 CET44349741104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:07.993915081 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:08.009346008 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:08.055329084 CET44349741104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:08.112478971 CET44349741104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:08.112536907 CET44349741104.21.112.1192.168.2.6
                                                            Jan 13, 2025 13:16:08.112610102 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:08.116394043 CET49741443192.168.2.6104.21.112.1
                                                            Jan 13, 2025 13:16:17.174097061 CET5955253192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:17.178963900 CET53595521.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:17.179035902 CET5955253192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:17.183892012 CET53595521.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:17.648972034 CET5955253192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:17.654019117 CET53595521.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:17.654097080 CET5955253192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:18.658660889 CET5677353192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:18.663465977 CET53567731.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:18.663532019 CET5677353192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:18.668591022 CET53567731.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:19.120739937 CET5677353192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:19.126677036 CET53567731.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:19.126760006 CET5677353192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:17:10.008763075 CET8049716193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:17:10.008812904 CET4971680192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:17:12.484821081 CET8049730193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:17:12.484895945 CET4973080192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:17:44.982781887 CET4971680192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:17:44.987692118 CET8049716193.122.130.0192.168.2.6
                                                            Jan 13, 2025 13:17:47.494425058 CET4973080192.168.2.6193.122.130.0
                                                            Jan 13, 2025 13:17:47.499412060 CET8049730193.122.130.0192.168.2.6
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 13, 2025 13:16:02.698136091 CET6015653192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:02.705564976 CET53601561.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:05.012348890 CET4964753192.168.2.61.1.1.1
                                                            Jan 13, 2025 13:16:05.020193100 CET53496471.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:17.173660040 CET53532121.1.1.1192.168.2.6
                                                            Jan 13, 2025 13:16:18.657247066 CET53497091.1.1.1192.168.2.6
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Jan 13, 2025 13:16:02.698136091 CET192.168.2.61.1.1.10xbdc4Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:05.012348890 CET192.168.2.61.1.1.10xf474Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Jan 13, 2025 13:16:02.705564976 CET1.1.1.1192.168.2.60xbdc4No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                            Jan 13, 2025 13:16:02.705564976 CET1.1.1.1192.168.2.60xbdc4No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:02.705564976 CET1.1.1.1192.168.2.60xbdc4No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:02.705564976 CET1.1.1.1192.168.2.60xbdc4No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:02.705564976 CET1.1.1.1192.168.2.60xbdc4No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:02.705564976 CET1.1.1.1192.168.2.60xbdc4No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:05.020193100 CET1.1.1.1192.168.2.60xf474No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:05.020193100 CET1.1.1.1192.168.2.60xf474No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:05.020193100 CET1.1.1.1192.168.2.60xf474No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:05.020193100 CET1.1.1.1192.168.2.60xf474No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:05.020193100 CET1.1.1.1192.168.2.60xf474No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:05.020193100 CET1.1.1.1192.168.2.60xf474No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                            Jan 13, 2025 13:16:05.020193100 CET1.1.1.1192.168.2.60xf474No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                            • reallyfreegeoip.org
                                                            • checkip.dyndns.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.649716193.122.130.0807008C:\Users\user\Desktop\MB263350411AE.scr.exe
                                                            TimestampBytes transferredDirectionData
                                                            Jan 13, 2025 13:16:02.716989040 CET151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Jan 13, 2025 13:16:04.754336119 CET321INHTTP/1.1 200 OK
                                                            Date: Mon, 13 Jan 2025 12:16:04 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 104
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: cd66023a9c57acd2d6050f3a832682f8
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                            Jan 13, 2025 13:16:04.777080059 CET127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Jan 13, 2025 13:16:04.918770075 CET321INHTTP/1.1 200 OK
                                                            Date: Mon, 13 Jan 2025 12:16:04 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 104
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 81578ab6f1493fa7b53a65c0cdcb1ec1
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.649730193.122.130.0805608C:\Users\user\AppData\Roaming\SnqkwvE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Jan 13, 2025 13:16:06.483830929 CET151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Jan 13, 2025 13:16:07.378289938 CET321INHTTP/1.1 200 OK
                                                            Date: Mon, 13 Jan 2025 12:16:07 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 104
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: a97bd49c0c808eb6b7bce79a8c6cae83
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                            Jan 13, 2025 13:16:07.382591963 CET127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Jan 13, 2025 13:16:07.483958006 CET321INHTTP/1.1 200 OK
                                                            Date: Mon, 13 Jan 2025 12:16:07 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 104
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 069df83e6d0ed9c1f377afce715bd876
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.649727104.21.112.14437008C:\Users\user\Desktop\MB263350411AE.scr.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-13 12:16:06 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2025-01-13 12:16:06 UTC860INHTTP/1.1 200 OK
                                                            Date: Mon, 13 Jan 2025 12:16:06 GMT
                                                            Content-Type: text/xml
                                                            Content-Length: 362
                                                            Connection: close
                                                            Age: 2085355
                                                            Cache-Control: max-age=31536000
                                                            cf-cache-status: HIT
                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e1JgVWxkUY8PzntPupGz02JCyuK%2F6KCfu3eRZRVzO%2FXg7Qg%2F%2FIuDvAfP9mpkbPiWoJqMwYqpCe7n3PDXMm9boRpW8wY175X%2Fso2qHMcXAbyUJr81VMjv99c843CHNicWff6qGCi2"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 901550c95e41424b-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1604&min_rtt=1603&rtt_var=604&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1806930&cwnd=249&unsent_bytes=0&cid=0da40fa24308403a&ts=1148&x=0"
                                                            2025-01-13 12:16:06 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.649741104.21.112.14435608C:\Users\user\AppData\Roaming\SnqkwvE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-13 12:16:08 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2025-01-13 12:16:08 UTC859INHTTP/1.1 200 OK
                                                            Date: Mon, 13 Jan 2025 12:16:08 GMT
                                                            Content-Type: text/xml
                                                            Content-Length: 362
                                                            Connection: close
                                                            Age: 2085357
                                                            Cache-Control: max-age=31536000
                                                            cf-cache-status: HIT
                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Bb8djA7osJyWJOiK2d1D8nRLel9B1jYydEI4ZPa%2B48NLig36891rG3eez8WA9D%2Fkij7oNceioWPSOTpsW83Sl3FCXPPZxOlSll82dKJBL0acjRiJt9%2F3wTW9wWr%2BD9xkh1DtToVp"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 901550d26af543b3-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1694&min_rtt=1626&rtt_var=658&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1795817&cwnd=203&unsent_bytes=0&cid=7722941a86ea3d0a&ts=171&x=0"
                                                            2025-01-13 12:16:08 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:1
                                                            Start time:07:15:58
                                                            Start date:13/01/2025
                                                            Path:C:\Users\user\Desktop\MB263350411AE.scr.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\MB263350411AE.scr.exe"
                                                            Imagebase:0x40000
                                                            File size:616'968 bytes
                                                            MD5 hash:578763E8D29B058A3332968654D6E73B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2195000631.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2191797299.0000000003529000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2191797299.0000000003566000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2190199347.0000000002606000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:07:15:59
                                                            Start date:13/01/2025
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SnqkwvE.exe"
                                                            Imagebase:0x300000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:07:16:00
                                                            Start date:13/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:07:16:00
                                                            Start date:13/01/2025
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp21E6.tmp"
                                                            Imagebase:0xa10000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:07:16:00
                                                            Start date:13/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:07:16:00
                                                            Start date:13/01/2025
                                                            Path:C:\Users\user\Desktop\MB263350411AE.scr.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\MB263350411AE.scr.exe"
                                                            Imagebase:0xd70000
                                                            File size:616'968 bytes
                                                            MD5 hash:578763E8D29B058A3332968654D6E73B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.3423870398.0000000003224000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.3419499183.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:8
                                                            Start time:07:16:02
                                                            Start date:13/01/2025
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff717f30000
                                                            File size:496'640 bytes
                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:07:16:03
                                                            Start date:13/01/2025
                                                            Path:C:\Users\user\AppData\Roaming\SnqkwvE.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\SnqkwvE.exe
                                                            Imagebase:0x440000
                                                            File size:616'968 bytes
                                                            MD5 hash:578763E8D29B058A3332968654D6E73B
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.2229165220.0000000002866000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 45%, ReversingLabs
                                                            • Detection: 31%, Virustotal, Browse
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:10
                                                            Start time:07:16:04
                                                            Start date:13/01/2025
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SnqkwvE" /XML "C:\Users\user\AppData\Local\Temp\tmp34E1.tmp"
                                                            Imagebase:0xa10000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:07:16:04
                                                            Start date:13/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:07:16:04
                                                            Start date:13/01/2025
                                                            Path:C:\Users\user\AppData\Roaming\SnqkwvE.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\SnqkwvE.exe"
                                                            Imagebase:0xc40000
                                                            File size:616'968 bytes
                                                            MD5 hash:578763E8D29B058A3332968654D6E73B
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.3424904761.0000000003264000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:12.8%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:1%
                                                              Total number of Nodes:308
                                                              Total number of Limit Nodes:18
                                                              execution_graph 39776 4a07280 39777 4a072ad 39776->39777 39798 4a06e70 39777->39798 39779 4a0731c 39803 4a06e80 39779->39803 39781 4a0734e 39782 4a06e70 CreateWindowExW 39781->39782 39783 4a073b2 39782->39783 39784 4a06e80 CreateWindowExW 39783->39784 39785 4a073e4 39784->39785 39786 4a06e80 CreateWindowExW 39785->39786 39787 4a074ac 39786->39787 39788 4a06e70 CreateWindowExW 39787->39788 39789 4a074de 39788->39789 39790 4a06e80 CreateWindowExW 39789->39790 39791 4a07542 39790->39791 39792 4a06e70 CreateWindowExW 39791->39792 39793 4a07574 39792->39793 39794 4a06e80 CreateWindowExW 39793->39794 39795 4a075d8 39794->39795 39796 4a06e70 CreateWindowExW 39795->39796 39797 4a0760a 39796->39797 39799 4a06e7b 39798->39799 39800 4a094fb 39799->39800 39807 867714 39799->39807 39811 869091 39799->39811 39800->39779 39804 4a06e8b 39803->39804 39866 4a06fec 39804->39866 39806 4a0a36f 39806->39781 39809 86771f 39807->39809 39808 869391 39808->39800 39809->39808 39815 86d6f0 39809->39815 39813 8690cb 39811->39813 39812 869391 39812->39800 39813->39812 39814 86d6f0 CreateWindowExW 39813->39814 39814->39812 39817 86d711 39815->39817 39816 86d735 39816->39808 39817->39816 39819 86dca8 39817->39819 39821 86dcb5 39819->39821 39820 86dcef 39820->39816 39821->39820 39823 86da80 39821->39823 39825 86da8b 39823->39825 39824 86e600 39825->39824 39827 86dbac 39825->39827 39828 86dbb7 39827->39828 39829 867714 CreateWindowExW 39828->39829 39830 86e66f 39829->39830 39834 4a00528 39830->39834 39840 4a00510 39830->39840 39831 86e6a9 39831->39824 39836 4a00659 39834->39836 39837 4a00559 39834->39837 39835 4a00565 39835->39831 39836->39831 39837->39835 39846 4a01380 39837->39846 39851 4a0136f 39837->39851 39842 4a00659 39840->39842 39843 4a00559 39840->39843 39841 4a00565 39841->39831 39842->39831 39843->39841 39844 4a01380 CreateWindowExW 39843->39844 39845 4a0136f CreateWindowExW 39843->39845 39844->39842 39845->39842 39847 4a013ab 39846->39847 39848 4a0145a 39847->39848 39856 4a02660 39847->39856 39859 4a02551 39847->39859 39852 4a013ab 39851->39852 39853 4a0145a 39852->39853 39854 4a02660 CreateWindowExW 39852->39854 39855 4a02551 CreateWindowExW 39852->39855 39854->39853 39855->39853 39857 4a02695 39856->39857 39862 4a01a98 39856->39862 39857->39848 39860 4a01a98 CreateWindowExW 39859->39860 39861 4a02695 39860->39861 39861->39848 39863 4a026b0 CreateWindowExW 39862->39863 39865 4a027d4 39863->39865 39865->39865 39867 4a06ff7 39866->39867 39868 4a0a3a2 39867->39868 39869 867714 CreateWindowExW 39867->39869 39870 869091 CreateWindowExW 39867->39870 39868->39806 39869->39868 39870->39868 39914 4a04c50 39915 4a04c7a 39914->39915 39917 4a04cae 39915->39917 39918 4a04cc2 39917->39918 39919 4a04d6c 39917->39919 39920 4a04d1a CallWindowProcW 39918->39920 39922 4a04cc9 39918->39922 39923 4a01ac4 39919->39923 39920->39922 39924 4a01acf 39923->39924 39926 4a03629 39924->39926 39927 4a01bec CallWindowProcW 39924->39927 39927->39926 39769 6bd8468 39770 6bd85f3 39769->39770 39771 6bd848e 39769->39771 39771->39770 39773 6bd8060 39771->39773 39774 6bd86e8 PostMessageW 39773->39774 39775 6bd8754 39774->39775 39775->39771 39928 69d01c 39929 69d034 39928->39929 39930 69d08e 39929->39930 39931 4a01ac4 CallWindowProcW 39929->39931 39935 4a02868 39929->39935 39939 4a035c8 39929->39939 39943 4a02857 39929->39943 39931->39930 39936 4a0288e 39935->39936 39937 4a01ac4 CallWindowProcW 39936->39937 39938 4a028af 39937->39938 39938->39930 39941 4a03605 39939->39941 39942 4a03629 39941->39942 39947 4a01bec CallWindowProcW 39941->39947 39944 4a0288e 39943->39944 39945 4a01ac4 CallWindowProcW 39944->39945 39946 4a028af 39945->39946 39946->39930 39947->39942 39948 6bd49c8 39949 6bd49ce 39948->39949 39950 6bd4974 39948->39950 39950->39949 39954 6bd6df8 39950->39954 39959 6bd6de8 39950->39959 39951 6bd4c2b 39955 6bd6e0d 39954->39955 39964 6bd6e29 39955->39964 39983 6bd6e96 39955->39983 39956 6bd6e1f 39956->39951 39960 6bd6df8 39959->39960 39962 6bd6e29 12 API calls 39960->39962 39963 6bd6e96 12 API calls 39960->39963 39961 6bd6e1f 39961->39951 39962->39961 39963->39961 39965 6bd6e52 39964->39965 40003 6bd72b8 39965->40003 40009 6bd79f8 39965->40009 40018 6bd7400 39965->40018 40023 6bd76a6 39965->40023 40028 6bd7907 39965->40028 40037 6bd732a 39965->40037 40042 6bd724a 39965->40042 40047 6bd75a9 39965->40047 40052 6bd734e 39965->40052 40057 6bd746c 39965->40057 40062 6bd75d2 39965->40062 40067 6bd72d0 39965->40067 40072 6bd74b1 39965->40072 40077 6bd7574 39965->40077 40081 6bd7614 39965->40081 40087 6bd753b 39965->40087 39966 6bd6e76 39966->39956 39984 6bd6e24 39983->39984 39986 6bd6e99 39983->39986 39987 6bd79f8 4 API calls 39984->39987 39988 6bd72b8 2 API calls 39984->39988 39989 6bd753b 2 API calls 39984->39989 39990 6bd7614 2 API calls 39984->39990 39991 6bd7574 2 API calls 39984->39991 39992 6bd74b1 2 API calls 39984->39992 39993 6bd72d0 2 API calls 39984->39993 39994 6bd75d2 2 API calls 39984->39994 39995 6bd746c 2 API calls 39984->39995 39996 6bd734e 2 API calls 39984->39996 39997 6bd75a9 2 API calls 39984->39997 39998 6bd724a 2 API calls 39984->39998 39999 6bd732a 2 API calls 39984->39999 40000 6bd7907 4 API calls 39984->40000 40001 6bd76a6 2 API calls 39984->40001 40002 6bd7400 2 API calls 39984->40002 39985 6bd6e76 39985->39956 39986->39956 39987->39985 39988->39985 39989->39985 39990->39985 39991->39985 39992->39985 39993->39985 39994->39985 39995->39985 39996->39985 39997->39985 39998->39985 39999->39985 40000->39985 40001->39985 40002->39985 40004 6bd7234 40003->40004 40005 6bd724b 40003->40005 40004->39966 40091 6bd4494 40005->40091 40095 6bd44a0 40005->40095 40010 6bd791e 40009->40010 40012 6bd7336 40009->40012 40099 6bd4218 40010->40099 40103 6bd4210 40010->40103 40011 6bd7a8c 40012->40011 40107 6bd4078 40012->40107 40111 6bd4080 40012->40111 40013 6bd7bd7 40019 6bd7409 40018->40019 40021 6bd4218 WriteProcessMemory 40019->40021 40022 6bd4210 WriteProcessMemory 40019->40022 40020 6bd7b50 40021->40020 40022->40020 40024 6bd76b6 40023->40024 40026 6bd4218 WriteProcessMemory 40024->40026 40027 6bd4210 WriteProcessMemory 40024->40027 40025 6bd7cec 40026->40025 40027->40025 40029 6bd790d 40028->40029 40033 6bd4218 WriteProcessMemory 40029->40033 40034 6bd4210 WriteProcessMemory 40029->40034 40030 6bd7a8c 40031 6bd7336 40031->40030 40035 6bd4078 Wow64SetThreadContext 40031->40035 40036 6bd4080 Wow64SetThreadContext 40031->40036 40032 6bd7bd7 40033->40031 40034->40031 40035->40032 40036->40032 40038 6bd7336 40037->40038 40040 6bd4078 Wow64SetThreadContext 40038->40040 40041 6bd4080 Wow64SetThreadContext 40038->40041 40039 6bd7bd7 40040->40039 40041->40039 40043 6bd7254 40042->40043 40045 6bd4494 CreateProcessA 40043->40045 40046 6bd44a0 CreateProcessA 40043->40046 40044 6bd730b 40044->39966 40045->40044 40046->40044 40049 6bd73c0 40047->40049 40048 6bd7d1a 40048->39966 40049->39966 40049->40048 40115 6bd3b98 40049->40115 40119 6bd3b90 40049->40119 40053 6bd735b 40052->40053 40053->39966 40054 6bd7d1a 40053->40054 40055 6bd3b98 ResumeThread 40053->40055 40056 6bd3b90 ResumeThread 40053->40056 40054->39966 40055->40053 40056->40053 40058 6bd73c0 40057->40058 40058->39966 40059 6bd7d1a 40058->40059 40060 6bd3b98 ResumeThread 40058->40060 40061 6bd3b90 ResumeThread 40058->40061 40059->39966 40060->40058 40061->40058 40063 6bd7336 40062->40063 40063->40062 40065 6bd4078 Wow64SetThreadContext 40063->40065 40066 6bd4080 Wow64SetThreadContext 40063->40066 40064 6bd7bd7 40065->40064 40066->40064 40068 6bd72dd 40067->40068 40069 6bd730b 40068->40069 40070 6bd4494 CreateProcessA 40068->40070 40071 6bd44a0 CreateProcessA 40068->40071 40069->39966 40070->40069 40071->40069 40073 6bd74b7 40072->40073 40123 6bd4308 40073->40123 40127 6bd4300 40073->40127 40074 6bd74dd 40074->39966 40131 6bd4150 40077->40131 40135 6bd4158 40077->40135 40078 6bd7592 40082 6bd7620 40081->40082 40083 6bd7b23 40082->40083 40085 6bd4078 Wow64SetThreadContext 40082->40085 40086 6bd4080 Wow64SetThreadContext 40082->40086 40083->39966 40084 6bd7bd7 40085->40084 40086->40084 40089 6bd4078 Wow64SetThreadContext 40087->40089 40090 6bd4080 Wow64SetThreadContext 40087->40090 40088 6bd7555 40089->40088 40090->40088 40092 6bd4529 CreateProcessA 40091->40092 40094 6bd46eb 40092->40094 40094->40094 40096 6bd4529 CreateProcessA 40095->40096 40098 6bd46eb 40096->40098 40098->40098 40100 6bd4260 WriteProcessMemory 40099->40100 40102 6bd42b7 40100->40102 40102->40012 40104 6bd4218 WriteProcessMemory 40103->40104 40106 6bd42b7 40104->40106 40106->40012 40108 6bd4080 Wow64SetThreadContext 40107->40108 40110 6bd410d 40108->40110 40110->40013 40112 6bd40c5 Wow64SetThreadContext 40111->40112 40114 6bd410d 40112->40114 40114->40013 40116 6bd3bd8 ResumeThread 40115->40116 40118 6bd3c09 40116->40118 40118->40049 40120 6bd3b98 ResumeThread 40119->40120 40122 6bd3c09 40120->40122 40122->40049 40124 6bd4353 ReadProcessMemory 40123->40124 40126 6bd4397 40124->40126 40126->40074 40128 6bd4308 ReadProcessMemory 40127->40128 40130 6bd4397 40128->40130 40130->40074 40132 6bd4158 VirtualAllocEx 40131->40132 40134 6bd41d5 40132->40134 40134->40078 40136 6bd4198 VirtualAllocEx 40135->40136 40138 6bd41d5 40136->40138 40138->40078 39747 86ddc0 39748 86de06 39747->39748 39751 86dfa0 39748->39751 39754 86db48 39751->39754 39755 86e008 DuplicateHandle 39754->39755 39756 86def3 39755->39756 39871 86bd20 39872 86bd62 39871->39872 39873 86bd68 GetModuleHandleW 39871->39873 39872->39873 39874 86bd95 39873->39874 40139 4a0a35c 40140 4a0a360 40139->40140 40141 4a06fec CreateWindowExW 40140->40141 40142 4a0a36f 40141->40142 39875 864668 39876 86467a 39875->39876 39877 864686 39876->39877 39881 864778 39876->39881 39886 864204 39877->39886 39879 8646a5 39882 86479d 39881->39882 39890 864888 39882->39890 39894 864878 39882->39894 39887 86420f 39886->39887 39902 8673dc 39887->39902 39889 867a7b 39889->39879 39892 8648af 39890->39892 39891 86498c 39892->39891 39898 864514 39892->39898 39896 8648af 39894->39896 39895 86498c 39896->39895 39897 864514 CreateActCtxA 39896->39897 39897->39895 39899 865918 CreateActCtxA 39898->39899 39901 8659db 39899->39901 39903 8673e7 39902->39903 39906 8676b4 39903->39906 39905 867d9d 39905->39889 39907 8676bf 39906->39907 39910 8676e4 39907->39910 39909 867e7a 39909->39905 39911 8676ef 39910->39911 39912 867714 CreateWindowExW 39911->39912 39913 867f6d 39912->39913 39913->39909 39757 6870948 39761 6870978 39757->39761 39765 6870980 39757->39765 39758 6870965 39762 6870980 DrawTextExW 39761->39762 39764 6870a26 39762->39764 39764->39758 39766 68709ce DrawTextExW 39765->39766 39768 6870a26 39766->39768 39768->39758

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 131 8679d9-867a0a 132 867a11-867a5e 131->132 133 867a0c 131->133 135 867a68-867a80 call 8673dc call 8673ec 132->135 133->132 139 867a85-867ab6 135->139 140 867ab8-867af6 139->140 141 867af9-867b0b 139->141 140->141 145 867b13-867b2e 141->145 146 867b30-867b68 145->146 147 867b6b-867bd9 call 8601e0 145->147 146->147 159 867be3-867bf2 147->159 160 867bfa-867d01 call 8673fc * 12 call 8676a4 159->160
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2188405410.0000000000860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_860000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: @Ch$@Ch
                                                              • API String ID: 0-1042198092
                                                              • Opcode ID: 907ddccaba8e040644901581c493eac6b420038162f6268335dc714bf2763943
                                                              • Instruction ID: 0ccb3098da640b2ab8e10beb84c8f2cf1f6e2cc0271292a10c98d854d00d1dad
                                                              • Opcode Fuzzy Hash: 907ddccaba8e040644901581c493eac6b420038162f6268335dc714bf2763943
                                                              • Instruction Fuzzy Hash: EFB1E774E01218CFDB08DFA9D8849AEBBF2FF89304F158569D408AB365DB359946DF40

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 187 864204-867a0a 190 867a11-867ab6 call 8673dc call 8673ec 187->190 191 867a0c 187->191 198 867ab8-867af6 190->198 199 867af9-867b2e 190->199 191->190 198->199 204 867b30-867b68 199->204 205 867b6b-867bf2 call 8601e0 199->205 204->205 218 867bfa-867d01 call 8673fc * 12 call 8676a4 205->218
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2188405410.0000000000860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_860000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: @Ch$@Ch
                                                              • API String ID: 0-1042198092
                                                              • Opcode ID: 80821484325296505cf485dd06b775a168ef5c696452f180787fdbb5a6d25845
                                                              • Instruction ID: f304051508b85d60e0bc9d4bb003cbd376ac2c8daf8c2bd55053c667b08fc412
                                                              • Opcode Fuzzy Hash: 80821484325296505cf485dd06b775a168ef5c696452f180787fdbb5a6d25845
                                                              • Instruction Fuzzy Hash: DCA1E974E01218CFDB08DFA9D8849AEBBF2FF89304F158569E408AB365DB359942DF50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 363dc0da3d48b9e0ea3dbb4f4fe4af7ec1e08b640eb4ab960f8c1c3e60e98656
                                                              • Instruction ID: d432b430737bd6c0282a9a5c1ca3158d497d47533c847675b2f8624be10f5f86
                                                              • Opcode Fuzzy Hash: 363dc0da3d48b9e0ea3dbb4f4fe4af7ec1e08b640eb4ab960f8c1c3e60e98656
                                                              • Instruction Fuzzy Hash: 62327E30E002188FEB54DFA8C8547AEBBF2AF88700F14856AD54AEB395DB349D45CB95
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7f6fd743670498b54c8cf3e5ca9038daf6f9621c8cb94e7c02466925bab4e7eb
                                                              • Instruction ID: 7ece38fa5dcc9f672497315d53c270eb7740311d3d50cc53fee8d716280cee00
                                                              • Opcode Fuzzy Hash: 7f6fd743670498b54c8cf3e5ca9038daf6f9621c8cb94e7c02466925bab4e7eb
                                                              • Instruction Fuzzy Hash: C5C14931E002588FDF54CFA9C88479DBBF2AF88314F18C5AAD589AB655DB30E985CF50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b94b6d8d6ea5b28ab2c1843adb2503469dbaee290f7ee574ef801411873e57d1
                                                              • Instruction ID: 9ea634cfb1e8d1c8c67145e4cf7f1cfebdcad3c19e33353f8fa6eab1cedb3eee
                                                              • Opcode Fuzzy Hash: b94b6d8d6ea5b28ab2c1843adb2503469dbaee290f7ee574ef801411873e57d1
                                                              • Instruction Fuzzy Hash: 46A19135E00319DFCB04DFA4D898ADDBBBAFF89310F158659E416AB2A0DB70AD41CB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 159f1de732af2ea6e183b3bbb5afc63c02b2580e4723458618267628bc9f2203
                                                              • Instruction ID: 6f197c5ec59b8ea873c763734be1eace8f0063e8349d11c34b72f06be6bb1cbe
                                                              • Opcode Fuzzy Hash: 159f1de732af2ea6e183b3bbb5afc63c02b2580e4723458618267628bc9f2203
                                                              • Instruction Fuzzy Hash: 94918135E0035ADFCB04DFA0D8949DDBBBAFF89310F158655E416AB2A4EB70A981CB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9d36f52397275a94641f283fbeb9faad96eb2d5e369d38810d8e26ce8b83bc0
                                                              • Instruction ID: 1cd4e4ecec9e93f5772f7da5417cf8247e736f4aa88b93163ae7f573a413bbe2
                                                              • Opcode Fuzzy Hash: e9d36f52397275a94641f283fbeb9faad96eb2d5e369d38810d8e26ce8b83bc0
                                                              • Instruction Fuzzy Hash: 08918135E0035A9FCB04DFA0DC949DDFBBAFF89310B158655E416AB2A4EB70A981CB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 053b13572ba9321964e67b833f7de16e69f1da0c1db8e7ef1ad4ae79c57dbb93
                                                              • Instruction ID: 0d6324a8e221719447b8f9c6683fa973a3cdf95feab1eed579a0fdf855ba7f7c
                                                              • Opcode Fuzzy Hash: 053b13572ba9321964e67b833f7de16e69f1da0c1db8e7ef1ad4ae79c57dbb93
                                                              • Instruction Fuzzy Hash: 3191CF70D0521CCFEF94DFAAD8457AEBBB6FB49304F108069D519A7261DB349985CF80
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 398e36d103cc3a23fddc8373fa8ee04a3da8d6e9742dd62ae85dff3f34f6d193
                                                              • Instruction ID: b018689b8d18843d415fd4dd10c94b3b39c0ca121b33fee9173f28d678ad8563
                                                              • Opcode Fuzzy Hash: 398e36d103cc3a23fddc8373fa8ee04a3da8d6e9742dd62ae85dff3f34f6d193
                                                              • Instruction Fuzzy Hash: 0F21D5B1D042588BEB58CFA6C8487EEBBF6BF89300F04C0AAD609B6254DB744945CF90
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ed042335193658657493399c1054323ceaa21341d1637a6f4c70b91d4aef2278
                                                              • Instruction ID: 295b71a95bc0b9f141e0361bf5a734d35db3f5af0b13ddcb5ea42849776ce99e
                                                              • Opcode Fuzzy Hash: ed042335193658657493399c1054323ceaa21341d1637a6f4c70b91d4aef2278
                                                              • Instruction Fuzzy Hash: 6D21F6B1D046588FEB58CFA6C9483DEBBF3AF89300F04C1AAD509B6264DB740945CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 6bd4494-6bd4535 2 6bd456e-6bd458e 0->2 3 6bd4537-6bd4541 0->3 10 6bd45c7-6bd45f6 2->10 11 6bd4590-6bd459a 2->11 3->2 4 6bd4543-6bd4545 3->4 5 6bd4568-6bd456b 4->5 6 6bd4547-6bd4551 4->6 5->2 8 6bd4555-6bd4564 6->8 9 6bd4553 6->9 8->8 12 6bd4566 8->12 9->8 17 6bd462f-6bd46e9 CreateProcessA 10->17 18 6bd45f8-6bd4602 10->18 11->10 13 6bd459c-6bd459e 11->13 12->5 15 6bd45c1-6bd45c4 13->15 16 6bd45a0-6bd45aa 13->16 15->10 19 6bd45ac 16->19 20 6bd45ae-6bd45bd 16->20 31 6bd46eb-6bd46f1 17->31 32 6bd46f2-6bd4778 17->32 18->17 21 6bd4604-6bd4606 18->21 19->20 20->20 22 6bd45bf 20->22 23 6bd4629-6bd462c 21->23 24 6bd4608-6bd4612 21->24 22->15 23->17 26 6bd4614 24->26 27 6bd4616-6bd4625 24->27 26->27 27->27 28 6bd4627 27->28 28->23 31->32 42 6bd4788-6bd478c 32->42 43 6bd477a-6bd477e 32->43 45 6bd479c-6bd47a0 42->45 46 6bd478e-6bd4792 42->46 43->42 44 6bd4780 43->44 44->42 48 6bd47b0-6bd47b4 45->48 49 6bd47a2-6bd47a6 45->49 46->45 47 6bd4794 46->47 47->45 51 6bd47c6-6bd47cd 48->51 52 6bd47b6-6bd47bc 48->52 49->48 50 6bd47a8 49->50 50->48 53 6bd47cf-6bd47de 51->53 54 6bd47e4 51->54 52->51 53->54 56 6bd47e5 54->56 56->56
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06BD46D6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID: U
                                                              • API String ID: 963392458-3372436214
                                                              • Opcode ID: a25c95112eb3a3c06836193000d04d040c058866880aed066149302842b9ab57
                                                              • Instruction ID: 5718cb892019b3f17a7500fd418e51a7e864f336d8d32446bf2c19e370edd51f
                                                              • Opcode Fuzzy Hash: a25c95112eb3a3c06836193000d04d040c058866880aed066149302842b9ab57
                                                              • Instruction Fuzzy Hash: 8EA15BB1D00219DFEB64CF68C8417DEBBF2FB44314F0485A9E949AB240EB749985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1152 6bd44a0-6bd4535 1154 6bd456e-6bd458e 1152->1154 1155 6bd4537-6bd4541 1152->1155 1162 6bd45c7-6bd45f6 1154->1162 1163 6bd4590-6bd459a 1154->1163 1155->1154 1156 6bd4543-6bd4545 1155->1156 1157 6bd4568-6bd456b 1156->1157 1158 6bd4547-6bd4551 1156->1158 1157->1154 1160 6bd4555-6bd4564 1158->1160 1161 6bd4553 1158->1161 1160->1160 1164 6bd4566 1160->1164 1161->1160 1169 6bd462f-6bd46e9 CreateProcessA 1162->1169 1170 6bd45f8-6bd4602 1162->1170 1163->1162 1165 6bd459c-6bd459e 1163->1165 1164->1157 1167 6bd45c1-6bd45c4 1165->1167 1168 6bd45a0-6bd45aa 1165->1168 1167->1162 1171 6bd45ac 1168->1171 1172 6bd45ae-6bd45bd 1168->1172 1183 6bd46eb-6bd46f1 1169->1183 1184 6bd46f2-6bd4778 1169->1184 1170->1169 1173 6bd4604-6bd4606 1170->1173 1171->1172 1172->1172 1174 6bd45bf 1172->1174 1175 6bd4629-6bd462c 1173->1175 1176 6bd4608-6bd4612 1173->1176 1174->1167 1175->1169 1178 6bd4614 1176->1178 1179 6bd4616-6bd4625 1176->1179 1178->1179 1179->1179 1180 6bd4627 1179->1180 1180->1175 1183->1184 1194 6bd4788-6bd478c 1184->1194 1195 6bd477a-6bd477e 1184->1195 1197 6bd479c-6bd47a0 1194->1197 1198 6bd478e-6bd4792 1194->1198 1195->1194 1196 6bd4780 1195->1196 1196->1194 1200 6bd47b0-6bd47b4 1197->1200 1201 6bd47a2-6bd47a6 1197->1201 1198->1197 1199 6bd4794 1198->1199 1199->1197 1203 6bd47c6-6bd47cd 1200->1203 1204 6bd47b6-6bd47bc 1200->1204 1201->1200 1202 6bd47a8 1201->1202 1202->1200 1205 6bd47cf-6bd47de 1203->1205 1206 6bd47e4 1203->1206 1204->1203 1205->1206 1208 6bd47e5 1206->1208 1208->1208
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06BD46D6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 1cd4139287ae6cb550ef5c7a105bf743e460b588d1aa7bcdc35f0f7cf04debf0
                                                              • Instruction ID: 1c33b3207ab6eed6b5c584d74c150d850c004fb7426e877a66cadc789f4ae6b4
                                                              • Opcode Fuzzy Hash: 1cd4139287ae6cb550ef5c7a105bf743e460b588d1aa7bcdc35f0f7cf04debf0
                                                              • Instruction Fuzzy Hash: AA913AB1D00219DFEB54CF68C8417DEBAF2FB49314F1485A9E909AB240EB749985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1209 4a026a4-4a02716 1211 4a02721-4a02728 1209->1211 1212 4a02718-4a0271e 1209->1212 1213 4a02733-4a0276b 1211->1213 1214 4a0272a-4a02730 1211->1214 1212->1211 1215 4a02773-4a027d2 CreateWindowExW 1213->1215 1214->1213 1216 4a027d4-4a027da 1215->1216 1217 4a027db-4a02813 1215->1217 1216->1217 1221 4a02820 1217->1221 1222 4a02815-4a02818 1217->1222 1223 4a02821 1221->1223 1222->1221 1223->1223
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04A027C2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 48ee302bc49058535a281b5a0b14d077a3a162f31240585ee05f01ef6cf24c15
                                                              • Instruction ID: 3152eed71af03533b41a4d166a451a58ed918380b1b0f2723606a58c2ece0fbf
                                                              • Opcode Fuzzy Hash: 48ee302bc49058535a281b5a0b14d077a3a162f31240585ee05f01ef6cf24c15
                                                              • Instruction Fuzzy Hash: 1851C1B5D00349AFDB14CFA9D884ADEBBF5FF48314F24816AE818AB250D774A845CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1224 4a01a98-4a02716 1226 4a02721-4a02728 1224->1226 1227 4a02718-4a0271e 1224->1227 1228 4a02733-4a027d2 CreateWindowExW 1226->1228 1229 4a0272a-4a02730 1226->1229 1227->1226 1231 4a027d4-4a027da 1228->1231 1232 4a027db-4a02813 1228->1232 1229->1228 1231->1232 1236 4a02820 1232->1236 1237 4a02815-4a02818 1232->1237 1238 4a02821 1236->1238 1237->1236 1238->1238
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04A027C2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 70340c4d0e33784545c932725569806e70e8489f0549c2c085839652c9fa0e7b
                                                              • Instruction ID: dd59c0e2bd552abb15f7aeacae5816f7b6e6f01ecc38852e678347f4ad5f093c
                                                              • Opcode Fuzzy Hash: 70340c4d0e33784545c932725569806e70e8489f0549c2c085839652c9fa0e7b
                                                              • Instruction Fuzzy Hash: 6751C0B5D00349EFDB14CFA9D884ADEBBB5FF48314F24816AE819AB250D774A845CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1239 86590c-8659d9 CreateActCtxA 1241 8659e2-865a3c 1239->1241 1242 8659db-8659e1 1239->1242 1249 865a3e-865a41 1241->1249 1250 865a4b-865a4f 1241->1250 1242->1241 1249->1250 1251 865a60 1250->1251 1252 865a51-865a5d 1250->1252 1254 865a61 1251->1254 1252->1251 1254->1254
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 008659C9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2188405410.0000000000860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_860000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 7ef48638202040790fa42612749572e258cc752415e775b733d0f0382c22afc7
                                                              • Instruction ID: 30cb4bbf34196e4d5b3370d97cdf4b64801593d0dc1fdfd24dff7a0868faf953
                                                              • Opcode Fuzzy Hash: 7ef48638202040790fa42612749572e258cc752415e775b733d0f0382c22afc7
                                                              • Instruction Fuzzy Hash: 9B41CEB0C00719CAEB24CFA9C984BDEBBB5FF88704F20816AD419AB251DB756946CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1255 864514-8659d9 CreateActCtxA 1258 8659e2-865a3c 1255->1258 1259 8659db-8659e1 1255->1259 1266 865a3e-865a41 1258->1266 1267 865a4b-865a4f 1258->1267 1259->1258 1266->1267 1268 865a60 1267->1268 1269 865a51-865a5d 1267->1269 1271 865a61 1268->1271 1269->1268 1271->1271
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 008659C9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2188405410.0000000000860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_860000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 849503a81e2a9c71d32b555b7c9a63b98279ddf490df45803c00e57ca7195e95
                                                              • Instruction ID: e883161949717445e3c6e6dfccb2688f9fd3b00bc748935591110bbccd3ec4b1
                                                              • Opcode Fuzzy Hash: 849503a81e2a9c71d32b555b7c9a63b98279ddf490df45803c00e57ca7195e95
                                                              • Instruction Fuzzy Hash: 8B41E270C0071DCBEB24CFA9C984B9EBBB5FF48704F20816AD408AB251DBB56945CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1272 4a04cae-4a04cbc 1273 4a04cc2-4a04cc7 1272->1273 1274 4a04d6c-4a04d8c call 4a01ac4 1272->1274 1275 4a04cc9-4a04d00 1273->1275 1276 4a04d1a-4a04d52 CallWindowProcW 1273->1276 1282 4a04d8f-4a04d9c 1274->1282 1283 4a04d02-4a04d08 1275->1283 1284 4a04d09-4a04d18 1275->1284 1278 4a04d54-4a04d5a 1276->1278 1279 4a04d5b-4a04d6a 1276->1279 1278->1279 1279->1282 1283->1284 1284->1282
                                                              APIs
                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 04A04D41
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID:
                                                              • API String ID: 2714655100-0
                                                              • Opcode ID: c0d3f7bdfc1f39a1fdb2df02495b4a4bf068289fa9a3f66222e0b88f1a80ccc6
                                                              • Instruction ID: e73439caec80f594b6e069bbcd5490fac15fa7accb97562a692a2c3e2856ee6a
                                                              • Opcode Fuzzy Hash: c0d3f7bdfc1f39a1fdb2df02495b4a4bf068289fa9a3f66222e0b88f1a80ccc6
                                                              • Instruction Fuzzy Hash: 543136B5A003059FDB14CF89C448BAABBF5FF8C314F24C599D519AB361D374A841CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1287 6870978-68709cc 1289 68709d7-68709e6 1287->1289 1290 68709ce-68709d4 1287->1290 1291 68709eb-6870a24 DrawTextExW 1289->1291 1292 68709e8 1289->1292 1290->1289 1293 6870a26-6870a2c 1291->1293 1294 6870a2d-6870a4a 1291->1294 1292->1291 1293->1294
                                                              APIs
                                                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06870A17
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: DrawText
                                                              • String ID:
                                                              • API String ID: 2175133113-0
                                                              • Opcode ID: a5651d73412af7b0103c037d13dad4573e0f27ec68188993a092507d097f3509
                                                              • Instruction ID: 6efd5f90ef92e3633de99df277135ab0c1a631e902929b30176355787e2c906f
                                                              • Opcode Fuzzy Hash: a5651d73412af7b0103c037d13dad4573e0f27ec68188993a092507d097f3509
                                                              • Instruction Fuzzy Hash: 6331D2B6D003499FDB10CF9AD880ADEFBF5FF48224F14842AE519A7210D775A954CFA0
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06BD42A8
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: d727af65c60cbff7333654dbb0681981596c855388c48cd68627fd3c3a0b5ba4
                                                              • Instruction ID: ac689116f169dff505b52fe79069cae058299e5707c70d5e90b362be88b9a455
                                                              • Opcode Fuzzy Hash: d727af65c60cbff7333654dbb0681981596c855388c48cd68627fd3c3a0b5ba4
                                                              • Instruction Fuzzy Hash: DB2146B29003599FDF10CFAAC885BDEBBF5FF48324F108429E918A7240D7799950CBA5
                                                              APIs
                                                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06870A17
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: DrawText
                                                              • String ID:
                                                              • API String ID: 2175133113-0
                                                              • Opcode ID: f418f1c5e69ebbb767b801d26b562ede6d57ed1be513af4c9ab67de65422abea
                                                              • Instruction ID: e954256e69b2dc20208fb715e208c95eb6035660e4c1048eb98a0921d988dc6e
                                                              • Opcode Fuzzy Hash: f418f1c5e69ebbb767b801d26b562ede6d57ed1be513af4c9ab67de65422abea
                                                              • Instruction Fuzzy Hash: 8221CEB5D003499FDB10CF9AD880ADEFBF5FB48324F14842AE919A7210D774A954CFA0
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06BD42A8
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 6317f48071880e0f76930645a7d331688ce282f7ce9c3e01aecb52da5aecef4a
                                                              • Instruction ID: c8c3de0d3eebb64a254bfbf523587b55be6052630fc8656d34188deb6e0a95f7
                                                              • Opcode Fuzzy Hash: 6317f48071880e0f76930645a7d331688ce282f7ce9c3e01aecb52da5aecef4a
                                                              • Instruction Fuzzy Hash: 9E2126B19003499FDF10CFA9C885BDEBBF5FF48324F108429E918A7240D7789954CBA5
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06BD4388
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 38ac2951e73877413af751d50eb5b88d5aab51cd21a6a8199c213e5f789b74b2
                                                              • Instruction ID: 97f172b6ac5f289ec6500afeccecf6e4b8632cb68ced2043881e6e85ae1f3505
                                                              • Opcode Fuzzy Hash: 38ac2951e73877413af751d50eb5b88d5aab51cd21a6a8199c213e5f789b74b2
                                                              • Instruction Fuzzy Hash: 7A2125B19003599FDB10CFAAC881ADEFBF5FF48320F108429E518A7240D7799500CBA5
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06BD40FE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 23c793d476fa47af79f5530169ffa15a171c736752a9cd29707b63b058d0a4cf
                                                              • Instruction ID: 214633b0cf49788bda609442dd59f81c1c9b950c17389a1142cbc56b88376925
                                                              • Opcode Fuzzy Hash: 23c793d476fa47af79f5530169ffa15a171c736752a9cd29707b63b058d0a4cf
                                                              • Instruction Fuzzy Hash: 972138B1D003099FDB10CFAAC8857EEBBF4EF88324F148429D519A7241DB78A945CFA5
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0086DFCE,?,?,?,?,?), ref: 0086E08F
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2188405410.0000000000860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_860000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 1bad214961296f344b9aa52cd2b30be0b61b7ded34fd8e61cfbdd443658929cb
                                                              • Instruction ID: ebf2ac2161f0b4c49aaa5b4be6d907911a42148f29dade7f90b943167402ce4c
                                                              • Opcode Fuzzy Hash: 1bad214961296f344b9aa52cd2b30be0b61b7ded34fd8e61cfbdd443658929cb
                                                              • Instruction Fuzzy Hash: 9721E5B5900649AFDB10CFAAD984ADEBFF8FB48314F14841AE914A3351D374A954CFA1
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06BD4388
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: bec6f8d6bb335dd1add72b00445379e8cafd02fa8a0edb2e04b2d615d6c9c45a
                                                              • Instruction ID: 6b1f8b3d8aa98f7ec75c090f671b473c5199f1dc01831b8fd3b6961543389fa8
                                                              • Opcode Fuzzy Hash: bec6f8d6bb335dd1add72b00445379e8cafd02fa8a0edb2e04b2d615d6c9c45a
                                                              • Instruction Fuzzy Hash: 2521F8B19003599FDB10DFAAC881BDEFBF5FF48320F108429E519A7240D7799550DBA5
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06BD40FE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 9a0838163949670a98b50728343ac24abc71102eacfdc303615f459d18e94456
                                                              • Instruction ID: cb16177a1b94cc994eeed8f25095fdd0affb92d38f16f6b809a3b91b14f88c3c
                                                              • Opcode Fuzzy Hash: 9a0838163949670a98b50728343ac24abc71102eacfdc303615f459d18e94456
                                                              • Instruction Fuzzy Hash: CD2149B1D003098FDB10CFAAC8857EEBBF4EF88324F148429D519A7240DB78A944CFA5
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06BD41C6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 365505aba32c76b01e90306eaed80b1a1c053f196126434436caf8324b7490fe
                                                              • Instruction ID: 57c025cdcc962ffaac2e31c849679f10246fa74f67efdd939b2c6f3117e56a63
                                                              • Opcode Fuzzy Hash: 365505aba32c76b01e90306eaed80b1a1c053f196126434436caf8324b7490fe
                                                              • Instruction Fuzzy Hash: AC1167728002499FDB20CFAAC844BDFBFF5EF88320F108819E519A7240C775A950CBA1
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06BD41C6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 6b0b3a3479ac5a2185936022790e7bc9da9aa328607c3dfec0e63f7f78041538
                                                              • Instruction ID: ad5a57207fd7026397b758c93eb6224cec5ce62b30921ef07d8d81dd3feca055
                                                              • Opcode Fuzzy Hash: 6b0b3a3479ac5a2185936022790e7bc9da9aa328607c3dfec0e63f7f78041538
                                                              • Instruction Fuzzy Hash: 631144729002499FDB10DFAAC844BDEBBF5EF88320F108819E519A7250C775A510CBA1
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 4b705b55fe01bcb1f462315b99e318da4138aeef0b361d2fb2de68889e478c8f
                                                              • Instruction ID: e2d6dcd803dffeeaa2cddc952aa0cd99127dbd5374158efb9eb53b07ea0a4f21
                                                              • Opcode Fuzzy Hash: 4b705b55fe01bcb1f462315b99e318da4138aeef0b361d2fb2de68889e478c8f
                                                              • Instruction Fuzzy Hash: 381158B1D003498FDB20DFAAC845BDEFBF5EF88624F248419D519A7240DB79A940CBA5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: d959cc34607fff4d34a8f7e9613613c431b44ffd637b567847d95df2b7f35077
                                                              • Instruction ID: ec2fbc370a92531173ca3c2c114a4288fc5b419e6d35662cf19ffc328b9c7e0d
                                                              • Opcode Fuzzy Hash: d959cc34607fff4d34a8f7e9613613c431b44ffd637b567847d95df2b7f35077
                                                              • Instruction Fuzzy Hash: FE113AB1D003498FDB10DFAAC84579EFBF5EF88724F248419D519A7240DB79A540CB95
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06BD8745
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: bd2efe5dcba2b5be86abffbcae0cbd27377e1e71befe4da922842d34cc151ab6
                                                              • Instruction ID: 24ee10ef0c8474f6e8fb35f67de78af9d120bcd0e3630ff5ded0b46c38c8e4b5
                                                              • Opcode Fuzzy Hash: bd2efe5dcba2b5be86abffbcae0cbd27377e1e71befe4da922842d34cc151ab6
                                                              • Instruction Fuzzy Hash: F81106B58003499FDB10CF99C845BDEBFF8FB48724F108459E518A7640D375A944CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06BD8745
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: c7e42f49c1ea0f132bb4e57b8534e9aaaa72f5f3a078381b8e5c8682c618ca1a
                                                              • Instruction ID: 2af795b5e48088fc38143a0c14ec593ab120464e3388c4c058ed7d8642a7ada0
                                                              • Opcode Fuzzy Hash: c7e42f49c1ea0f132bb4e57b8534e9aaaa72f5f3a078381b8e5c8682c618ca1a
                                                              • Instruction Fuzzy Hash: 9D1106B5900349DFDB50CF9AC944BDEBBF8FB48724F10845AE518A7200D375A944CFA1
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0086BD86
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2188405410.0000000000860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_860000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 7a7cb426eff8da33c80adaa3ee400739a81de561afda3412c1049ce484314ba0
                                                              • Instruction ID: 36b836ba4b741ccecbd7584d51bbafbec839a5600505d64faedd7225a3c66ef8
                                                              • Opcode Fuzzy Hash: 7a7cb426eff8da33c80adaa3ee400739a81de561afda3412c1049ce484314ba0
                                                              • Instruction Fuzzy Hash: 6D110FB6C003498FDB10DF9AC444A9EFBF4FF88724F10841AD418A7210D3B9A545CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187260454.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_68d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 032494c5f84f7671ee81ce609e8fa4a482d67170fa1f35cc2f5f340536474bd3
                                                              • Instruction ID: 04d28a24a179bb3469adda4c7fbbf8226c4be81636b6034e43918f38aec839e9
                                                              • Opcode Fuzzy Hash: 032494c5f84f7671ee81ce609e8fa4a482d67170fa1f35cc2f5f340536474bd3
                                                              • Instruction Fuzzy Hash: 8F210372504244EFDB05EF14D9D0B2ABF66FB88314F20C669EE090B296C376D916CBB1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187260454.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_68d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d2b496af812b6a76b6a868a0005ee83f569c38a612d2c4fede47b703dac2a590
                                                              • Instruction ID: 1b3cfacf3802b0d407ac621fc02d4d507bcb8db3b998ab463ab505749cc0eb4e
                                                              • Opcode Fuzzy Hash: d2b496af812b6a76b6a868a0005ee83f569c38a612d2c4fede47b703dac2a590
                                                              • Instruction Fuzzy Hash: 342128B2504240EFDB15EF14D9C0F26BF66FB84318F20C66AD9090B296C336D856CBB2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187354882.000000000069D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_69d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b95d51d7a3f835dc312dabe89eee82d5a4b3b365ddc3cb2b9ad016f5cf126133
                                                              • Instruction ID: 89df483cedd5c78ceac0d29d432f3d1e5346ae4d17b5e273f75d809c3668747f
                                                              • Opcode Fuzzy Hash: b95d51d7a3f835dc312dabe89eee82d5a4b3b365ddc3cb2b9ad016f5cf126133
                                                              • Instruction Fuzzy Hash: 1F210075604200EFDF14DF24D980B26BB6AFB84314F20C57DD90A0B792C37AD847CA61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187354882.000000000069D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_69d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc1e0a354bbd8500e6aeab804ad3960574d70bc97a674d5527ad2946650e21a8
                                                              • Instruction ID: 8ca39145e511fb6d10e529b8ceaf110d13c0064b3d7288698e2933a97650397a
                                                              • Opcode Fuzzy Hash: bc1e0a354bbd8500e6aeab804ad3960574d70bc97a674d5527ad2946650e21a8
                                                              • Instruction Fuzzy Hash: 5E212275504200EFDF04DF10D9C0B26BBAAFB84314F20C57DEA094B792C376D806CA61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187354882.000000000069D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_69d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1ace7b040e73204c37eb3833a4ac76e00350ac3efb98bc25b121f648e6c16aa6
                                                              • Instruction ID: 85ec32aae3e81f8be38fb41749111df3446e66959a01df67dbd880b6a1998107
                                                              • Opcode Fuzzy Hash: 1ace7b040e73204c37eb3833a4ac76e00350ac3efb98bc25b121f648e6c16aa6
                                                              • Instruction Fuzzy Hash: C9218E755083809FCB02CF14D994B15BFB6EB46314F24C5AAD8498B6A6C33AD806CB62
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187260454.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_68d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 45d2786e60e1e4201bb004dcd9f59ae96814e242b2a6b2dda49e09682ea99c03
                                                              • Instruction ID: 067f36b5c946d372cf59135decea2caa0f828f26711b84122a8a6b603f41db44
                                                              • Opcode Fuzzy Hash: 45d2786e60e1e4201bb004dcd9f59ae96814e242b2a6b2dda49e09682ea99c03
                                                              • Instruction Fuzzy Hash: A121E176404284CFCB06DF00D9C4B56BF72FB84314F24C2A9DD084B296C33AD926CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187260454.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_68d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                              • Instruction ID: bf4e24d6fbdaef3ff46e3eb8c79dfe80ed7bbfb9f501bb497f3e19b7d7721d71
                                                              • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                              • Instruction Fuzzy Hash: 7F11E6B6504280DFCB15DF10D5C4B5ABF72FB94318F24C6AAD8490B756C33AD856CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187354882.000000000069D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_69d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                              • Instruction ID: 9b4ca14285296876d9f9d811fb684f1ff27771952f62b1114789e011d1b32415
                                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                              • Instruction Fuzzy Hash: ED11BB75504280DFCB01CF10C6C0B55BBA2FB84324F24C6A9D9494B7A6C33AD80ACB61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187260454.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_68d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 21cb749d34062be455bf818870e44930e5f1dc125e6b8569a42ed1f8df84c6f2
                                                              • Instruction ID: 6376ed90336b2e2d6b2d76464e2c838dccbeb71dd86471d0f0609a4f2112f52c
                                                              • Opcode Fuzzy Hash: 21cb749d34062be455bf818870e44930e5f1dc125e6b8569a42ed1f8df84c6f2
                                                              • Instruction Fuzzy Hash: 76012672004384AAF7106E65CD84B67BF99DF81364F18C61AEE081A2C6D6B99841CBB1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2187260454.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_68d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 166fd2044c3bc99ff48577f94cdc609d9f7febe23847534e3e2f931131351969
                                                              • Instruction ID: 6d055fdcb16fc44141592ee8114f28f55aee7463c1f8cc6dbadfc807706dac54
                                                              • Opcode Fuzzy Hash: 166fd2044c3bc99ff48577f94cdc609d9f7febe23847534e3e2f931131351969
                                                              • Instruction Fuzzy Hash: 91F062724053449AE7109E16D984B66FF98EB91734F18C55AED085A2C6C279A844CBB1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L.H
                                                              • API String ID: 0-2555103419
                                                              • Opcode ID: baba1e272e16cbf6f092bf3e522509374ec2925d1a66f32b74f57a3807f0a970
                                                              • Instruction ID: bba986187c01654baed51a020551655efe49444f1fc2d35557eb48bb5404c3cf
                                                              • Opcode Fuzzy Hash: baba1e272e16cbf6f092bf3e522509374ec2925d1a66f32b74f57a3807f0a970
                                                              • Instruction Fuzzy Hash: ADE11DB4E002598FDB54DFA9C580AAEFBF2FF49304F248199D414AB356D730A942CF61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d5767484b1fdc0121223d3d3510d0c4c29439ece1170ead8af9a9b6c289a42a6
                                                              • Instruction ID: 301edc8d5a941441c7fd2c92fb3a326fc0302a1dbdca171148aa1accc3d91246
                                                              • Opcode Fuzzy Hash: d5767484b1fdc0121223d3d3510d0c4c29439ece1170ead8af9a9b6c289a42a6
                                                              • Instruction Fuzzy Hash: 68D1ADB0B016048FDB99EB7AC8607AEB7E6EF89300F1044ADE156DB391EB35D845CB51
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bbcd0b17ac5fe96f77186be6f8610873f80ef8a1292d1c64df1a5868b259c25f
                                                              • Instruction ID: e6cc58ed2f2ded5b36189955b09a4c335e5550e1217f3b8b6a5aac2513b81f94
                                                              • Opcode Fuzzy Hash: bbcd0b17ac5fe96f77186be6f8610873f80ef8a1292d1c64df1a5868b259c25f
                                                              • Instruction Fuzzy Hash: E11252F0C817458AE718CF65F94C1897BB1BB89328FD08A09D2616F2E5DBB8156ACF44
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 928907106adc040eae98ef93302d7fbc05bdb65fc7db12948018e69be4bf499b
                                                              • Instruction ID: 6e783dae437944c191d8147e294b56a7b09fe1fd1cb55ee51a309c0ab7e7aa4a
                                                              • Opcode Fuzzy Hash: 928907106adc040eae98ef93302d7fbc05bdb65fc7db12948018e69be4bf499b
                                                              • Instruction Fuzzy Hash: 8FE10EB4E001598FDB14DFA9C580AAEFBF2FF49304F248299D415AB356D7319942CF60
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f6e465db9ed2cfa700bace7dd1e8a0c516d06f417657127ff99b5c137798c168
                                                              • Instruction ID: dcccdbd72b7261f95a8b53c90778caf7c3284e40f03c4b13e1c62b869d568415
                                                              • Opcode Fuzzy Hash: f6e465db9ed2cfa700bace7dd1e8a0c516d06f417657127ff99b5c137798c168
                                                              • Instruction Fuzzy Hash: B0E10EB4E001598FDB14DFA9C590AAEFBF2FF49304F248199D914AB356D731A942CF60
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3377966a8087c119bdbdb16b8c9affb0c02f2f864cbbdbfa6641fd863b1df14
                                                              • Instruction ID: 1ab2f3febde3648632154a243e7e9f30c756e1de422dcead9a24f2b0de710df6
                                                              • Opcode Fuzzy Hash: e3377966a8087c119bdbdb16b8c9affb0c02f2f864cbbdbfa6641fd863b1df14
                                                              • Instruction Fuzzy Hash: F2E1FEB4E102598FDB54DF99C580AAEFBF2FF49304F2481A9D814AB356D731A942CF60
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b7279cc4d6f61b81cef908d095263734b11c6f28645cf3553541e9159346f335
                                                              • Instruction ID: 2fd3b6e926e593d0ad5cb110a9c5c2795809291e19247439008dce8b43653b16
                                                              • Opcode Fuzzy Hash: b7279cc4d6f61b81cef908d095263734b11c6f28645cf3553541e9159346f335
                                                              • Instruction Fuzzy Hash: D5E12CB4E002598FDB54DFA9C590AAEFBF2FF49304F2481A9D414AB356D730A942CF61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c39051b17cb09e2da4adbeb87fdc1ccd131f178f3cee579b75817216c53684ef
                                                              • Instruction ID: 78b6428450298a8bf5301800c496c23ccb7bbce84b8bd8219c8b13263c5c4c10
                                                              • Opcode Fuzzy Hash: c39051b17cb09e2da4adbeb87fdc1ccd131f178f3cee579b75817216c53684ef
                                                              • Instruction Fuzzy Hash: 1FA17F36E00209CFCF19DFB4D8405EEBBB6FF85304B15856AE906AB265DB31E956CB40
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2193864720.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_4a00000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6b38019e81217f1f381b22be0c8d2e450d6a00163e4c9fcaef8113e1f7585238
                                                              • Instruction ID: e134ec488772768bfb59bec0495bdaa75c202066d61577a72d3b2531cf4ab8c9
                                                              • Opcode Fuzzy Hash: 6b38019e81217f1f381b22be0c8d2e450d6a00163e4c9fcaef8113e1f7585238
                                                              • Instruction Fuzzy Hash: 64C1F7B0C817458BE718CF65F84C1897BB1FB89328FE18B09D2616B2E1DBB4156ACF44
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9140241b226fc582ff9cc083a39066c8019dee94b59453c408571c28c5e7c869
                                                              • Instruction ID: b274a18a4efee5b7bb0aa8d436dc638b31a439544dca2cff052ec3db7fb9a117
                                                              • Opcode Fuzzy Hash: 9140241b226fc582ff9cc083a39066c8019dee94b59453c408571c28c5e7c869
                                                              • Instruction Fuzzy Hash: 7C615C70901605CFE758EF6AE950AAA7BF3FBDD304F14D12DD004AB22ADBB51906EB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2195193283.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6870000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b959584ca7e0c2db111d5039cba2e295a2e99515879e338cdc174bb6379db2d3
                                                              • Instruction ID: 663e6cfe999b8792083257f8a2dbbbef11cc5a38fc2dedd458ed294c86e82c0b
                                                              • Opcode Fuzzy Hash: b959584ca7e0c2db111d5039cba2e295a2e99515879e338cdc174bb6379db2d3
                                                              • Instruction Fuzzy Hash: B5614C70D00605CFE758EF6AE950A9A7BF3FBDD304F14D129D004AB26ADBB51906EB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2196659184.0000000006BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_6bd0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 19c30a9290d662653878851bd494ef2d9a44bdaee6f7baddbf9db8db2d8aafb3
                                                              • Instruction ID: 150955661643f103c4737d6af017c01e14599f120c9cd14e7f0b02f8081078c6
                                                              • Opcode Fuzzy Hash: 19c30a9290d662653878851bd494ef2d9a44bdaee6f7baddbf9db8db2d8aafb3
                                                              • Instruction Fuzzy Hash: 71511DB5E002598FDB14DFA9C5505AEFBF2FF89304F2481A9D518AB316D7319A42CFA0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: N
                                                              • API String ID: 0-1130791706
                                                              • Opcode ID: d280ed3adfbbc6a138ebc336a02d07733a842bb6319b930dd705171113db7849
                                                              • Instruction ID: 686dc49e83af3af90ef81454d59fae027e34fc423bc88c865d5f4b61fa32faf6
                                                              • Opcode Fuzzy Hash: d280ed3adfbbc6a138ebc336a02d07733a842bb6319b930dd705171113db7849
                                                              • Instruction Fuzzy Hash: A973E531C1075A8EDB11EFA8C854A99FBB1FF99300F15D69AE44877221EB70AAC5CF41
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 00f4e719b9b4ccebf2706a7dff2b25a340c6d4b61149eeeb9b565d3dc9639bdc
                                                              • Instruction ID: a5fed7d083eec1f53a84ae99d4290dd992e9e021158a2fb05953a66caaf85127
                                                              • Opcode Fuzzy Hash: 00f4e719b9b4ccebf2706a7dff2b25a340c6d4b61149eeeb9b565d3dc9639bdc
                                                              • Instruction Fuzzy Hash: 8752173155CB628BC7B5CF2C9CA429ABBE2EF912387148BDEC0D646519E7719881CBC1
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8146488c4845e101e8f44fea11db713ec2135a2993a8bcb41384f83cb1347140
                                                              • Instruction ID: 21354ac16af1cefae8af3707e221c6af061f995d076a03a28cfbdfd65c4fae87
                                                              • Opcode Fuzzy Hash: 8146488c4845e101e8f44fea11db713ec2135a2993a8bcb41384f83cb1347140
                                                              • Instruction Fuzzy Hash: 88C19E74E01218CFDB14DFA5D998B9DBBB2FB88301F1091AAD809A7365DB355E85CF10
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0ce7ca525be2bdd61dad4846669eab00725ea94435d7dd6ee33042f90844044d
                                                              • Instruction ID: 8b34ae23b7920b58e1dc95163b4e3f821572c948fd5d53fee88fa2fa1fcf67fe
                                                              • Opcode Fuzzy Hash: 0ce7ca525be2bdd61dad4846669eab00725ea94435d7dd6ee33042f90844044d
                                                              • Instruction Fuzzy Hash: B5A10571D106598FDB10DFA9C8887ADFBB1FF89310F14C2AAD45867261EB709A85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 90ec2ef103846bce4035ceb6e8a8d19f8456b6b4c49e313784ac00a2418aa3b5
                                                              • Instruction ID: 273c74a0d47dc311fdb3829eac042b0ac5f89930220e77d3a648446fbc2702ee
                                                              • Opcode Fuzzy Hash: 90ec2ef103846bce4035ceb6e8a8d19f8456b6b4c49e313784ac00a2418aa3b5
                                                              • Instruction Fuzzy Hash: 8AA1F470D00208CFEB14DFA9C848B9DBBB1FF88305F20926AE509A73A1DB759985CF54
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 52c78477564a878e86294607718debcc8935cb1ce406a561b2139e36a648eeba
                                                              • Instruction ID: 592352806f55222d3f44d5e5090e632a26c69b1f9d52d884a9545cebcab67ffd
                                                              • Opcode Fuzzy Hash: 52c78477564a878e86294607718debcc8935cb1ce406a561b2139e36a648eeba
                                                              • Instruction Fuzzy Hash: A6A1F370D00208CFEB14DFA9C848B9DBBB1FF88315F20926AE509A73A1DB759985CF54
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 324df777b8dc4f11d9eff09bdfd55b9da80dc2e215103a267eb057643743c9e0
                                                              • Instruction ID: ea05a056ca48ded25856665672b1973d7956bc0df1f9e6cf3f5a9dc11b4d0de7
                                                              • Opcode Fuzzy Hash: 324df777b8dc4f11d9eff09bdfd55b9da80dc2e215103a267eb057643743c9e0
                                                              • Instruction Fuzzy Hash: 8391E170D00218CFEB14DFA8C948B9DBBB1FF49315F20926AE509AB3A1DB759985CF14
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 93468352fc7d50a40cffcde8fea392ec26b1795d8ca922b1a227d31709d6e79f
                                                              • Instruction ID: 6ed6c699d8e7336890b4a951848f34dafd8c7e1ba1e9ce51e0d92ecd679612dc
                                                              • Opcode Fuzzy Hash: 93468352fc7d50a40cffcde8fea392ec26b1795d8ca922b1a227d31709d6e79f
                                                              • Instruction Fuzzy Hash: 6141D474D01248CBEB18CFAAD45869DFBF2BF89301F24D12AD819AB365EB384945CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID: 0-3916222277
                                                              • Opcode ID: 791204e5ee9e737ffef8cc89c061ca03ffc34ffd38525896f45326e04aaf942a
                                                              • Instruction ID: f1296db00c12118d78d9c928f0fdd9c7995d6e58a4b0202951444d9493ca68cf
                                                              • Opcode Fuzzy Hash: 791204e5ee9e737ffef8cc89c061ca03ffc34ffd38525896f45326e04aaf942a
                                                              • Instruction Fuzzy Hash: 9E81C270B002088FDB1AAF78985826E7FE2EFC9661B14452AE526DB3E1DF349C01CB51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID: 0-3916222277
                                                              • Opcode ID: 5006579389b8220cb5d440d8a05bb1050ba0c6352801b59c493e6a506a9f7441
                                                              • Instruction ID: 0beab0eff5b49607574877ed6e9da25e8dab9568e982f98fcdf46d4ac109de42
                                                              • Opcode Fuzzy Hash: 5006579389b8220cb5d440d8a05bb1050ba0c6352801b59c493e6a506a9f7441
                                                              • Instruction Fuzzy Hash: 48B1E2707042088FDB1AAF78985866E7FE2EFC5661F10452BE9269B3E1CF359C01CB51
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b30835ccbe29d7a9df29e73ddbb662596fa8a4caab798fea4256438ca24ebda4
                                                              • Instruction ID: 65a492d20585ba36e29f0d080f46adb8a956ca69fcace45203d584a9fd09057c
                                                              • Opcode Fuzzy Hash: b30835ccbe29d7a9df29e73ddbb662596fa8a4caab798fea4256438ca24ebda4
                                                              • Instruction Fuzzy Hash: CCD1C575B002048FDB15DB68C894AAE7BF2FFC8321F24456AD546EB3A1DA31DC42CB91
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ac18ff7d2ea73df8fed4825a14c1ed1ed65c924e454b089ec26f04bf0c15d995
                                                              • Instruction ID: 5c6cfd453e43f903ed102e99aa8a842ab0c8277701ae025c6adbcbe74ac6b128
                                                              • Opcode Fuzzy Hash: ac18ff7d2ea73df8fed4825a14c1ed1ed65c924e454b089ec26f04bf0c15d995
                                                              • Instruction Fuzzy Hash: 7A61D6B6B002059FD714DFBDD888A6FBFF5EFC9221B14852AE519D7360D631D8018790
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e7695fd1b563068232e18c2580647d60357ef930abfaf9f305455330f2bdf1b2
                                                              • Instruction ID: 0e7b0a7c3ea307884a4303955523118eb0559d3b5ca3baba04dc96f5dc4f10c6
                                                              • Opcode Fuzzy Hash: e7695fd1b563068232e18c2580647d60357ef930abfaf9f305455330f2bdf1b2
                                                              • Instruction Fuzzy Hash: FCA1AC74A0120ACFCB04EFA8E98499DBBB2FB84301F10556DD915BB365DB786D49CF81
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8544ba60ffbd63b7be071e7e8815a8e85ec407751eb84cb6c31f495993297557
                                                              • Instruction ID: 06177acdc6f6b8cce92008785d5d1bed6fd7ada9424020bd6fe330a8b5a64872
                                                              • Opcode Fuzzy Hash: 8544ba60ffbd63b7be071e7e8815a8e85ec407751eb84cb6c31f495993297557
                                                              • Instruction Fuzzy Hash: 46A1AD74A0120ACFCB04EFA8E98499DBBB2FB84301F10556DD915BB365DB786D49CF81
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4f3033f2d9b3154baa414807dda179b33f45b2fa5ddda6f786074aadcf2c1d62
                                                              • Instruction ID: 3077a81cee6884aaa8710033f3464e23330348f16d046871c87f6ca6704c8d57
                                                              • Opcode Fuzzy Hash: 4f3033f2d9b3154baa414807dda179b33f45b2fa5ddda6f786074aadcf2c1d62
                                                              • Instruction Fuzzy Hash: CE411B32B042158BDB194AA9DC9DA7F7AE9FFC0212F08007FDA06D73A1DAF58C468351
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 52d35d6df8d5e6d5f814f8ffa5b68aaeda5e34591cc0659a434dfd97aa216294
                                                              • Instruction ID: a6cbb0182cbdcd5bdd11a8a1d682878b3efb33324bfc309c1e4c9bdab4d3ab1c
                                                              • Opcode Fuzzy Hash: 52d35d6df8d5e6d5f814f8ffa5b68aaeda5e34591cc0659a434dfd97aa216294
                                                              • Instruction Fuzzy Hash: 3351B474E00208CFDB58DFA9D488A9DBBF2BF89311F14846AE915AB364DB749945CF10
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 040c2efaa89e0af2463bedb43b4218872d907f9bb7508680a84dd7438d042635
                                                              • Instruction ID: 3350b45093047771a6470fb49326fb18c2a5261dea8b1ff04095a228f68fe337
                                                              • Opcode Fuzzy Hash: 040c2efaa89e0af2463bedb43b4218872d907f9bb7508680a84dd7438d042635
                                                              • Instruction Fuzzy Hash: 7241A075E01208DFCB48DFAAD48499DBBF2BF89311F24916AE805BB364DB359846CF14
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ff53c0f188e6dcea9f4903baa4c1925e1463258cf7303cc2956721e39067e164
                                                              • Instruction ID: cfe45f10671749599abffbac065083f36960808b37253af6e683501b47859f69
                                                              • Opcode Fuzzy Hash: ff53c0f188e6dcea9f4903baa4c1925e1463258cf7303cc2956721e39067e164
                                                              • Instruction Fuzzy Hash: B641A174E01208DFCB08DFAAD88499DBBF2BF89301F24956AE805BB364DB359845CF14
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 96aa89c0879e61ebd63bb91b3cf49485f44233978c4fec2db9f909490390a6c6
                                                              • Instruction ID: 295d08027dd89d9ee584ac38c7135fd600c554450ae68b80b27e5239d93d1bd0
                                                              • Opcode Fuzzy Hash: 96aa89c0879e61ebd63bb91b3cf49485f44233978c4fec2db9f909490390a6c6
                                                              • Instruction Fuzzy Hash: C731B77143264E8FD3883B21A5AE27ABFA4FB4F327B087D05F12A80565BF7044848F64
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aaeda2c59831fb4a2b5246894f45ddcc239219f1d335b75f65bfd85893c74a84
                                                              • Instruction ID: d5db7eb7585674a36fbf83749a0514a865255419c9ddbddd2da746f81972b36c
                                                              • Opcode Fuzzy Hash: aaeda2c59831fb4a2b5246894f45ddcc239219f1d335b75f65bfd85893c74a84
                                                              • Instruction Fuzzy Hash: 79310735B001098FDB45DFA8C484E9DBBF2FF88220F155559E601AB365DA71EC46CB90
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2281159cd46813899d23a1f0c4fdfdfa08b28e59b2f01ac9fde9e6bf79497114
                                                              • Instruction ID: 3f8e95336adbf86c373e76b754f091e356c7d74302f90efed92046246dd7a291
                                                              • Opcode Fuzzy Hash: 2281159cd46813899d23a1f0c4fdfdfa08b28e59b2f01ac9fde9e6bf79497114
                                                              • Instruction Fuzzy Hash: ED310735B001098FDB45DBA8C484E9DBBF2FF88220F155559E601AF365DA71EC45CB90
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 97abb7cb7f87a69dd2e537185e42cd3dfbae934ca11d41dc65578dd9ffe4f8af
                                                              • Instruction ID: af7c94128813845a0b628484fd740e08d00ff7220a26dd73d47588b2efae2d26
                                                              • Opcode Fuzzy Hash: 97abb7cb7f87a69dd2e537185e42cd3dfbae934ca11d41dc65578dd9ffe4f8af
                                                              • Instruction Fuzzy Hash: BC21D3347002099FCB08EF69C955A6E7BB6FFD8312F24806AD6098B7A5DF319D01CB90
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66807077446496ff7542ec51144e6eaa9872cc132c64e376ebc8232001a992ee
                                                              • Instruction ID: e0bda2c1d0cd15258138ab94fff48a519152478848dadef52a707647dcc7b7db
                                                              • Opcode Fuzzy Hash: 66807077446496ff7542ec51144e6eaa9872cc132c64e376ebc8232001a992ee
                                                              • Instruction Fuzzy Hash: 2F21B035A0014A9FCB14DF28D4449AF77A5EB89760B50C05AE80AAB350DB35EA46CB91
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c1277a04099d7743403974ce15d3b27cb21dadc9e6a528b3ddf6dc9b23210999
                                                              • Instruction ID: eb8d104100bd35aa0e2fec4d12e75bcd17f89f7b84ec425c0bdf6fd81fd2cb85
                                                              • Opcode Fuzzy Hash: c1277a04099d7743403974ce15d3b27cb21dadc9e6a528b3ddf6dc9b23210999
                                                              • Instruction Fuzzy Hash: FA21FF317093894FD71AA7B8982966D3FE6DF96142B0944BFD509CB3A2DD348C05C361
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422048372.000000000148D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_148d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ea3a51e0d90bbbde689f506de62ce7b2c2772bf263adc779b228b6727386fe28
                                                              • Instruction ID: 8194ddd13da4b3bd16fbcee79f1f81a6f3379b10768053bca4d78a60274e47d9
                                                              • Opcode Fuzzy Hash: ea3a51e0d90bbbde689f506de62ce7b2c2772bf263adc779b228b6727386fe28
                                                              • Instruction Fuzzy Hash: 6F2137B1904204DFDB15EF54D9C0B2ABB61FB85318F20C56ED90A4B3A2C376D447CA62
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422048372.000000000148D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_148d000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a4cd38d97e263ff920226a5f9635ee382973dc09b59e96180fe1b806d861d188
                                                              • Instruction ID: 2269a5943d8c8af0ca740012afebedaf211dd5d48bdf88c69e01d9745f49b413
                                                              • Opcode Fuzzy Hash: a4cd38d97e263ff920226a5f9635ee382973dc09b59e96180fe1b806d861d188
                                                              • Instruction Fuzzy Hash: 06215A7150A3C49FCB03DF64D990715BF71AB47214F29C5DBD8898F2A7C23A984ACB62
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f497437ba04c5f3055ba762e79beb9187bb543691377f18924609eed84af3c2a
                                                              • Instruction ID: 0b22c87d1526bda1031fa6abbb6366a79248bac0c9161d3bb2c7713eeb28811b
                                                              • Opcode Fuzzy Hash: f497437ba04c5f3055ba762e79beb9187bb543691377f18924609eed84af3c2a
                                                              • Instruction Fuzzy Hash: CE218E71A001099FDB44EFB9D855AAE7BF6EF98300B15846AE119E7265DB308E02CB50
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6d7c981af79a355e1e8712b8bc217f864110742f2266682db3f2667e5ac8f54e
                                                              • Instruction ID: 194b53751f100d5792a0cc04334cc7ca44cbcf06f8b67b8f2b218703964020c5
                                                              • Opcode Fuzzy Hash: 6d7c981af79a355e1e8712b8bc217f864110742f2266682db3f2667e5ac8f54e
                                                              • Instruction Fuzzy Hash: 75213E70E00209DBDB08EFA9C4587AEBBB2FB94305F10846E99146B364DBB89945CF41
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3a3dc749c1194e5ec1e397baa887dce88e0fdafd68ddb9d76bce216f356ddf57
                                                              • Instruction ID: ee13210f37a8cf9f91fe399edc460bbe3456b5fd6c2d19556d220ddcd451b756
                                                              • Opcode Fuzzy Hash: 3a3dc749c1194e5ec1e397baa887dce88e0fdafd68ddb9d76bce216f356ddf57
                                                              • Instruction Fuzzy Hash: 9821F570C4524A8FCB41DFB9D8545EEBFF0FF0A200F0445AAD449B7222EB345A95CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 67407e6896abae50f52684389f5066df9b5309c8d0c6bd25a28de10209a1d9d4
                                                              • Instruction ID: 388771cdbda8b98f19e40ea9c77b67782d6989e1517dc6c553ab8665989aa083
                                                              • Opcode Fuzzy Hash: 67407e6896abae50f52684389f5066df9b5309c8d0c6bd25a28de10209a1d9d4
                                                              • Instruction Fuzzy Hash: 02116A71300214CFDB24DF69D988A56B7E6EF88722B2084AAE2498B775CA71EC04CB50
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78a8f3fc189bd2309c6a714e74849022a040e478aedab5c52fccbc47eb06705f
                                                              • Instruction ID: e6036aa45dacdcd22fbabd19b0a9899a5056694dd65f78ed6e1732acbf60440c
                                                              • Opcode Fuzzy Hash: 78a8f3fc189bd2309c6a714e74849022a040e478aedab5c52fccbc47eb06705f
                                                              • Instruction Fuzzy Hash: 26116DB17052008FDB258F69C948B567BE5EF99612F1680AED149CB7B6CA70D805CB11
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9e308bd1b32d0f7c917e9ac087e0815636b1772d27cf2ebaf2a54b8e8a63205
                                                              • Instruction ID: 2c8f4af58b22ebe4f8942d7712223b76bc05f2c6e6281864715738d899715917
                                                              • Opcode Fuzzy Hash: e9e308bd1b32d0f7c917e9ac087e0815636b1772d27cf2ebaf2a54b8e8a63205
                                                              • Instruction Fuzzy Hash: AA012436F412450FD714AA7A8C1852F77EBAFC4126705443ED509C7365FE70CC018B90
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fd2d80063edf241d10d6498e69604fa611f4446719ecbaa276896da4c360b2e3
                                                              • Instruction ID: 4796bb70af4d106d8e18f6ec45de19e5f667b3e6a21bd21dfaf5c2cb10780827
                                                              • Opcode Fuzzy Hash: fd2d80063edf241d10d6498e69604fa611f4446719ecbaa276896da4c360b2e3
                                                              • Instruction Fuzzy Hash: BF01FD36B012414FD714AABA8C0852F77EBAFC4165714493EDA09C7364FE70CC008B90
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 52e6b339ebba0fd1bcdfaac40b81c2bc2049494b4e6dde13301fdffe43bbf5a7
                                                              • Instruction ID: 06cb7701d3b5f32848b587b9c50357f1c2d4c9c6555a6a5554239330ff9fe212
                                                              • Opcode Fuzzy Hash: 52e6b339ebba0fd1bcdfaac40b81c2bc2049494b4e6dde13301fdffe43bbf5a7
                                                              • Instruction Fuzzy Hash: ED014C75A1020D9FDB589F69E8595AE7FB5EB88251B10443AF91A93350EB308D10CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b83c666d4167b19e1d6bab3fd7eb3ab5247687323a361256f6ded50b38259e36
                                                              • Instruction ID: 405829f24778817fbbddd71b58871cd6e4ce9270dded76b5c0ca41c9410bfd7e
                                                              • Opcode Fuzzy Hash: b83c666d4167b19e1d6bab3fd7eb3ab5247687323a361256f6ded50b38259e36
                                                              • Instruction Fuzzy Hash: 48014F7191021DAFCB54DF69DC499AF7FB5FB88251B504526F919D3350EB308910CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ffa633bda5a97b64d95c75c350954e438259b0107d9341d2fd7e447fa3090f06
                                                              • Instruction ID: 731fb527626f6b403256b3bee80b1645027194c8641a214714f6f128fc40ee95
                                                              • Opcode Fuzzy Hash: ffa633bda5a97b64d95c75c350954e438259b0107d9341d2fd7e447fa3090f06
                                                              • Instruction Fuzzy Hash: B3F02B36B002089BCB092774D81E66D3FD6EFC9621B144827F60AC7391DE35CC42C790
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1dfb92f1d9ae6685bc498ff82c21dd70b8d917a43044f74fdfb024610de5cc45
                                                              • Instruction ID: 582305175d431827f20ca9262f2f027115b86f8528c16f34d7057e41ecfdb801
                                                              • Opcode Fuzzy Hash: 1dfb92f1d9ae6685bc498ff82c21dd70b8d917a43044f74fdfb024610de5cc45
                                                              • Instruction Fuzzy Hash: A7F06272A00109AFCB40EFA9DC44DBF7BF9FF4C211B00406AF519D7221EA3599118BA0
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f22637f0edcc6dcd4e5a45bbca457c3083f23399e525412bc684bfdb4b74b40e
                                                              • Instruction ID: c7996bdbee609836a53ee9632aeb2c625cd5145e17eb6410294c335016f077f3
                                                              • Opcode Fuzzy Hash: f22637f0edcc6dcd4e5a45bbca457c3083f23399e525412bc684bfdb4b74b40e
                                                              • Instruction Fuzzy Hash: C7F0A7327005155FCB1A576EE45895EB7E9DFC5632714007BE509D7360DE31DC028B90
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4827caba0f5b462336bb2ed412b84fc6a51170751e8e5f986e0dff796aa2a1ba
                                                              • Instruction ID: 629ee5c6848f7348535a7567da460ab44f7656abd97c75c74b42778de622464a
                                                              • Opcode Fuzzy Hash: 4827caba0f5b462336bb2ed412b84fc6a51170751e8e5f986e0dff796aa2a1ba
                                                              • Instruction Fuzzy Hash: FEF0E9B6E001089FCB51DFA9D9805EFBBF6FF5C251B40462BD209D3710E630990687D1
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d9e39b1e860bbac90ede490d8982444cf62a437f7031b5fe362fabc8c5513c02
                                                              • Instruction ID: 5eb2446e1ce859be908e5358195aeb9414bc0764689f332339cec01cebf9d583
                                                              • Opcode Fuzzy Hash: d9e39b1e860bbac90ede490d8982444cf62a437f7031b5fe362fabc8c5513c02
                                                              • Instruction Fuzzy Hash: BAF092350693828FD3212B24B8AC32E7F70EB0B31BB496D5AA14DD947ACB7058548B25
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b52f37c1f1316b765ce7696342619d6413c1b598c944a8e02e297b725fea1a63
                                                              • Instruction ID: 37f361e1373a57b431f9849b9f259676c3085e4469d4db77ec2a0d5efded6db3
                                                              • Opcode Fuzzy Hash: b52f37c1f1316b765ce7696342619d6413c1b598c944a8e02e297b725fea1a63
                                                              • Instruction Fuzzy Hash: 1AF01271A042089F8B50DFAE984099FBFF6FF98250B50452BD609D3715EA7099168BE1
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 62abdc57b8fda4c1bbb3326f49504710645702e8c95dba85759bf3a48748331e
                                                              • Instruction ID: 5e6a7d08a2c54860127b5a8f77c62de9480fd0e5ca71476cfd28ab8b20c948e8
                                                              • Opcode Fuzzy Hash: 62abdc57b8fda4c1bbb3326f49504710645702e8c95dba85759bf3a48748331e
                                                              • Instruction Fuzzy Hash: 2FE09934061303CBE3202B20B4AC33E7BB5EB0B31BB842D08A10EE80388F7048848B25
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d5b0ddc0c68e4682d4844edd44675165202da6ac1a5e54d97c2bf824ba7f54bf
                                                              • Instruction ID: 73aaf64c7bb5018b7e65ebf16bc7ffe48f22b4e9635f271f6c0d446ca8962ddd
                                                              • Opcode Fuzzy Hash: d5b0ddc0c68e4682d4844edd44675165202da6ac1a5e54d97c2bf824ba7f54bf
                                                              • Instruction Fuzzy Hash: 57D02B31D2022B53CB00E7A1FC004DFF738EEC1220B404222E91033000FB302658C6F0
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c21269c602cd5a6e4fb62f707f2dfb1484c8060aeb0bd3920a182a4fbfef6e10
                                                              • Instruction ID: 7c15a701314dad7276c0dfacd44edddcc9fd329bac863493924e5fcdaec31331
                                                              • Opcode Fuzzy Hash: c21269c602cd5a6e4fb62f707f2dfb1484c8060aeb0bd3920a182a4fbfef6e10
                                                              • Instruction Fuzzy Hash: 0AE02B31D2026B56CB11D7B0FC404FEFB34EED1220B544266E81033000EB30165ECBA0
                                                              Memory Dump Source
                                                              • Source File: 00000007.00000002.3422681721.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_7_2_14e0000_MB263350411AE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e6f3b369244004a9774f2e22cfcf64a901ad1203c7d83d5aff4fdd06f24c4d28
                                                              • Instruction ID: d2514d87a33e87538dd90b2a5d46a65cf0686c8eb22b3a8edc39e2e098428103
                                                              • Opcode Fuzzy Hash: e6f3b369244004a9774f2e22cfcf64a901ad1203c7d83d5aff4fdd06f24c4d28
                                                              • Instruction Fuzzy Hash: 96B092A298038812DF161620D93B3A96B10EB51218F98089D888AC42A9EA188420C200

                                                              Execution Graph

                                                              Execution Coverage:11.3%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:223
                                                              Total number of Limit Nodes:12
                                                              execution_graph 31304 6ea7768 31305 6ea78f3 31304->31305 31306 6ea778e 31304->31306 31306->31305 31308 6ea7360 31306->31308 31309 6ea79e8 PostMessageW 31308->31309 31310 6ea7a54 31309->31310 31310->31306 31340 6ea49c8 31341 6ea4974 31340->31341 31342 6ea49ce 31340->31342 31341->31342 31346 6ea60c8 31341->31346 31352 6ea60b8 31341->31352 31343 6ea4c2b 31347 6ea60dd 31346->31347 31358 6ea60f8 31347->31358 31378 6ea6166 31347->31378 31399 6ea6100 31347->31399 31348 6ea60ef 31348->31343 31353 6ea60dd 31352->31353 31355 6ea60f8 12 API calls 31353->31355 31356 6ea6100 12 API calls 31353->31356 31357 6ea6166 12 API calls 31353->31357 31354 6ea60ef 31354->31343 31355->31354 31356->31354 31357->31354 31359 6ea6102 31358->31359 31360 6ea6146 31359->31360 31419 6ea6588 31359->31419 31425 6ea6977 31359->31425 31430 6ea66d0 31359->31430 31435 6ea673d 31359->31435 31441 6ea66fd 31359->31441 31446 6ea677f 31359->31446 31450 6ea661e 31359->31450 31456 6ea6bd8 31359->31456 31465 6ea687a 31359->31465 31471 6ea65fa 31359->31471 31476 6ea651a 31359->31476 31481 6ea6845 31359->31481 31485 6ea68e5 31359->31485 31490 6ea65a0 31359->31490 31495 6ea68a3 31359->31495 31500 6ea680c 31359->31500 31504 6ea6cc9 31359->31504 31360->31348 31379 6ea60f4 31378->31379 31381 6ea6169 31378->31381 31380 6ea6146 31379->31380 31382 6ea6588 2 API calls 31379->31382 31383 6ea6cc9 4 API calls 31379->31383 31384 6ea680c 2 API calls 31379->31384 31385 6ea68a3 2 API calls 31379->31385 31386 6ea65a0 2 API calls 31379->31386 31387 6ea68e5 2 API calls 31379->31387 31388 6ea6845 2 API calls 31379->31388 31389 6ea651a 2 API calls 31379->31389 31390 6ea65fa 2 API calls 31379->31390 31391 6ea687a 3 API calls 31379->31391 31392 6ea6bd8 4 API calls 31379->31392 31393 6ea661e 3 API calls 31379->31393 31394 6ea677f ReadProcessMemory 31379->31394 31395 6ea66fd 2 API calls 31379->31395 31396 6ea673d 3 API calls 31379->31396 31397 6ea66d0 2 API calls 31379->31397 31398 6ea6977 2 API calls 31379->31398 31380->31348 31381->31348 31382->31380 31383->31380 31384->31380 31385->31380 31386->31380 31387->31380 31388->31380 31389->31380 31390->31380 31391->31380 31392->31380 31393->31380 31394->31380 31395->31380 31396->31380 31397->31380 31398->31380 31400 6ea6122 31399->31400 31401 6ea6588 2 API calls 31400->31401 31402 6ea6cc9 4 API calls 31400->31402 31403 6ea680c 2 API calls 31400->31403 31404 6ea68a3 2 API calls 31400->31404 31405 6ea65a0 2 API calls 31400->31405 31406 6ea68e5 2 API calls 31400->31406 31407 6ea6845 2 API calls 31400->31407 31408 6ea651a 2 API calls 31400->31408 31409 6ea65fa 2 API calls 31400->31409 31410 6ea6146 31400->31410 31411 6ea687a 3 API calls 31400->31411 31412 6ea6bd8 4 API calls 31400->31412 31413 6ea661e 3 API calls 31400->31413 31414 6ea677f ReadProcessMemory 31400->31414 31415 6ea66fd 2 API calls 31400->31415 31416 6ea673d 3 API calls 31400->31416 31417 6ea66d0 2 API calls 31400->31417 31418 6ea6977 2 API calls 31400->31418 31401->31410 31402->31410 31403->31410 31404->31410 31405->31410 31406->31410 31407->31410 31408->31410 31409->31410 31410->31348 31411->31410 31412->31410 31413->31410 31414->31410 31415->31410 31416->31410 31417->31410 31418->31410 31420 6ea6504 31419->31420 31421 6ea651b 31419->31421 31420->31360 31422 6ea65db 31421->31422 31513 6ea4494 31421->31513 31517 6ea44a0 31421->31517 31422->31360 31426 6ea6987 31425->31426 31521 6ea4218 31426->31521 31525 6ea4210 31426->31525 31427 6ea6fbe 31431 6ea66d9 31430->31431 31433 6ea4218 WriteProcessMemory 31431->31433 31434 6ea4210 WriteProcessMemory 31431->31434 31432 6ea6e21 31433->31432 31434->31432 31436 6ea674a 31435->31436 31437 6ea6690 31436->31437 31529 6ea3b94 31436->31529 31533 6ea3b90 31436->31533 31537 6ea3b98 31436->31537 31437->31360 31442 6ea6606 31441->31442 31442->31441 31541 6ea4078 31442->31541 31545 6ea4080 31442->31545 31443 6ea6ea8 31447 6ea6788 31446->31447 31549 6ea4308 31447->31549 31451 6ea662b 31450->31451 31452 6ea6690 31451->31452 31453 6ea3b98 ResumeThread 31451->31453 31454 6ea3b90 ResumeThread 31451->31454 31455 6ea3b94 ResumeThread 31451->31455 31452->31360 31453->31451 31454->31451 31455->31451 31457 6ea6bde 31456->31457 31461 6ea4218 WriteProcessMemory 31457->31461 31462 6ea4210 WriteProcessMemory 31457->31462 31458 6ea6a31 31459 6ea6606 31459->31458 31463 6ea4078 Wow64SetThreadContext 31459->31463 31464 6ea4080 Wow64SetThreadContext 31459->31464 31460 6ea6ea8 31461->31459 31462->31459 31463->31460 31464->31460 31466 6ea6884 31465->31466 31467 6ea6690 31466->31467 31468 6ea3b98 ResumeThread 31466->31468 31469 6ea3b90 ResumeThread 31466->31469 31470 6ea3b94 ResumeThread 31466->31470 31467->31360 31468->31466 31469->31466 31470->31466 31472 6ea6606 31471->31472 31474 6ea4078 Wow64SetThreadContext 31472->31474 31475 6ea4080 Wow64SetThreadContext 31472->31475 31473 6ea6ea8 31474->31473 31475->31473 31477 6ea6524 31476->31477 31478 6ea65db 31477->31478 31479 6ea44a0 CreateProcessA 31477->31479 31480 6ea4494 CreateProcessA 31477->31480 31478->31360 31479->31478 31480->31478 31553 6ea4158 31481->31553 31557 6ea4150 31481->31557 31482 6ea6863 31486 6ea68f1 31485->31486 31488 6ea4078 Wow64SetThreadContext 31486->31488 31489 6ea4080 Wow64SetThreadContext 31486->31489 31487 6ea6ea8 31488->31487 31489->31487 31491 6ea65ad 31490->31491 31493 6ea44a0 CreateProcessA 31491->31493 31494 6ea4494 CreateProcessA 31491->31494 31492 6ea65db 31492->31360 31493->31492 31494->31492 31496 6ea6606 31495->31496 31498 6ea4078 Wow64SetThreadContext 31496->31498 31499 6ea4080 Wow64SetThreadContext 31496->31499 31497 6ea6ea8 31498->31497 31499->31497 31502 6ea4078 Wow64SetThreadContext 31500->31502 31503 6ea4080 Wow64SetThreadContext 31500->31503 31501 6ea6826 31502->31501 31503->31501 31505 6ea6bef 31504->31505 31507 6ea6606 31504->31507 31511 6ea4218 WriteProcessMemory 31505->31511 31512 6ea4210 WriteProcessMemory 31505->31512 31506 6ea6a31 31507->31506 31509 6ea4078 Wow64SetThreadContext 31507->31509 31510 6ea4080 Wow64SetThreadContext 31507->31510 31508 6ea6ea8 31509->31508 31510->31508 31511->31507 31512->31507 31514 6ea4529 31513->31514 31514->31514 31515 6ea468e CreateProcessA 31514->31515 31516 6ea46eb 31515->31516 31518 6ea4529 31517->31518 31518->31518 31519 6ea468e CreateProcessA 31518->31519 31520 6ea46eb 31519->31520 31520->31520 31522 6ea4260 WriteProcessMemory 31521->31522 31524 6ea42b7 31522->31524 31524->31427 31526 6ea421a WriteProcessMemory 31525->31526 31528 6ea42b7 31526->31528 31528->31427 31530 6ea3bd8 ResumeThread 31529->31530 31532 6ea3c09 31530->31532 31532->31436 31534 6ea3b9a ResumeThread 31533->31534 31536 6ea3c09 31534->31536 31536->31436 31538 6ea3bd8 ResumeThread 31537->31538 31540 6ea3c09 31538->31540 31540->31436 31542 6ea4082 Wow64SetThreadContext 31541->31542 31544 6ea410d 31542->31544 31544->31443 31546 6ea40c5 Wow64SetThreadContext 31545->31546 31548 6ea410d 31546->31548 31548->31443 31550 6ea4353 ReadProcessMemory 31549->31550 31552 6ea4397 31550->31552 31552->31360 31554 6ea4198 VirtualAllocEx 31553->31554 31556 6ea41d5 31554->31556 31556->31482 31558 6ea415a VirtualAllocEx 31557->31558 31560 6ea41d5 31558->31560 31560->31482 31315 bd4668 31316 bd467a 31315->31316 31317 bd4686 31316->31317 31319 bd4778 31316->31319 31320 bd479d 31319->31320 31324 bd4888 31320->31324 31328 bd4878 31320->31328 31325 bd48af 31324->31325 31326 bd498c 31325->31326 31332 bd4514 31325->31332 31330 bd4888 31328->31330 31329 bd498c 31329->31329 31330->31329 31331 bd4514 CreateActCtxA 31330->31331 31331->31329 31333 bd5918 CreateActCtxA 31332->31333 31335 bd59db 31333->31335 31335->31335 31561 bde008 DuplicateHandle 31562 bde09e 31561->31562 31311 6b44ef8 31312 6b44f3b 31311->31312 31313 6b44f59 MonitorFromPoint 31312->31313 31314 6b44f8a 31312->31314 31313->31314 31563 6b40948 31567 6b40980 31563->31567 31571 6b40978 31563->31571 31564 6b40965 31568 6b409ce DrawTextExW 31567->31568 31570 6b40a26 31568->31570 31570->31564 31572 6b40980 DrawTextExW 31571->31572 31574 6b40a26 31572->31574 31574->31564 31336 bdbd20 31337 bdbd68 GetModuleHandleW 31336->31337 31338 bdbd62 31336->31338 31339 bdbd95 31337->31339 31338->31337 31575 bdddc0 31576 bdde06 GetCurrentProcess 31575->31576 31578 bdde58 GetCurrentThread 31576->31578 31579 bdde51 31576->31579 31580 bdde95 GetCurrentProcess 31578->31580 31582 bdde8e 31578->31582 31579->31578 31581 bddecb GetCurrentThreadId 31580->31581 31584 bddf24 31581->31584 31582->31580

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 00BDDE3E
                                                              • GetCurrentThread.KERNEL32 ref: 00BDDE7B
                                                              • GetCurrentProcess.KERNEL32 ref: 00BDDEB8
                                                              • GetCurrentThreadId.KERNEL32 ref: 00BDDF11
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2228135495.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_bd0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 6f1c850dda67012ed63aa789731c81b4eb746fecbeb210fa6ea5a18605486056
                                                              • Instruction ID: c54488cbe605c49eadabe49e29c9d3519ed691ae1461071b0234410a61fd2b50
                                                              • Opcode Fuzzy Hash: 6f1c850dda67012ed63aa789731c81b4eb746fecbeb210fa6ea5a18605486056
                                                              • Instruction Fuzzy Hash: C05177B090134A8FEB44DFA9D548B9EBBF1FF88314F20805AE019A7350DBB4A844CB65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 21 6ea4494-6ea4535 23 6ea456e-6ea458e 21->23 24 6ea4537-6ea4541 21->24 31 6ea4590-6ea459a 23->31 32 6ea45c7-6ea45f6 23->32 24->23 25 6ea4543-6ea4545 24->25 26 6ea4568-6ea456b 25->26 27 6ea4547-6ea4551 25->27 26->23 29 6ea4553 27->29 30 6ea4555-6ea4564 27->30 29->30 30->30 33 6ea4566 30->33 31->32 34 6ea459c-6ea459e 31->34 38 6ea45f8-6ea4602 32->38 39 6ea462f-6ea46e9 CreateProcessA 32->39 33->26 36 6ea45a0-6ea45aa 34->36 37 6ea45c1-6ea45c4 34->37 40 6ea45ae-6ea45bd 36->40 41 6ea45ac 36->41 37->32 38->39 42 6ea4604-6ea4606 38->42 52 6ea46eb-6ea46f1 39->52 53 6ea46f2-6ea4778 39->53 40->40 43 6ea45bf 40->43 41->40 44 6ea4608-6ea4612 42->44 45 6ea4629-6ea462c 42->45 43->37 47 6ea4616-6ea4625 44->47 48 6ea4614 44->48 45->39 47->47 49 6ea4627 47->49 48->47 49->45 52->53 63 6ea477a-6ea477e 53->63 64 6ea4788-6ea478c 53->64 63->64 65 6ea4780 63->65 66 6ea478e-6ea4792 64->66 67 6ea479c-6ea47a0 64->67 65->64 66->67 70 6ea4794 66->70 68 6ea47a2-6ea47a6 67->68 69 6ea47b0-6ea47b4 67->69 68->69 71 6ea47a8 68->71 72 6ea47c6-6ea47cd 69->72 73 6ea47b6-6ea47bc 69->73 70->67 71->69 74 6ea47cf-6ea47de 72->74 75 6ea47e4 72->75 73->72 74->75 77 6ea47e5 75->77 77->77
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06EA46D6
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: c9ae40a34d0f26cf4354d62380007976b40e080ab70932a71be4659893115f90
                                                              • Instruction ID: 10cfac722f57967f13dda257ba4cb6c8a4c4759acbc070e7e8eb6fb54b525b1a
                                                              • Opcode Fuzzy Hash: c9ae40a34d0f26cf4354d62380007976b40e080ab70932a71be4659893115f90
                                                              • Instruction Fuzzy Hash: 5AA15C71D00759DFEB50CF68C841BDDBAF2BF49314F1485A9E818AB280DBB4A985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 78 6ea44a0-6ea4535 80 6ea456e-6ea458e 78->80 81 6ea4537-6ea4541 78->81 88 6ea4590-6ea459a 80->88 89 6ea45c7-6ea45f6 80->89 81->80 82 6ea4543-6ea4545 81->82 83 6ea4568-6ea456b 82->83 84 6ea4547-6ea4551 82->84 83->80 86 6ea4553 84->86 87 6ea4555-6ea4564 84->87 86->87 87->87 90 6ea4566 87->90 88->89 91 6ea459c-6ea459e 88->91 95 6ea45f8-6ea4602 89->95 96 6ea462f-6ea46e9 CreateProcessA 89->96 90->83 93 6ea45a0-6ea45aa 91->93 94 6ea45c1-6ea45c4 91->94 97 6ea45ae-6ea45bd 93->97 98 6ea45ac 93->98 94->89 95->96 99 6ea4604-6ea4606 95->99 109 6ea46eb-6ea46f1 96->109 110 6ea46f2-6ea4778 96->110 97->97 100 6ea45bf 97->100 98->97 101 6ea4608-6ea4612 99->101 102 6ea4629-6ea462c 99->102 100->94 104 6ea4616-6ea4625 101->104 105 6ea4614 101->105 102->96 104->104 106 6ea4627 104->106 105->104 106->102 109->110 120 6ea477a-6ea477e 110->120 121 6ea4788-6ea478c 110->121 120->121 122 6ea4780 120->122 123 6ea478e-6ea4792 121->123 124 6ea479c-6ea47a0 121->124 122->121 123->124 127 6ea4794 123->127 125 6ea47a2-6ea47a6 124->125 126 6ea47b0-6ea47b4 124->126 125->126 128 6ea47a8 125->128 129 6ea47c6-6ea47cd 126->129 130 6ea47b6-6ea47bc 126->130 127->124 128->126 131 6ea47cf-6ea47de 129->131 132 6ea47e4 129->132 130->129 131->132 134 6ea47e5 132->134 134->134
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06EA46D6
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 9a8a228302a18c974fcf3077532d3eb758b2a7245a948ed5c234b720936d59f6
                                                              • Instruction ID: 0f66b39474bbac83df842dc039751fc105fc10a4d931e042a84482c6186b169d
                                                              • Opcode Fuzzy Hash: 9a8a228302a18c974fcf3077532d3eb758b2a7245a948ed5c234b720936d59f6
                                                              • Instruction Fuzzy Hash: 50914C71D00359DFDB54CF68C8417DDBAF2BB49314F1485A9E818AB280DBB4A985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 135 bd590c-bd5916 136 bd5918-bd59d9 CreateActCtxA 135->136 138 bd59db-bd59e1 136->138 139 bd59e2-bd5a3c 136->139 138->139 146 bd5a3e-bd5a41 139->146 147 bd5a4b-bd5a4f 139->147 146->147 148 bd5a51-bd5a5d 147->148 149 bd5a60 147->149 148->149 151 bd5a61 149->151 151->151
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 00BD59C9
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2228135495.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_bd0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 4e72a33d6f0137f7c6a47b2d2a5d473da1781bd7fed696aa9f90a432d292c61e
                                                              • Instruction ID: 5d15875916e05e8eb61d29a26647953bfc6b95313e0e249c43afd93ba5048b08
                                                              • Opcode Fuzzy Hash: 4e72a33d6f0137f7c6a47b2d2a5d473da1781bd7fed696aa9f90a432d292c61e
                                                              • Instruction Fuzzy Hash: CA41D2B0D0071DCBDB24CFA9C98479EBBF5BF49704F20816AD508AB251DB75A946CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 152 bd4514-bd59d9 CreateActCtxA 155 bd59db-bd59e1 152->155 156 bd59e2-bd5a3c 152->156 155->156 163 bd5a3e-bd5a41 156->163 164 bd5a4b-bd5a4f 156->164 163->164 165 bd5a51-bd5a5d 164->165 166 bd5a60 164->166 165->166 168 bd5a61 166->168 168->168
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 00BD59C9
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2228135495.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_bd0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 9366943e25c733985758e9780ca160e0d4f58cb238c63288f0cc992596a18ade
                                                              • Instruction ID: 3bb1c26ee2b1b114d8c629f6b2be3a7a52fe527ed324fd352239d127b2450d31
                                                              • Opcode Fuzzy Hash: 9366943e25c733985758e9780ca160e0d4f58cb238c63288f0cc992596a18ade
                                                              • Instruction Fuzzy Hash: 2041D2B0D0071DCBEB24CFA9C984B9DBBF5BF49704F20816AD508AB251DBB5A945CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 169 6b40978-6b409cc 171 6b409d7-6b409e6 169->171 172 6b409ce-6b409d4 169->172 173 6b409e8 171->173 174 6b409eb-6b40a24 DrawTextExW 171->174 172->171 173->174 175 6b40a26-6b40a2c 174->175 176 6b40a2d-6b40a4a 174->176 175->176
                                                              APIs
                                                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06B40A17
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2235677133.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6b40000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: DrawText
                                                              • String ID:
                                                              • API String ID: 2175133113-0
                                                              • Opcode ID: c957c033a9f89024ca3d4df13bd085a5c3dac5585ee821febfdb50a22e41dd89
                                                              • Instruction ID: 0aa446d10f708fd8b64d54327c165f5a4b8bba636f09fc5307481657a4bed5c4
                                                              • Opcode Fuzzy Hash: c957c033a9f89024ca3d4df13bd085a5c3dac5585ee821febfdb50a22e41dd89
                                                              • Instruction Fuzzy Hash: 3431D1B5D002099FDB10DF9AD880ADEBBF5FF58220F14842AE919A7210D775A941CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 179 6ea4210-6ea4266 182 6ea4268-6ea4274 179->182 183 6ea4276-6ea42b5 WriteProcessMemory 179->183 182->183 185 6ea42be-6ea42ee 183->185 186 6ea42b7-6ea42bd 183->186 186->185
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06EA42A8
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 884b8ba8046d79046ec1ef728bb3458aa7ac5cbcd76c0ee82d9b1d6dbaff8978
                                                              • Instruction ID: 483501a8afa109dc5ebf0d89d3cba093cf2cc4d372cf755e57549b6340542d9b
                                                              • Opcode Fuzzy Hash: 884b8ba8046d79046ec1ef728bb3458aa7ac5cbcd76c0ee82d9b1d6dbaff8978
                                                              • Instruction Fuzzy Hash: 52211771900349DFDB50CFA9C885BEEBBF5BF48310F108429E919A7240D7B9A951CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 199 6ea4218-6ea4266 201 6ea4268-6ea4274 199->201 202 6ea4276-6ea42b5 WriteProcessMemory 199->202 201->202 204 6ea42be-6ea42ee 202->204 205 6ea42b7-6ea42bd 202->205 205->204
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06EA42A8
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: c93efec848da25ec26c4f1055da9584bdbd120c8e90bca349b42a3f54a3da2b5
                                                              • Instruction ID: bc39814c257577f94ef81a3de29c7ea16e8bb58d2ee329f1d95944edbcac1f26
                                                              • Opcode Fuzzy Hash: c93efec848da25ec26c4f1055da9584bdbd120c8e90bca349b42a3f54a3da2b5
                                                              • Instruction Fuzzy Hash: F7211571900349DFDB10CFA9C885BDEBBF5FF48320F108429E918A7240D7B8A950CBA4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 190 6b40980-6b409cc 191 6b409d7-6b409e6 190->191 192 6b409ce-6b409d4 190->192 193 6b409e8 191->193 194 6b409eb-6b40a24 DrawTextExW 191->194 192->191 193->194 195 6b40a26-6b40a2c 194->195 196 6b40a2d-6b40a4a 194->196 195->196
                                                              APIs
                                                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06B40A17
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2235677133.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6b40000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: DrawText
                                                              • String ID:
                                                              • API String ID: 2175133113-0
                                                              • Opcode ID: 7139d8d3cbe5f21e029c48da6085d54d6df8484384ef30000dbf20c3a9209565
                                                              • Instruction ID: 599cd5146d1c4f3d75354d2e881c56e3eba6943a725a801ae5be6eab832ac341
                                                              • Opcode Fuzzy Hash: 7139d8d3cbe5f21e029c48da6085d54d6df8484384ef30000dbf20c3a9209565
                                                              • Instruction Fuzzy Hash: FC21CEB5D002499FDB10DF9AD884A9EFBF4FF58220F14842AE919A7210D775A954CFA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 209 6b44ee8-6b44f44 212 6b44f46-6b44f88 MonitorFromPoint 209->212 213 6b44faa-6b44fc5 209->213 216 6b44f91-6b44f9c 212->216 217 6b44f8a-6b44f90 212->217 219 6b44fc7-6b44fd4 213->219 221 6b44fa5-6b44fa8 216->221 217->216 221->219
                                                              APIs
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 06B44F77
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2235677133.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6b40000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: FromMonitorPoint
                                                              • String ID:
                                                              • API String ID: 1566494148-0
                                                              • Opcode ID: edaaa942982d8f25b8fdfa3bc886604661bcec87327e75d1d9d8984baad5ce37
                                                              • Instruction ID: 4d26214d635db2c89c5e842fba6126982679e4e5e3abe9e258b2fe2261c52665
                                                              • Opcode Fuzzy Hash: edaaa942982d8f25b8fdfa3bc886604661bcec87327e75d1d9d8984baad5ce37
                                                              • Instruction Fuzzy Hash: 5B2169B19053999FDB20EFA9D444BDEBFF4FB49314F10804AE898A7241C774A909CFA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 234 6ea4078-6ea40cb 237 6ea40db-6ea410b Wow64SetThreadContext 234->237 238 6ea40cd-6ea40d9 234->238 240 6ea410d-6ea4113 237->240 241 6ea4114-6ea4144 237->241 238->237 240->241
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06EA40FE
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: a11782ce976670275396774c3c0ad11cda0f0117dbc8295fe2a4ae595f656599
                                                              • Instruction ID: 798d6f686f0b7b2f4a074d01fed1468ed0b41ab1da940189e4b7587394bfd70c
                                                              • Opcode Fuzzy Hash: a11782ce976670275396774c3c0ad11cda0f0117dbc8295fe2a4ae595f656599
                                                              • Instruction Fuzzy Hash: 66213971D00309CFDB50DFA9C4857EEBBF4BF98314F148429D519A7240D7B8A955CBA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 222 6b44ef8-6b44f44 224 6b44f46-6b44f88 MonitorFromPoint 222->224 225 6b44faa-6b44fc5 222->225 228 6b44f91-6b44f9c 224->228 229 6b44f8a-6b44f90 224->229 231 6b44fc7-6b44fd4 225->231 233 6b44fa5-6b44fa8 228->233 229->228 233->231
                                                              APIs
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 06B44F77
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2235677133.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6b40000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: FromMonitorPoint
                                                              • String ID:
                                                              • API String ID: 1566494148-0
                                                              • Opcode ID: e9f84c24fd097bc7e47d662ea828b37e7c2604b75b25b74ecd7dd81c9bc8fe33
                                                              • Instruction ID: 83f50caba2bf07597d5dc35933407b35bf83e37a8f5aeaa1f465e50e2f6b106a
                                                              • Opcode Fuzzy Hash: e9f84c24fd097bc7e47d662ea828b37e7c2604b75b25b74ecd7dd81c9bc8fe33
                                                              • Instruction Fuzzy Hash: 76217AB1A002499FDB50EF99D404BAEFBF5EF88314F10801AE959B7380C774A909CFA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 255 6ea4308-6ea4395 ReadProcessMemory 258 6ea439e-6ea43ce 255->258 259 6ea4397-6ea439d 255->259 259->258
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06EA4388
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: fe8b9d888a2d6afa03d65452a3bb26ff5fa85d413f185477c0eef32ee7812a7a
                                                              • Instruction ID: 01a2202b127ead48d3f99dd4a1283b6dccd6b6c802d1cac90bc70cd00abb868c
                                                              • Opcode Fuzzy Hash: fe8b9d888a2d6afa03d65452a3bb26ff5fa85d413f185477c0eef32ee7812a7a
                                                              • Instruction Fuzzy Hash: 78211671900349DFDB10DFAAC885BDEBBF5FF48320F108429E518A7240C778A514CBA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 245 6ea4080-6ea40cb 247 6ea40db-6ea410b Wow64SetThreadContext 245->247 248 6ea40cd-6ea40d9 245->248 250 6ea410d-6ea4113 247->250 251 6ea4114-6ea4144 247->251 248->247 250->251
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06EA40FE
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 11b1ca8b4a3534c0f94b2a759f4f690aa9c0d97be1742c9187e5571d1faaa55b
                                                              • Instruction ID: 525fc9950f671f75b7fae40585a1733845fb06194fcaba29e4d44f4a40909164
                                                              • Opcode Fuzzy Hash: 11b1ca8b4a3534c0f94b2a759f4f690aa9c0d97be1742c9187e5571d1faaa55b
                                                              • Instruction Fuzzy Hash: 1D213871D00309CFDB10DFAAC8857AEBBF4BF98324F148429D519A7240DBB8A944CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 263 bde008-bde09c DuplicateHandle 264 bde09e-bde0a4 263->264 265 bde0a5-bde0c2 263->265 264->265
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BDE08F
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2228135495.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_bd0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: d86b7edf981a32f185668c2b5e3c928a917f37b78be3b82f202f7e68f0c95836
                                                              • Instruction ID: 998e16a391cffa29bb48f6ef19b5c52cfe840988be8306fe3998963b59254c92
                                                              • Opcode Fuzzy Hash: d86b7edf981a32f185668c2b5e3c928a917f37b78be3b82f202f7e68f0c95836
                                                              • Instruction Fuzzy Hash: ED21E3B59002499FDB10CFAAD984ADEFBF8FB48320F14841AE914A7310D374A950CFA4
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06EA41C6
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 3dbbb20717f3e8e6811679c7b9a78fbb87ccf212f9f18583c760dfded329981b
                                                              • Instruction ID: 8100e2bbb859efdaea9affc7b2db38583224d19bf5553b8fd5717ad3e1e73d71
                                                              • Opcode Fuzzy Hash: 3dbbb20717f3e8e6811679c7b9a78fbb87ccf212f9f18583c760dfded329981b
                                                              • Instruction Fuzzy Hash: 05115672900349CFDB10DFA9C844BEEBFF5BF98320F208819E519A7250C7B5A514CBA1
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06EA41C6
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 91b0bbc2bbe45f5aada4e18b86d2d0b3c6ceab7f189e759e4149da78fc0d34a3
                                                              • Instruction ID: 3933273b181d41e39e2a27441b51bbe93514acec64340a7266151e8f243e0435
                                                              • Opcode Fuzzy Hash: 91b0bbc2bbe45f5aada4e18b86d2d0b3c6ceab7f189e759e4149da78fc0d34a3
                                                              • Instruction Fuzzy Hash: 16115672900349DFDB10DFAAC845BEEBBF5FF88320F108819E519A7250C7B5A510CBA0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 730cd54eac667535fbba808466ba1409b722c3b49fc1d0261c913692455ce87f
                                                              • Instruction ID: 4f9a1cbeda6f5249e9a45fc07587d9906d1a75aded8be971b32b993258120298
                                                              • Opcode Fuzzy Hash: 730cd54eac667535fbba808466ba1409b722c3b49fc1d0261c913692455ce87f
                                                              • Instruction Fuzzy Hash: 2C113A71D00349CFDB10DFAAC8457EEFBF5AF88324F248419D519A7240C775A940CB94
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 3321bc83582d61b8adc9d0c93dcc26c66d30da495c34c446fc6dc9229868d6dc
                                                              • Instruction ID: 65dd4000a70473377b0017dd0615a198c34e9f51f411b1623d32bcfc6ed52a79
                                                              • Opcode Fuzzy Hash: 3321bc83582d61b8adc9d0c93dcc26c66d30da495c34c446fc6dc9229868d6dc
                                                              • Instruction Fuzzy Hash: 571106B1D003498FDB20DFAAC84579EFBF5AF88724F248419D519A7240CB79A944CBA5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 378508b43df184bf30ce9f4c3c2f1321e11b2685de2ecb666f6885ed717857f2
                                                              • Instruction ID: c586aab0d503763a54a08198f65461ae019115379c46040a4791678851c14198
                                                              • Opcode Fuzzy Hash: 378508b43df184bf30ce9f4c3c2f1321e11b2685de2ecb666f6885ed717857f2
                                                              • Instruction Fuzzy Hash: E4112875D003498FDB10DFAAC84579EFBF5AF88324F248819D519A7240CB75A944CBA5
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00BDBD86
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2228135495.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_bd0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: fb1833ff805a9929d905f4ca4a2293ff5306ae8196e4f3b0d88bcb0f51cf5cc5
                                                              • Instruction ID: 6c00c75d2e33ae5eb72cdd59ae5cadaab42a08ff4cfaaf9918fe53c057841f78
                                                              • Opcode Fuzzy Hash: fb1833ff805a9929d905f4ca4a2293ff5306ae8196e4f3b0d88bcb0f51cf5cc5
                                                              • Instruction Fuzzy Hash: 3E11F0B6C00349CBCB10DF9AC444A9EFBF5AF88320F10846AD418A7210D3B5A545CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06EA7A45
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 5163a3bfd6d8606da64e14503133c6eb9c29e995d219aad52d8c1b21cfcc1bbb
                                                              • Instruction ID: d9abc95810eda359b149533cb27432000eb5270db300b025dff1e0e1d4fa0dba
                                                              • Opcode Fuzzy Hash: 5163a3bfd6d8606da64e14503133c6eb9c29e995d219aad52d8c1b21cfcc1bbb
                                                              • Instruction Fuzzy Hash: B61103B5900349DFDB50DF9AC945BDEBBF8FB48324F10941AE918A7200C3B5A954CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06EA7A45
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2236371842.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6ea0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: be0573679ef0e726a696c31f1f53fd409e652ad9c3f2a44ff96ff03ff23b6e17
                                                              • Instruction ID: 84a3e7f3921a57ac5f958d41c01b4ea1e412c5c8d9753209f41debe6bdfc04db
                                                              • Opcode Fuzzy Hash: be0573679ef0e726a696c31f1f53fd409e652ad9c3f2a44ff96ff03ff23b6e17
                                                              • Instruction Fuzzy Hash: B41115B5800349DFDB10CF99D985BEEBBF4FB48324F20941AD519A7200C375A644CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2225884270.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_a6d000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 98e4b822f7b30547fb52360bf8fafa491bac9a742d8d48c3a65d5fed1a904ee6
                                                              • Instruction ID: 0f2c59bf432a43f9e1de4f64a3be910310edbabe84528592a2caba3b6d911395
                                                              • Opcode Fuzzy Hash: 98e4b822f7b30547fb52360bf8fafa491bac9a742d8d48c3a65d5fed1a904ee6
                                                              • Instruction Fuzzy Hash: D2210372A04240EFDB15DF14D9C0B26BF75FB88358F24C569E90A0B656C336D856CAA1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2225884270.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_a6d000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1dd0dfc8c1425cff54170a0a703aa16636aeb498f1d5b554ef4b1ff226a2ac41
                                                              • Instruction ID: 08712b134f05978bb268c096f68abd59c9f7cf93b18f6f2f3c85d797ef4f973e
                                                              • Opcode Fuzzy Hash: 1dd0dfc8c1425cff54170a0a703aa16636aeb498f1d5b554ef4b1ff226a2ac41
                                                              • Instruction Fuzzy Hash: 532136B6A00244EFDB04DF00D9C4B26BF75FB98364F20C168D9090B256C736EC56CAA1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2225964885.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_a7d000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d90687885140fe17256a4e2afe358ffd1d3b84573e39f9d874d222691428acdd
                                                              • Instruction ID: 23d82bf71bf1500841fe6668a7cd8146cc342211478100783728ca72ab5edae6
                                                              • Opcode Fuzzy Hash: d90687885140fe17256a4e2afe358ffd1d3b84573e39f9d874d222691428acdd
                                                              • Instruction Fuzzy Hash: 9321D0B5604204EFDB05DF14D9C0B66BBB5FF84314F24C6ADE90E4B292C776D846CAA1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2225964885.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_a7d000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4cf4db89233aba03888f92e805b0500abe7fbbc5b086743d8ba1eedbd8c8e3a3
                                                              • Instruction ID: 69328d55505df0fd8f3485b2c650ac06d45a005d1b633a23928e0b9ffa1b79c1
                                                              • Opcode Fuzzy Hash: 4cf4db89233aba03888f92e805b0500abe7fbbc5b086743d8ba1eedbd8c8e3a3
                                                              • Instruction Fuzzy Hash: 72210E75604200EFCB14DF24D980B26BBB5FF88314F20C56DE90E0B296C37AD807CA61
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2225884270.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_a6d000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                              • Instruction ID: 1b024368f35371feb3c1e9006481ac3c0680213bbd519baf4661f04e15cd2832
                                                              • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                              • Instruction Fuzzy Hash: CF11E676904280CFCB16CF10D5C4B16BF71FB94318F24C6A9D84A0F656C33AD856CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2225884270.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_a6d000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                              • Instruction ID: 975764cd515c4e868fdebdecdb2f45f6c539aefae921e022fa844f5ea989c9fa
                                                              • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                              • Instruction Fuzzy Hash: 1011E6B6904284DFCB16CF10D5C4B16BF71FB94324F24C6A9D8094F656C33AE856CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2225964885.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_a7d000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                              • Instruction ID: ddcbe480f6cabb983591df35f17d9b265d5b85462379d229d2b116cb8422753d
                                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                              • Instruction Fuzzy Hash: 9A118E75504284DFCB15CF14D9C4B15BB71FB44314F24C6A9D84E4B656C33AD85BCB61
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2225964885.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_a7d000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                              • Instruction ID: aedde42f5afe06d5b9fc19254c5e083657edb133e69d22c2a7e12a679cb03278
                                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                              • Instruction Fuzzy Hash: 7A118BB5504284DFCB15CF10D9C4B55BBB1FF84314F28C6A9D8494B6A6C33AD84ACBA1

                                                              Execution Graph

                                                              Execution Coverage:12.4%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:10.3%
                                                              Total number of Nodes:68
                                                              Total number of Limit Nodes:11
                                                              execution_graph 30427 55aa798 DuplicateHandle 30428 55aa82e 30427->30428 30429 30e1328 30430 30e13a8 30429->30430 30432 30e13b5 30430->30432 30434 30e1736 30430->30434 30435 30e0ab8 30430->30435 30433 30e0ab8 2 API calls 30433->30434 30434->30432 30434->30433 30436 30e0aca 30435->30436 30437 30e0acf 30435->30437 30436->30434 30437->30436 30438 30e0d18 LdrInitializeThunk 30437->30438 30441 30e0da9 30438->30441 30439 30e0e69 30439->30434 30440 30e11f9 LdrInitializeThunk 30440->30439 30441->30439 30441->30440 30442 13146d8 30443 13146e4 30442->30443 30446 1319249 30443->30446 30444 1314713 30447 1319264 30446->30447 30454 1319480 30447->30454 30461 131946f 30447->30461 30448 1319270 30468 30e5aca 30448->30468 30472 30e5ad8 30448->30472 30449 131929a 30449->30444 30455 1319481 30454->30455 30456 131956e 30455->30456 30459 30e0ab8 2 API calls 30455->30459 30476 30e10bc 30455->30476 30482 30e0cd8 30455->30482 30490 30e0aa8 30455->30490 30456->30448 30459->30456 30462 1319480 30461->30462 30463 131956e 30462->30463 30464 30e10bc 3 API calls 30462->30464 30465 30e0aa8 4 API calls 30462->30465 30466 30e0ab8 2 API calls 30462->30466 30467 30e0cd8 4 API calls 30462->30467 30463->30448 30464->30463 30465->30463 30466->30463 30467->30463 30469 30e5afa 30468->30469 30470 30e0cd8 4 API calls 30469->30470 30471 30e5c0c 30469->30471 30470->30471 30471->30449 30473 30e5afa 30472->30473 30474 30e0cd8 4 API calls 30473->30474 30475 30e5c0c 30473->30475 30474->30475 30475->30449 30481 30e0f73 30476->30481 30478 30e10b4 LdrInitializeThunk 30479 30e1211 30478->30479 30479->30456 30480 30e0ab8 2 API calls 30480->30481 30481->30478 30481->30480 30483 30e0d09 LdrInitializeThunk 30482->30483 30486 30e0da9 30483->30486 30485 30e0e69 30485->30456 30486->30485 30488 30e10b4 LdrInitializeThunk 30486->30488 30489 30e0ab8 2 API calls 30486->30489 30488->30485 30489->30486 30491 30e0aca 30490->30491 30492 30e0acf 30490->30492 30491->30456 30492->30491 30493 30e0d18 LdrInitializeThunk 30492->30493 30498 30e0da9 30493->30498 30494 30e0e69 30494->30456 30495 30e10b4 LdrInitializeThunk 30495->30494 30497 30e0ab8 2 API calls 30497->30498 30498->30494 30498->30495 30498->30497 30499 55aa550 30500 55aa596 GetCurrentProcess 30499->30500 30502 55aa5e8 GetCurrentThread 30500->30502 30503 55aa5e1 30500->30503 30504 55aa61e 30502->30504 30505 55aa625 GetCurrentProcess 30502->30505 30503->30502 30504->30505 30506 55aa65b 30505->30506 30507 55aa683 GetCurrentThreadId 30506->30507 30508 55aa6b4 30507->30508
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: N
                                                              • API String ID: 0-1130791706
                                                              • Opcode ID: be01f056258d96f23d7645448c9d08f062dba4f588c1727f6fe3047a619da9c0
                                                              • Instruction ID: 0b3144ae383e9f70ab2ddca6f5a90613e27b718eec4aded37fe2a9114cbe85c7
                                                              • Opcode Fuzzy Hash: be01f056258d96f23d7645448c9d08f062dba4f588c1727f6fe3047a619da9c0
                                                              • Instruction Fuzzy Hash: DB73F531C1075A8EDB11EF68C844A99FBB1FF99304F14D69AE44877225EB70AAC5CF81

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 609 30e0ab8-30e0ac8 610 30e0acf-30e0adb 609->610 611 30e0aca 609->611 614 30e0add 610->614 615 30e0ae2-30e0af7 610->615 612 30e0bfb-30e0c05 611->612 614->612 618 30e0afd-30e0b08 615->618 619 30e0c0b-30e0c4b 615->619 622 30e0b0e-30e0b15 618->622 623 30e0c06 618->623 637 30e0c52-30e0cc8 619->637 624 30e0b17-30e0b2e 622->624 625 30e0b42-30e0b4d 622->625 623->619 636 30e0b34-30e0b37 624->636 624->637 630 30e0b4f-30e0b57 625->630 631 30e0b5a-30e0b64 625->631 630->631 638 30e0bee-30e0bf3 631->638 639 30e0b6a-30e0b74 631->639 636->623 640 30e0b3d-30e0b40 636->640 666 30e0cca-30e0d07 637->666 667 30e0d18-30e0da4 LdrInitializeThunk 637->667 638->612 639->623 646 30e0b7a-30e0b96 639->646 640->624 640->625 651 30e0b9a-30e0b9d 646->651 652 30e0b98 646->652 653 30e0b9f-30e0ba2 651->653 654 30e0ba4-30e0ba7 651->654 652->612 656 30e0baa-30e0bb8 653->656 654->656 656->623 660 30e0bba-30e0bc1 656->660 660->612 661 30e0bc3-30e0bc9 660->661 661->623 663 30e0bcb-30e0bd0 661->663 663->623 664 30e0bd2-30e0be5 663->664 664->623 672 30e0be7-30e0bea 664->672 669 30e0d0e-30e0d15 666->669 670 30e0d09 666->670 671 30e0e43-30e0e49 667->671 669->667 670->669 673 30e0e4f-30e0e67 671->673 674 30e0da9-30e0dbc 671->674 672->661 675 30e0bec 672->675 676 30e0e7b-30e0e8e 673->676 677 30e0e69-30e0e76 673->677 678 30e0dbe 674->678 679 30e0dc3-30e0e14 674->679 675->612 681 30e0e95-30e0eb1 676->681 682 30e0e90 676->682 680 30e1211-30e130f 677->680 678->679 695 30e0e16-30e0e24 679->695 696 30e0e27-30e0e39 679->696 687 30e1317-30e1321 680->687 688 30e1311-30e1316 680->688 684 30e0eb8-30e0edc 681->684 685 30e0eb3 681->685 682->681 691 30e0ede 684->691 692 30e0ee3-30e0f15 684->692 685->684 688->687 691->692 701 30e0f1c-30e0f5e 692->701 702 30e0f17 692->702 695->673 698 30e0e3b 696->698 699 30e0e40 696->699 698->699 699->671 704 30e0f65-30e0f6e 701->704 705 30e0f60 701->705 702->701 706 30e1196-30e119c 704->706 705->704 707 30e11a2-30e11b5 706->707 708 30e0f73-30e0f98 706->708 711 30e11bc-30e11d7 707->711 712 30e11b7 707->712 709 30e0f9f-30e0fd6 708->709 710 30e0f9a 708->710 720 30e0fdd-30e100f 709->720 721 30e0fd8 709->721 710->709 713 30e11de-30e11f2 711->713 714 30e11d9 711->714 712->711 718 30e11f9-30e120f LdrInitializeThunk 713->718 719 30e11f4 713->719 714->713 718->680 719->718 723 30e1073-30e1086 720->723 724 30e1011-30e1036 720->724 721->720 727 30e108d-30e10b2 723->727 728 30e1088 723->728 725 30e103d-30e106b 724->725 726 30e1038 724->726 725->723 726->725 731 30e10b4-30e10b5 727->731 732 30e10c1-30e10f9 727->732 728->727 731->707 733 30e10fb 732->733 734 30e1100-30e1161 call 30e0ab8 732->734 733->734 740 30e1168-30e118c 734->740 741 30e1163 734->741 744 30e118e 740->744 745 30e1193 740->745 741->740 744->745 745->706
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3424666482.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_30e0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 3dda906b5df28504221b27b05508543f7d8c90155d208ed729e30c58432e3beb
                                                              • Instruction ID: 72049b6bb1de4da63849105aa55ac958de077aff51fe5a352ddf245dc077953d
                                                              • Opcode Fuzzy Hash: 3dda906b5df28504221b27b05508543f7d8c90155d208ed729e30c58432e3beb
                                                              • Instruction Fuzzy Hash: E6222974E01219CFDB18DFA9C884B9EFBB2BF88304F1485A9D409AB355DB719986CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1263 30e0cd8-30e0d07 1264 30e0d0e-30e0da4 LdrInitializeThunk 1263->1264 1265 30e0d09 1263->1265 1267 30e0e43-30e0e49 1264->1267 1265->1264 1268 30e0e4f-30e0e67 1267->1268 1269 30e0da9-30e0dbc 1267->1269 1270 30e0e7b-30e0e8e 1268->1270 1271 30e0e69-30e0e76 1268->1271 1272 30e0dbe 1269->1272 1273 30e0dc3-30e0e14 1269->1273 1275 30e0e95-30e0eb1 1270->1275 1276 30e0e90 1270->1276 1274 30e1211-30e130f 1271->1274 1272->1273 1289 30e0e16-30e0e24 1273->1289 1290 30e0e27-30e0e39 1273->1290 1281 30e1317-30e1321 1274->1281 1282 30e1311-30e1316 1274->1282 1278 30e0eb8-30e0edc 1275->1278 1279 30e0eb3 1275->1279 1276->1275 1285 30e0ede 1278->1285 1286 30e0ee3-30e0f15 1278->1286 1279->1278 1282->1281 1285->1286 1295 30e0f1c-30e0f5e 1286->1295 1296 30e0f17 1286->1296 1289->1268 1292 30e0e3b 1290->1292 1293 30e0e40 1290->1293 1292->1293 1293->1267 1298 30e0f65-30e0f6e 1295->1298 1299 30e0f60 1295->1299 1296->1295 1300 30e1196-30e119c 1298->1300 1299->1298 1301 30e11a2-30e11b5 1300->1301 1302 30e0f73-30e0f98 1300->1302 1305 30e11bc-30e11d7 1301->1305 1306 30e11b7 1301->1306 1303 30e0f9f-30e0fd6 1302->1303 1304 30e0f9a 1302->1304 1314 30e0fdd-30e100f 1303->1314 1315 30e0fd8 1303->1315 1304->1303 1307 30e11de-30e11f2 1305->1307 1308 30e11d9 1305->1308 1306->1305 1312 30e11f9-30e120f LdrInitializeThunk 1307->1312 1313 30e11f4 1307->1313 1308->1307 1312->1274 1313->1312 1317 30e1073-30e1086 1314->1317 1318 30e1011-30e1036 1314->1318 1315->1314 1321 30e108d-30e10b2 1317->1321 1322 30e1088 1317->1322 1319 30e103d-30e106b 1318->1319 1320 30e1038 1318->1320 1319->1317 1320->1319 1325 30e10b4-30e10b5 1321->1325 1326 30e10c1-30e10f9 1321->1326 1322->1321 1325->1301 1327 30e10fb 1326->1327 1328 30e1100-30e1161 call 30e0ab8 1326->1328 1327->1328 1334 30e1168-30e118c 1328->1334 1335 30e1163 1328->1335 1338 30e118e 1334->1338 1339 30e1193 1334->1339 1335->1334 1338->1339 1339->1300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3424666482.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_30e0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 245fa79b5acd2fe248e445951a1b6ce84b4324daca2e77b3fa45e3a5a9506e13
                                                              • Instruction ID: ef6ef66501f60d372a041ccbcb4f22d9b2e609f1ded0c2903aeca564b69387ba
                                                              • Opcode Fuzzy Hash: 245fa79b5acd2fe248e445951a1b6ce84b4324daca2e77b3fa45e3a5a9506e13
                                                              • Instruction Fuzzy Hash: 0631E7B1E016189BEB18CFABD8847DDFBF6BF88314F14C66AD418A72A4DB7049458F10

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2514 13127b9-13127e4 2515 1312805-1312858 2514->2515 2516 13127e6-1312804 2514->2516 2518 131287a-13128f0 2515->2518 2519 131285a-1312878 2515->2519 2516->2515 2520 1312912-1312918 2518->2520 2521 13128f2-1312910 2518->2521 2519->2518 2522 131291a-131292c 2520->2522 2523 131293c 2520->2523 2521->2520 2524 131294e-1312955 2522->2524 2525 131292e-1312934 2522->2525 2526 131295e-1312978 2523->2526 2527 131293e-131294d 2523->2527 2530 1312956-131295c 2524->2530 2525->2530 2531 1312936-131293a 2525->2531 2528 131299a-131299d 2526->2528 2529 131297a-131297c 2526->2529 2527->2524 2532 131299e-13129a1 2528->2532 2529->2532 2533 131297e-1312980 2529->2533 2530->2526 2531->2523 2534 13129a2-13129a4 2532->2534 2533->2534 2535 1312982-1312984 2533->2535 2536 13129a6-13129a8 2534->2536 2535->2536 2537 1312986-1312988 2535->2537 2538 13129aa-1312a54 2536->2538 2537->2538 2539 131298a-1312999 2537->2539 2541 1312a56-1312a77 2538->2541 2542 1312a79-1312b38 2538->2542 2539->2528 2541->2542 2543 1312b3a-1312b5b 2542->2543 2544 1312b5d-1312c50 2542->2544 2543->2544 2545 1312c52-1312c75 2544->2545 2546 1312c77-1312c7a 2544->2546 2547 1312c7d-1312c82 2546->2547 2548 1312c7c 2546->2548 2550 1312c85-1312ca1 2547->2550 2551 1312c84 2547->2551 2548->2547 2554 1312ca3-1312ca5 2550->2554 2555 1312cb2-1312cba 2550->2555 2551->2550 2556 1312ca7-1312ca9 2554->2556 2557 1312cab-1312cb0 2554->2557 2559 1312cbc-1312cca 2555->2559 2556->2559 2557->2559 2561 1312ce0-1312ce8 2559->2561 2562 1312ccc-1312cce 2559->2562 2565 1312ceb-1312cee 2561->2565 2563 1312cd0-1312cd5 2562->2563 2564 1312cd7-1312cde 2562->2564 2563->2565 2564->2565 2567 1312cf0-1312cfe 2565->2567 2568 1312d05-1312d09 2565->2568 2567->2568 2576 1312d00 2567->2576 2569 1312d22-1312d25 2568->2569 2570 1312d0b-1312d19 2568->2570 2571 1312d27-1312d2b 2569->2571 2572 1312d2d-1312d62 2569->2572 2570->2569 2579 1312d1b 2570->2579 2571->2572 2575 1312d64-1312d7b 2571->2575 2581 1312dc4-1312dc9 2572->2581 2577 1312d81-1312d8d 2575->2577 2578 1312d7d-1312d7f 2575->2578 2576->2568 2582 1312d97-1312da1 2577->2582 2583 1312d8f-1312d95 2577->2583 2578->2581 2579->2569 2584 1312da9-1312dbd 2582->2584 2585 1312da3 2582->2585 2583->2584 2584->2581 2585->2584
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6d6cbed86bbc489d497df213121787921e5d1328eee9dae6732be0e7ffa25ba5
                                                              • Instruction ID: 6ee006ec5b20f2468af609bc58730f6e93bfbd45873f91caec322125b3b76a1f
                                                              • Opcode Fuzzy Hash: 6d6cbed86bbc489d497df213121787921e5d1328eee9dae6732be0e7ffa25ba5
                                                              • Instruction Fuzzy Hash: 7542F73255A3A58FC74F5F74D45A2A73FB1AF6B21C36814ECD483CA4B5E2AA1483CB05
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1622999d20a28d95fdabc764233077068eba660447526cda93c080dbf4cd2f43
                                                              • Instruction ID: 4b5e597b2a1c0f672bc60430bd36118e19f525f49f20988115ed1f499adf65dd
                                                              • Opcode Fuzzy Hash: 1622999d20a28d95fdabc764233077068eba660447526cda93c080dbf4cd2f43
                                                              • Instruction Fuzzy Hash: E7C1B0319053298FCB9EAF78D4452EB7BB2FF59304F6058A9D142EB1A8E7314983CB40
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 76fbe00e0a1d41bc6b5d39629eaf2bb3fa1029b57b2d2a742f0116ffa6591dc9
                                                              • Instruction ID: 04d23e52d8457aa1faf120dde27c05eb4bc3bae1884dab3e9410f932baf443e9
                                                              • Opcode Fuzzy Hash: 76fbe00e0a1d41bc6b5d39629eaf2bb3fa1029b57b2d2a742f0116ffa6591dc9
                                                              • Instruction Fuzzy Hash: 69C19E74E01218CFEB14DFA5D994B9DBBB2FB88304F2081A9D809A7365DB355E85CF11
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a372931a3193a3509b4faeb941773ab4531f09e7d02e00bfc3b54ee2e5c785a8
                                                              • Instruction ID: fb401aa7eb1fecb3adff4a69be27a23b2983dd201d684adbe21458e9b48323a8
                                                              • Opcode Fuzzy Hash: a372931a3193a3509b4faeb941773ab4531f09e7d02e00bfc3b54ee2e5c785a8
                                                              • Instruction Fuzzy Hash: 83A12371D006598FDB14DFA9C884BEDFBB1EF89314F10D2AAD408A7265EB709A85CF40
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 51d4810a312776762b8bd2330eb2e745a03c541b14f207e639283cd163afb9ae
                                                              • Instruction ID: 358ebdc475c9f5ab875ed4aa73ba47988fb6bba0ac192af9ca94cda814b5ed31
                                                              • Opcode Fuzzy Hash: 51d4810a312776762b8bd2330eb2e745a03c541b14f207e639283cd163afb9ae
                                                              • Instruction Fuzzy Hash: D2A11570D00208CFEB24DFA9C958BEDBBB1FF89314F208269D409A72A5DB759985CF50
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7ea013f27d725fc34ef29269001262efbec95fc92586b07961ea97f3c34f802a
                                                              • Instruction ID: f006036ce2549d4fff963b19be1afcf877d92e54d4d45f57841c2b84bdd1866d
                                                              • Opcode Fuzzy Hash: 7ea013f27d725fc34ef29269001262efbec95fc92586b07961ea97f3c34f802a
                                                              • Instruction Fuzzy Hash: 0C911570D00208CFEB24DFA8C458BDCBBB1FF49318F209259E409AB295DB759985CF14
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6bc205682571c0ec7e84fedd3c79b606d779e1158870a4f84aae35b92ee3e0d6
                                                              • Instruction ID: 1e4cd9693921776751ec8b779b2695d583675404275d833d95cc7e3599cc2ef6
                                                              • Opcode Fuzzy Hash: 6bc205682571c0ec7e84fedd3c79b606d779e1158870a4f84aae35b92ee3e0d6
                                                              • Instruction Fuzzy Hash: 4341D374E01248CBEB18DFAAD95479DFBB2BF88304F24C12AC815BB259EB345945CF54

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 055AA5CE
                                                              • GetCurrentThread.KERNEL32 ref: 055AA60B
                                                              • GetCurrentProcess.KERNEL32 ref: 055AA648
                                                              • GetCurrentThreadId.KERNEL32 ref: 055AA6A1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3427607632.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_55a0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID: Ltv
                                                              • API String ID: 2063062207-427712718
                                                              • Opcode ID: 4b613e48edf0474dafc7981a43780876ae8086a740cbc09136fb2474aa5ce1a3
                                                              • Instruction ID: cd5867807092fa11673c1e31631dc23d6f70b8bbf7a911c9b4cc13c87f786b68
                                                              • Opcode Fuzzy Hash: 4b613e48edf0474dafc7981a43780876ae8086a740cbc09136fb2474aa5ce1a3
                                                              • Instruction Fuzzy Hash: FD5165B190130A8FDB14CFAAD948BAEBBF1FF88314F20805DD019A7250DB789944CF65

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 055AA5CE
                                                              • GetCurrentThread.KERNEL32 ref: 055AA60B
                                                              • GetCurrentProcess.KERNEL32 ref: 055AA648
                                                              • GetCurrentThreadId.KERNEL32 ref: 055AA6A1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3427607632.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_55a0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID: Ltv
                                                              • API String ID: 2063062207-427712718
                                                              • Opcode ID: 90160d3a3bee47df85c1ead8c20b11dcc4ebdc0542b4a89085e2b3b69a769d13
                                                              • Instruction ID: 414e8dcfa97f0e44d94886311af69fd44741b456ee555b831fe9499c25924ec3
                                                              • Opcode Fuzzy Hash: 90160d3a3bee47df85c1ead8c20b11dcc4ebdc0542b4a89085e2b3b69a769d13
                                                              • Instruction Fuzzy Hash: 165165B190134A8FDB14DFAAD948BAEBBF1FF88314F20805DD119A7250DB789944CF66

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 598 55aa792-55aa793 599 55aa798-55aa82c DuplicateHandle 598->599 600 55aa82e-55aa834 599->600 601 55aa835-55aa852 599->601 600->601
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 055AA81F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3427607632.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_55a0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID: Ltv
                                                              • API String ID: 3793708945-427712718
                                                              • Opcode ID: 73f29cc7b0c1d41f4ff5586bd1643662839d3f6491466988e8d5900d63b117d4
                                                              • Instruction ID: 7c7bd9df30f530b0ec88b6d9931ed8ff01633ac53dc26364edfd2a7940db37a5
                                                              • Opcode Fuzzy Hash: 73f29cc7b0c1d41f4ff5586bd1643662839d3f6491466988e8d5900d63b117d4
                                                              • Instruction Fuzzy Hash: A821B5B59002499FDB10CF9AD984ADEBFF4FF48320F14841AE914A7350D778A954CF65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 604 55aa798-55aa82c DuplicateHandle 605 55aa82e-55aa834 604->605 606 55aa835-55aa852 604->606 605->606
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 055AA81F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3427607632.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_55a0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID: Ltv
                                                              • API String ID: 3793708945-427712718
                                                              • Opcode ID: 919e799b03957d9a5c1b4fb74e179932734eb9be415ced31d0805f01a1b94cf6
                                                              • Instruction ID: bf46d027849acbe3eb0c53edcefdf5f0a6ecb3f4fcc493b18fdb7f61f3948aeb
                                                              • Opcode Fuzzy Hash: 919e799b03957d9a5c1b4fb74e179932734eb9be415ced31d0805f01a1b94cf6
                                                              • Instruction Fuzzy Hash: ED21B3B59002499FDB10CF9AD984ADEBBF4FB48320F14841AE918A3250D374A954CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1179 131ad3d-131afaf call 131a428 1184 131afb5-131afb7 1179->1184 1185 131b18b-131b196 1179->1185 1186 131b19d-131b1a8 1184->1186 1187 131afbd-131afc1 1184->1187 1185->1186 1192 131b1af-131b1ba 1186->1192 1187->1186 1188 131afc7-131afff call 131ab68 1187->1188 1188->1192 1201 131b005-131b009 1188->1201 1197 131b1c1-131b1cc 1192->1197 1202 131b1d3-131b1ff 1197->1202 1203 131b015-131b019 1201->1203 1204 131b00b-131b00f 1201->1204 1233 131b206-131b232 1202->1233 1205 131b024-131b028 1203->1205 1206 131b01b-131b022 1203->1206 1204->1197 1204->1203 1208 131b040-131b044 1205->1208 1209 131b02a-131b02e 1205->1209 1206->1208 1212 131b046-131b048 1208->1212 1213 131b04b-131b052 1208->1213 1210 131b030-131b037 1209->1210 1211 131b039 1209->1211 1210->1208 1211->1208 1212->1213 1215 131b054 1213->1215 1216 131b05b-131b05f 1213->1216 1215->1216 1217 131b110-131b113 1215->1217 1218 131b179-131b184 1215->1218 1219 131b0dd-131b0e0 1215->1219 1220 131b0ae-131b0b1 1215->1220 1221 131b065-131b069 1216->1221 1222 131b13e-131b141 1216->1222 1226 131b115 1217->1226 1227 131b11a-131b139 1217->1227 1218->1185 1224 131b0e2-131b0e5 1219->1224 1225 131b0eb-131b10e 1219->1225 1228 131b0b3-131b0b6 1220->1228 1229 131b0bc-131b0db 1220->1229 1221->1218 1230 131b06f-131b072 1221->1230 1231 131b151-131b174 1222->1231 1232 131b143-131b146 1222->1232 1224->1225 1224->1233 1252 131b097-131b09b 1225->1252 1226->1227 1227->1252 1228->1202 1228->1229 1229->1252 1236 131b074 1230->1236 1237 131b079-131b095 1230->1237 1231->1252 1232->1231 1238 131b148-131b14b 1232->1238 1239 131b239-131b27a 1233->1239 1236->1237 1237->1252 1238->1231 1238->1239 1261 131b09e call 131b500 1252->1261 1262 131b09e call 131b4ef 1252->1262 1255 131b0a4-131b0ab 1261->1255 1262->1255
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID: 0-3916222277
                                                              • Opcode ID: 5d6693d0eeb1d87f6bf8021332dfb11c189507c8c9b0f70f0d4011e13d05de24
                                                              • Instruction ID: d6dcc7501b583f16a8251c0352e70866623a067b2a927b6f1d5bc0d8c36aa89b
                                                              • Opcode Fuzzy Hash: 5d6693d0eeb1d87f6bf8021332dfb11c189507c8c9b0f70f0d4011e13d05de24
                                                              • Instruction Fuzzy Hash: 3481B4307002059FDF2AAF78D45827EBAA2EFC9374F148229E9269B3D8CB358C01C751

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1340 30e10bc 1341 30e117b-30e118c 1340->1341 1342 30e118e 1341->1342 1343 30e1193-30e119c 1341->1343 1342->1343 1345 30e11a2-30e11b5 1343->1345 1346 30e0f73-30e0f98 1343->1346 1349 30e11bc-30e11d7 1345->1349 1350 30e11b7 1345->1350 1347 30e0f9f-30e0fd6 1346->1347 1348 30e0f9a 1346->1348 1359 30e0fdd-30e100f 1347->1359 1360 30e0fd8 1347->1360 1348->1347 1351 30e11de-30e11f2 1349->1351 1352 30e11d9 1349->1352 1350->1349 1356 30e11f9-30e120f LdrInitializeThunk 1351->1356 1357 30e11f4 1351->1357 1352->1351 1358 30e1211-30e130f 1356->1358 1357->1356 1363 30e1317-30e1321 1358->1363 1364 30e1311-30e1316 1358->1364 1365 30e1073-30e1086 1359->1365 1366 30e1011-30e1036 1359->1366 1360->1359 1364->1363 1370 30e108d-30e10b2 1365->1370 1371 30e1088 1365->1371 1367 30e103d-30e106b 1366->1367 1368 30e1038 1366->1368 1367->1365 1368->1367 1374 30e10b4-30e10b5 1370->1374 1375 30e10c1-30e10f9 1370->1375 1371->1370 1374->1345 1376 30e10fb 1375->1376 1377 30e1100-30e1161 call 30e0ab8 1375->1377 1376->1377 1383 30e1168-30e117a 1377->1383 1384 30e1163 1377->1384 1383->1341 1384->1383
                                                              APIs
                                                              • LdrInitializeThunk.NTDLL(00000000), ref: 030E11FE
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3424666482.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_30e0000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 75e70bca732d1bd3e5f57b94279b19e3b238309457aed02f4795feb311b800ee
                                                              • Instruction ID: a9e1183b3490e343dac921dc46f2588a05a4a824ffc4800d4fca1e9d3d4d8920
                                                              • Opcode Fuzzy Hash: 75e70bca732d1bd3e5f57b94279b19e3b238309457aed02f4795feb311b800ee
                                                              • Instruction Fuzzy Hash: F2114F78F021199FDB08DBA8D884BADB7F5FB88315F1482A5E804A7355D771DC42CB54
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ba0b854635ced72cb2ca506466eb8906461eb1404a0bc0058ecfa28807fdc181
                                                              • Instruction ID: c6145c37c0c51b53830b7a6dd7664da995e0b8820d138430d9490bf31deea57e
                                                              • Opcode Fuzzy Hash: ba0b854635ced72cb2ca506466eb8906461eb1404a0bc0058ecfa28807fdc181
                                                              • Instruction Fuzzy Hash: 89D1D471B002048FDB19DB6CC490AAEBBB6FFC9324F144569D506EB3A9DA71DC42CB91
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9e38437c8f940aff83259db54758d568f42f6bd109a16843784e467d319dbd7a
                                                              • Instruction ID: 459c1a9b44cc17c5e0ec8030d863388e67531466bebde3ccd5796eddbe1810f5
                                                              • Opcode Fuzzy Hash: 9e38437c8f940aff83259db54758d568f42f6bd109a16843784e467d319dbd7a
                                                              • Instruction Fuzzy Hash: 10A13B74A0024ACFCB48DFA9EA8499DBFB1FF88304B104269D515BB369DB746D85CF81
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e74c616de54b95955a8174c19053c7cbddc3350ec013acad8ae021478e75d2b9
                                                              • Instruction ID: dd8bbbefb3f6fa2f192269690ca3d00547ab66fd3042fa6068e801e7ce314863
                                                              • Opcode Fuzzy Hash: e74c616de54b95955a8174c19053c7cbddc3350ec013acad8ae021478e75d2b9
                                                              • Instruction Fuzzy Hash: 0A510472A443059FC728CBADD840A6BBBF9FBCA328F14853EE519D7754D631E8018790
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9bcde6419ad5dd9aa88982efc6583ca47374f233278c564670b89af3391782f2
                                                              • Instruction ID: 0e608a21d5d992a155f372af38abd2e8d8d40940b8747676cde4212acc88b317
                                                              • Opcode Fuzzy Hash: 9bcde6419ad5dd9aa88982efc6583ca47374f233278c564670b89af3391782f2
                                                              • Instruction Fuzzy Hash: 30A11C74A1020ACFDF48DFA9EA8499DBBB2FB88304F105129D515BB368DB746D85CF80
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 48ff261d721aa8568ab25be3edfadefa0d75358c5f52f4b4921eee86970b4ba2
                                                              • Instruction ID: 8219b4380bca5ef6195423b1f586d2b3adcd3a91aee255baef551fd42945e3d8
                                                              • Opcode Fuzzy Hash: 48ff261d721aa8568ab25be3edfadefa0d75358c5f52f4b4921eee86970b4ba2
                                                              • Instruction Fuzzy Hash: 8A51CF74E00208CFDB48DFAAD584A9DFBF2BF89314F108429E815AB368DB749945CF50
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1fd9a219abeea76772c6041c518cce7d1587a66f6c1b57e112e4106ca0e033af
                                                              • Instruction ID: e29091afd5dd2cedc5e607d78c1692dccafcee8636eaa93b51ca0757fe1fc552
                                                              • Opcode Fuzzy Hash: 1fd9a219abeea76772c6041c518cce7d1587a66f6c1b57e112e4106ca0e033af
                                                              • Instruction Fuzzy Hash: 06318E31A002099FDB48EFB8D854ABE7BF6EFC9214F10847AE509DB259DE308902CB50
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 016132ef1bfd581736697ef49c6ae9817a7c4d45fcc61923b0a8567dbcf38bc9
                                                              • Instruction ID: c09cf062c8b9c1d2b5a3a6a0072038b01e568f2e50c936fdd034d6e2a9bdd0c0
                                                              • Opcode Fuzzy Hash: 016132ef1bfd581736697ef49c6ae9817a7c4d45fcc61923b0a8567dbcf38bc9
                                                              • Instruction Fuzzy Hash: B041A274E01208DFCB08DFAAD98499DBBB2FF89310F249569E805B7368DB359841CF14
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 56dfb42b11dd988f33154743dcb1284faa55f779af15e23f0c359657c6d01e5a
                                                              • Instruction ID: 131b224e601ace54a18216de3a473731ffead0c07b967649fd918ba3254c8ab3
                                                              • Opcode Fuzzy Hash: 56dfb42b11dd988f33154743dcb1284faa55f779af15e23f0c359657c6d01e5a
                                                              • Instruction Fuzzy Hash: 0031CB710A634ACFD2603B61A5EC17ABBA0FB4F337F09ED15E02A825599B3051848F90
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a9c7aad10f5c3496273af7a5572e5d740f9a709c1816a3a525d7f41e82a643eb
                                                              • Instruction ID: 6d5c21d1c5604cf053c05017d6fd3d6a4aaf4fc9562f65dab26b69aab52d97ef
                                                              • Opcode Fuzzy Hash: a9c7aad10f5c3496273af7a5572e5d740f9a709c1816a3a525d7f41e82a643eb
                                                              • Instruction Fuzzy Hash: B0310835B001098FDB49DBA8C480E9DBBB6FF88324F555554E501EB369DA71EC46CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 09081870bece27ea6af398e8e21e3e2487d7313a39c9d5437aa5d6f79623c260
                                                              • Instruction ID: eb7da3383320f50800996168a03b512aa94d64c162d6ddcb661a894d28884223
                                                              • Opcode Fuzzy Hash: 09081870bece27ea6af398e8e21e3e2487d7313a39c9d5437aa5d6f79623c260
                                                              • Instruction Fuzzy Hash: 0D311935B001098FDB49DBA8C480E9DBBB2FF88324F555554E501EF369DA71EC46CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 583156dda6e2da11530e939b13b13b1e15b42e5c6f92e57b7800483c4ceca565
                                                              • Instruction ID: 71defe6d08a5a8a2d92851c98329598a853f73c5a10d928549824da1441e75fb
                                                              • Opcode Fuzzy Hash: 583156dda6e2da11530e939b13b13b1e15b42e5c6f92e57b7800483c4ceca565
                                                              • Instruction Fuzzy Hash: 0521D130B042099FDB19EF68D960A6EBFB6FFD5314F24806AD5099B259CE318D05CB91
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d8f36b1dc4b7d1ebbf16be96a5d7b379c6263a3b7f576906b63380427a322fc4
                                                              • Instruction ID: fa8ef97f874b17d98b5ec040f1303b58a555b3ccd86137d5eccd7516e0fc8c89
                                                              • Opcode Fuzzy Hash: d8f36b1dc4b7d1ebbf16be96a5d7b379c6263a3b7f576906b63380427a322fc4
                                                              • Instruction Fuzzy Hash: 01318B30A04249CFDB0DEBB9D4402AEBBB2FB85308F0085AAD455AB298DB744989CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c4e60004bd6b238379b6632e69c5f8b6f8714444be08222366ec495569bd1ed9
                                                              • Instruction ID: 420cd99256d03fe635690aadcb952b24365aec14c3977a7feb3eec1eec663d51
                                                              • Opcode Fuzzy Hash: c4e60004bd6b238379b6632e69c5f8b6f8714444be08222366ec495569bd1ed9
                                                              • Instruction Fuzzy Hash: 7A21C131A0014A9FCF18DF38D4409EE77A5EBC9364B50C059E919AB344EB35EE46CBD1
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 48989cecf2668cd38c79d3eef0ad665a94b85e454beb59a23ef971c6c8a1f7c5
                                                              • Instruction ID: c3866358aa875b332462804e0b988ea796fcd0b678e987b916f83d1672b7c2f0
                                                              • Opcode Fuzzy Hash: 48989cecf2668cd38c79d3eef0ad665a94b85e454beb59a23ef971c6c8a1f7c5
                                                              • Instruction Fuzzy Hash: 75219F70E04249DFDB0CEFB9C4406AEBBB2FF84308F0084A99415AB298DB749944CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421239958.00000000012BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_12bd000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4fd21f9caac712c5bb9e0146c1b93c9be92c5fde36f9594f0b305afab48b9a88
                                                              • Instruction ID: 8fe97d240cdae8ba14cf727f695cc8675e1cf8281ead1644784176a114fef825
                                                              • Opcode Fuzzy Hash: 4fd21f9caac712c5bb9e0146c1b93c9be92c5fde36f9594f0b305afab48b9a88
                                                              • Instruction Fuzzy Hash: 02216471524208EFCB14DF54D9C0BA6BBA1FB84398F20C96DDA0A0B252C37BD407CB62
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 38fb370550580a5cf7cb6c3305b8773c2e1c1dd6030663b48217e26740ea5b56
                                                              • Instruction ID: 5ef5687f2eb7aa3860016de0eb76477d232c1dfa97adee9b5262bd7bcb9e3d62
                                                              • Opcode Fuzzy Hash: 38fb370550580a5cf7cb6c3305b8773c2e1c1dd6030663b48217e26740ea5b56
                                                              • Instruction Fuzzy Hash: A0113A72740204CFD728DB69D994A66BBF5FF98725F20806AE1498B769CA71D805CB10
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 036a0b1f3c54cfd3bfc9d267846ed04048aa3ff2f298ca2835505056eac77b84
                                                              • Instruction ID: 2bd885ad0c8ec9d41a1308c5ec398664e78f99489339d816fa4036495df59352
                                                              • Opcode Fuzzy Hash: 036a0b1f3c54cfd3bfc9d267846ed04048aa3ff2f298ca2835505056eac77b84
                                                              • Instruction Fuzzy Hash: 9021E370C1524A8FCB15DFB8D9845EEBFB4AF0A314F0442AAD405B7225EB345A85CBA5
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0bff90809bd8ee3c337a55c292fa70393fb3c591c5d66d1c6bef802c95d31794
                                                              • Instruction ID: c2cdd82375da2c4eae0f1c6ab347f5506dfee0bf1a1f6d193d276566aa84fad3
                                                              • Opcode Fuzzy Hash: 0bff90809bd8ee3c337a55c292fa70393fb3c591c5d66d1c6bef802c95d31794
                                                              • Instruction Fuzzy Hash: 3701D232B012414FD7289AB98C4456A7BEBAFC5368B14453ADE05CB359FE71C8018795
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 830cba31e5d394c1f377fdbfe29818f07dc94bebde9e20bddcf48f74cd72655f
                                                              • Instruction ID: 41bb5e078edbdf5cf88b67912dd2d0753ec27b6368a6043ad29aa1580407591d
                                                              • Opcode Fuzzy Hash: 830cba31e5d394c1f377fdbfe29818f07dc94bebde9e20bddcf48f74cd72655f
                                                              • Instruction Fuzzy Hash: 07117335E8021A8BCB68EFBC984469EBBF5AF88154B045535C509E3308DB319C4287E1
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421239958.00000000012BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_12bd000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                              • Instruction ID: 12df960b328f2e856cc4becd7d686a64b7e5dc4e3eedddd4887cb15a7d114021
                                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                              • Instruction Fuzzy Hash: 5E11BB75504288CFCB12CF54D5C0B95BBA1FB84318F28CAAAD9494B666C33AD44ACB62
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0a2f086936694b7d5933529f9eb1cc275cbbb9ae009a499f11d83499215ab76c
                                                              • Instruction ID: b5144ffbeeef3f6013cfe7843175e9da0bdc3d30811ecc2f19341fd653d29f9e
                                                              • Opcode Fuzzy Hash: 0a2f086936694b7d5933529f9eb1cc275cbbb9ae009a499f11d83499215ab76c
                                                              • Instruction Fuzzy Hash: 9E014C32A083499FCF2D96A884015F87B79AF9329C74445AFF581D750ADA718C8DCB11
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 58444700e0cfd792748cba8d3848a2f9f2aab93083e6b1ae4cb58161ce849f1c
                                                              • Instruction ID: 18d9e330d7d0d9b7eb4598bd1cb3b5699e818752a31c06c544971aa2b4ee0ff3
                                                              • Opcode Fuzzy Hash: 58444700e0cfd792748cba8d3848a2f9f2aab93083e6b1ae4cb58161ce849f1c
                                                              • Instruction Fuzzy Hash: BF016D32B012554FD728ABBA884852EBAEBAFC46647104539DA05C7359FE71C8018B95
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 305139e30d9e83e032c48789330ff0d87db4f97da35b6bcbf04980b853adeb31
                                                              • Instruction ID: d769a6fc5854d34b525db742848a86a0f83577edfd0f480daae40b04eb23bb48
                                                              • Opcode Fuzzy Hash: 305139e30d9e83e032c48789330ff0d87db4f97da35b6bcbf04980b853adeb31
                                                              • Instruction Fuzzy Hash: 9D015E75E0020A9FCF65DFA9D8485AE7BB5FB88261F408439E95A93344DB709D10CBA1
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 963f7ab58735aaa105cbf5d4f88e99102b86e78bc9a44a9dbbb2ae72b2905f9b
                                                              • Instruction ID: d28664dd371f8bf015e6a982d6fa191121a9e6799ffff47a1f6e6f9035531c29
                                                              • Opcode Fuzzy Hash: 963f7ab58735aaa105cbf5d4f88e99102b86e78bc9a44a9dbbb2ae72b2905f9b
                                                              • Instruction Fuzzy Hash: 29015A71300204CFE728DB6AD984B26BBF9FF88725F118069E1498B769CA70EC04CB50
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a1e2a5b532414f13e56ca38bfe88f3c33798efa3f38d99e836e959e2432e83e4
                                                              • Instruction ID: f509adce815bd98d28fa3a817fade32a8f70488f858f20f0f33602fe94052a1c
                                                              • Opcode Fuzzy Hash: a1e2a5b532414f13e56ca38bfe88f3c33798efa3f38d99e836e959e2432e83e4
                                                              • Instruction Fuzzy Hash: B901A2317042049BCB2A6B78A81866D7FA6EFD5224F15412FE506C7259DA258802CB44
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fb720c6707022dbd1c6f8b7725c3197890841c4963d946177546127670585574
                                                              • Instruction ID: 37310f3afca7a910418142664973edba6c4fc78e973b0293057d112a3486c841
                                                              • Opcode Fuzzy Hash: fb720c6707022dbd1c6f8b7725c3197890841c4963d946177546127670585574
                                                              • Instruction Fuzzy Hash: 0E018475D00119DFCF65DF68D8449AE7BB5FB8C321F108426E959D3344D7708910CB91
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7190491e04b668cdafaa4c7a1b8f565964aa7b141328bbf8ee047a08a123369d
                                                              • Instruction ID: a9f8838b8bf8990948360f01aa0fcfeaab2eebb4ff49512a28ccfde3e44fbcc8
                                                              • Opcode Fuzzy Hash: 7190491e04b668cdafaa4c7a1b8f565964aa7b141328bbf8ee047a08a123369d
                                                              • Instruction Fuzzy Hash: FAF05932B801118FCB19566DE41465EBBE9DFC4635B14407AE409D7358CE31CC028790
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d729911aad611cd994d3c15fc3b3b5ae5e86455d57cede9225375ccb1c549fd8
                                                              • Instruction ID: 570470d09bd7aac9e00bea5f7f1d823879735f7b81968f4f5bd4a3bc5ab841a9
                                                              • Opcode Fuzzy Hash: d729911aad611cd994d3c15fc3b3b5ae5e86455d57cede9225375ccb1c549fd8
                                                              • Instruction Fuzzy Hash: A5F058300293828FE7266F34B8EC67A7F74EF0B31BB042D85E44ADA05ACB715400CB24
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a5a91c5ae52190ff70c106aa16c2d31e833dc5fb7908b09e25bdbaf9d29281a4
                                                              • Instruction ID: f0ef8192a38c3b0a64d043bc9a7d9388042ccb53a51e4abb2ca92cd9f2a68cde
                                                              • Opcode Fuzzy Hash: a5a91c5ae52190ff70c106aa16c2d31e833dc5fb7908b09e25bdbaf9d29281a4
                                                              • Instruction Fuzzy Hash: 20F0F671D001099FCB24DF6DD84099FFBF6FF88350B00452AD505D3609D63099128BD5
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6bcbc71375d70d7489cfb22c5b8bf5b0c40f02eb88598f0ac9c9f9c280c86185
                                                              • Instruction ID: 713b814e57e32355f2d2632f2fcf07a367a0626017d4acd85e9e42757c9580bf
                                                              • Opcode Fuzzy Hash: 6bcbc71375d70d7489cfb22c5b8bf5b0c40f02eb88598f0ac9c9f9c280c86185
                                                              • Instruction Fuzzy Hash: 2FF05E35300105DFC714CF59D484D6AFBEAFF88724B508069EA0987335CB719C11CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bea8684d2002b3c866b6c290e592696d293ace33199c2869739837e85281ddf5
                                                              • Instruction ID: 10c9dab0b3d36d6feb371fd58bfa61870438214a6073f6efb4e0491bdcb9c160
                                                              • Opcode Fuzzy Hash: bea8684d2002b3c866b6c290e592696d293ace33199c2869739837e85281ddf5
                                                              • Instruction Fuzzy Hash: 34F02B36D153968EC71BABB4AC140DDBF39ADC325071A86A3EA20F7165E730094DCBB1
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f64fec023bf79a63f3e738cc28dfaca636686059003780543d701e37689f7f2b
                                                              • Instruction ID: 094559f8e0a202639d15eb4f47a7914d3b13c8782ed775267386c2b3e34a54ec
                                                              • Opcode Fuzzy Hash: f64fec023bf79a63f3e738cc28dfaca636686059003780543d701e37689f7f2b
                                                              • Instruction Fuzzy Hash: 97E099700217428FE3352F20B4EC23ABA69EB0B317B402D00E00EC80298F7044448B14
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 480a83d27c04a6d69794c14ded38727b8e30596173355a789399ae9c6a517568
                                                              • Instruction ID: 73aaf64c7bb5018b7e65ebf16bc7ffe48f22b4e9635f271f6c0d446ca8962ddd
                                                              • Opcode Fuzzy Hash: 480a83d27c04a6d69794c14ded38727b8e30596173355a789399ae9c6a517568
                                                              • Instruction Fuzzy Hash: 57D02B31D2022B53CB00E7A1FC004DFF738EEC1220B404222E91033000FB302658C6F0
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b2d359edaa670d181a0d167ab0b4b68404c67f24d987a3775b00865fd9bfe5c
                                                              • Instruction ID: bd48ed7f078548feb259e7cc68d62b86927eeb9472d5c548dcc36ea9a711a020
                                                              • Opcode Fuzzy Hash: 9b2d359edaa670d181a0d167ab0b4b68404c67f24d987a3775b00865fd9bfe5c
                                                              • Instruction Fuzzy Hash: 43D0C736300114A74B251A89F8088AE7B5EEBCD771705C026F91583344CE714D1197D5
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3421959216.0000000001310000.00000040.00000800.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_1310000_SnqkwvE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e88dd3a82c3eedc72f766232ef0dc1cd27096a67b8fef27ae126b494374c1d0f
                                                              • Instruction ID: 650bf309457da7353abb65611858e3799bd1aef6a6b93d09ba0bc9f8d7c45180
                                                              • Opcode Fuzzy Hash: e88dd3a82c3eedc72f766232ef0dc1cd27096a67b8fef27ae126b494374c1d0f
                                                              • Instruction Fuzzy Hash: CCC04C7144D3C05FDB2B9B708425156BBB0AB07310B2648DFC041C609AD5699405C715